Feb 9 19:23:31.142640 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:23:31.142679 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:23:31.142697 kernel: BIOS-provided physical RAM map: Feb 9 19:23:31.142718 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Feb 9 19:23:31.142731 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Feb 9 19:23:31.142745 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Feb 9 19:23:31.142765 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Feb 9 19:23:31.142779 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Feb 9 19:23:31.142793 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Feb 9 19:23:31.142806 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Feb 9 19:23:31.142821 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Feb 9 19:23:31.142834 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Feb 9 19:23:31.142848 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Feb 9 19:23:31.142862 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Feb 9 19:23:31.142881 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Feb 9 19:23:31.142910 kernel: NX (Execute Disable) protection: active Feb 9 19:23:31.142925 kernel: efi: EFI v2.70 by EDK II Feb 9 19:23:31.142941 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe379198 RNG=0xbfb73018 TPMEventLog=0xbe2bd018 Feb 9 19:23:31.142956 kernel: random: crng init done Feb 9 19:23:31.142971 kernel: SMBIOS 2.4 present. Feb 9 19:23:31.142987 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Feb 9 19:23:31.143002 kernel: Hypervisor detected: KVM Feb 9 19:23:31.143021 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 19:23:31.143037 kernel: kvm-clock: cpu 0, msr 18ffaa001, primary cpu clock Feb 9 19:23:31.143052 kernel: kvm-clock: using sched offset of 13008988017 cycles Feb 9 19:23:31.143067 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 19:23:31.143083 kernel: tsc: Detected 2299.998 MHz processor Feb 9 19:23:31.143097 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:23:31.143112 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:23:31.143127 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Feb 9 19:23:31.143142 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:23:31.143157 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Feb 9 19:23:31.143177 kernel: Using GB pages for direct mapping Feb 9 19:23:31.143193 kernel: Secure boot disabled Feb 9 19:23:31.143208 kernel: ACPI: Early table checksum verification disabled Feb 9 19:23:31.143222 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Feb 9 19:23:31.143238 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Feb 9 19:23:31.143253 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Feb 9 19:23:31.143268 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Feb 9 19:23:31.143284 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Feb 9 19:23:31.143309 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Feb 9 19:23:31.143327 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Feb 9 19:23:31.143344 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Feb 9 19:23:31.143359 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Feb 9 19:23:31.143376 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Feb 9 19:23:31.143393 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Feb 9 19:23:31.143413 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Feb 9 19:23:31.143430 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Feb 9 19:23:31.143446 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Feb 9 19:23:31.143463 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Feb 9 19:23:31.143479 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Feb 9 19:23:31.143495 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Feb 9 19:23:31.143512 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Feb 9 19:23:31.143528 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Feb 9 19:23:31.143544 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Feb 9 19:23:31.143564 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 19:23:31.143580 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 19:23:31.143597 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 9 19:23:31.143614 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Feb 9 19:23:31.143630 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Feb 9 19:23:31.143647 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Feb 9 19:23:31.143665 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Feb 9 19:23:31.143681 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Feb 9 19:23:31.143697 kernel: Zone ranges: Feb 9 19:23:31.143736 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:23:31.143753 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 19:23:31.143769 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Feb 9 19:23:31.143786 kernel: Movable zone start for each node Feb 9 19:23:31.143802 kernel: Early memory node ranges Feb 9 19:23:31.143819 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Feb 9 19:23:31.143835 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Feb 9 19:23:31.143851 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Feb 9 19:23:31.143867 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Feb 9 19:23:31.143909 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Feb 9 19:23:31.143925 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Feb 9 19:23:31.143940 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:23:31.143956 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Feb 9 19:23:31.143972 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Feb 9 19:23:31.143990 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Feb 9 19:23:31.144007 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Feb 9 19:23:31.144024 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 19:23:31.144041 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 19:23:31.144062 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:23:31.144078 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 19:23:31.144095 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:23:31.144111 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 19:23:31.144129 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 19:23:31.144145 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:23:31.144163 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:23:31.144179 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Feb 9 19:23:31.144196 kernel: Booting paravirtualized kernel on KVM Feb 9 19:23:31.144216 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:23:31.144233 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:23:31.144249 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:23:31.144264 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:23:31.144280 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:23:31.144295 kernel: kvm-guest: PV spinlocks enabled Feb 9 19:23:31.144312 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 19:23:31.144329 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Feb 9 19:23:31.144345 kernel: Policy zone: Normal Feb 9 19:23:31.144386 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:23:31.144404 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:23:31.144420 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 9 19:23:31.144437 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:23:31.144453 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:23:31.144470 kernel: Memory: 7536516K/7860584K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 323808K reserved, 0K cma-reserved) Feb 9 19:23:31.144487 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:23:31.144504 kernel: Kernel/User page tables isolation: enabled Feb 9 19:23:31.144526 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:23:31.144543 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:23:31.144559 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:23:31.144577 kernel: rcu: RCU event tracing is enabled. Feb 9 19:23:31.144593 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:23:31.144610 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:23:31.144627 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:23:31.144644 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:23:31.144660 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:23:31.144682 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 19:23:31.144718 kernel: Console: colour dummy device 80x25 Feb 9 19:23:31.144736 kernel: printk: console [ttyS0] enabled Feb 9 19:23:31.144756 kernel: ACPI: Core revision 20210730 Feb 9 19:23:31.144774 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:23:31.144791 kernel: x2apic enabled Feb 9 19:23:31.144809 kernel: Switched APIC routing to physical x2apic. Feb 9 19:23:31.144825 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Feb 9 19:23:31.144843 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 9 19:23:31.144861 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Feb 9 19:23:31.144882 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Feb 9 19:23:31.144967 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Feb 9 19:23:31.144984 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:23:31.145000 kernel: Spectre V2 : Mitigation: IBRS Feb 9 19:23:31.145018 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:23:31.145035 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:23:31.145057 kernel: RETBleed: Mitigation: IBRS Feb 9 19:23:31.145074 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 19:23:31.145092 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Feb 9 19:23:31.145110 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 19:23:31.145128 kernel: MDS: Mitigation: Clear CPU buffers Feb 9 19:23:31.145146 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:23:31.145164 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:23:31.145183 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:23:31.145200 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:23:31.145221 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:23:31.145238 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 19:23:31.145254 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:23:31.145271 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:23:31.145289 kernel: LSM: Security Framework initializing Feb 9 19:23:31.145306 kernel: SELinux: Initializing. Feb 9 19:23:31.145324 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:23:31.145342 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:23:31.145360 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Feb 9 19:23:31.145382 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 9 19:23:31.145400 kernel: signal: max sigframe size: 1776 Feb 9 19:23:31.145418 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:23:31.145435 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 19:23:31.145453 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:23:31.145471 kernel: x86: Booting SMP configuration: Feb 9 19:23:31.145488 kernel: .... node #0, CPUs: #1 Feb 9 19:23:31.145506 kernel: kvm-clock: cpu 1, msr 18ffaa041, secondary cpu clock Feb 9 19:23:31.145524 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 9 19:23:31.145547 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 19:23:31.145565 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:23:31.145582 kernel: smpboot: Max logical packages: 1 Feb 9 19:23:31.145600 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Feb 9 19:23:31.145618 kernel: devtmpfs: initialized Feb 9 19:23:31.145636 kernel: x86/mm: Memory block size: 128MB Feb 9 19:23:31.145654 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Feb 9 19:23:31.145672 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:23:31.145690 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:23:31.145717 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:23:31.145736 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:23:31.145753 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:23:31.145771 kernel: audit: type=2000 audit(1707506609.927:1): state=initialized audit_enabled=0 res=1 Feb 9 19:23:31.145788 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:23:31.145806 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:23:31.145824 kernel: cpuidle: using governor menu Feb 9 19:23:31.145841 kernel: ACPI: bus type PCI registered Feb 9 19:23:31.145859 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:23:31.145880 kernel: dca service started, version 1.12.1 Feb 9 19:23:31.145909 kernel: PCI: Using configuration type 1 for base access Feb 9 19:23:31.145925 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:23:31.145940 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:23:31.145957 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:23:31.145974 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:23:31.145990 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:23:31.146007 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:23:31.146024 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:23:31.146045 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:23:31.146063 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:23:31.146079 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:23:31.146097 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 9 19:23:31.146114 kernel: ACPI: Interpreter enabled Feb 9 19:23:31.146132 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 19:23:31.146149 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:23:31.146166 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:23:31.146184 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 9 19:23:31.146203 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 19:23:31.146438 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:23:31.146603 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 19:23:31.146626 kernel: PCI host bridge to bus 0000:00 Feb 9 19:23:31.146793 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 19:23:31.146956 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 19:23:31.147111 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 19:23:31.147258 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Feb 9 19:23:31.147406 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 19:23:31.147581 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 19:23:31.147769 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Feb 9 19:23:31.147957 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 19:23:31.148122 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 19:23:31.148302 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Feb 9 19:23:31.148467 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Feb 9 19:23:31.148628 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Feb 9 19:23:31.148819 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 9 19:23:31.149003 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Feb 9 19:23:31.149163 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Feb 9 19:23:31.149341 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 19:23:31.149503 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 9 19:23:31.149661 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Feb 9 19:23:31.149682 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 19:23:31.149701 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 19:23:31.149727 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 19:23:31.149745 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 19:23:31.149763 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 19:23:31.149786 kernel: iommu: Default domain type: Translated Feb 9 19:23:31.149804 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:23:31.149823 kernel: vgaarb: loaded Feb 9 19:23:31.149840 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:23:31.149858 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:23:31.149877 kernel: PTP clock support registered Feb 9 19:23:31.149907 kernel: Registered efivars operations Feb 9 19:23:31.149924 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:23:31.149942 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 19:23:31.149963 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Feb 9 19:23:31.149981 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Feb 9 19:23:31.149998 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Feb 9 19:23:31.150015 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Feb 9 19:23:31.150033 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 19:23:31.150051 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:23:31.150069 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:23:31.150087 kernel: pnp: PnP ACPI init Feb 9 19:23:31.150104 kernel: pnp: PnP ACPI: found 7 devices Feb 9 19:23:31.150125 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:23:31.150143 kernel: NET: Registered PF_INET protocol family Feb 9 19:23:31.150161 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:23:31.150179 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 9 19:23:31.150197 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:23:31.150214 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:23:31.150232 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 19:23:31.150250 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 9 19:23:31.150268 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:23:31.150288 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:23:31.150305 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:23:31.150322 kernel: NET: Registered PF_XDP protocol family Feb 9 19:23:31.150480 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 19:23:31.150629 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 19:23:31.150781 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 19:23:31.150940 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Feb 9 19:23:31.151107 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 19:23:31.151137 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:23:31.151156 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 19:23:31.151174 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Feb 9 19:23:31.151192 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 19:23:31.151210 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 9 19:23:31.151227 kernel: clocksource: Switched to clocksource tsc Feb 9 19:23:31.151245 kernel: Initialise system trusted keyrings Feb 9 19:23:31.151263 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 9 19:23:31.151285 kernel: Key type asymmetric registered Feb 9 19:23:31.151302 kernel: Asymmetric key parser 'x509' registered Feb 9 19:23:31.151320 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:23:31.151338 kernel: io scheduler mq-deadline registered Feb 9 19:23:31.151355 kernel: io scheduler kyber registered Feb 9 19:23:31.151374 kernel: io scheduler bfq registered Feb 9 19:23:31.151391 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:23:31.151410 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 19:23:31.151577 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Feb 9 19:23:31.151604 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 9 19:23:31.151774 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Feb 9 19:23:31.151798 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 19:23:31.151972 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Feb 9 19:23:31.151995 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:23:31.152014 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:23:31.152032 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 19:23:31.152050 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Feb 9 19:23:31.152068 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Feb 9 19:23:31.152244 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Feb 9 19:23:31.152270 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 19:23:31.152288 kernel: i8042: Warning: Keylock active Feb 9 19:23:31.152306 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 19:23:31.152325 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 19:23:31.152498 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 9 19:23:31.152651 kernel: rtc_cmos 00:00: registered as rtc0 Feb 9 19:23:31.152817 kernel: rtc_cmos 00:00: setting system clock to 2024-02-09T19:23:30 UTC (1707506610) Feb 9 19:23:31.152980 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 9 19:23:31.153019 kernel: intel_pstate: CPU model not supported Feb 9 19:23:31.153036 kernel: pstore: Registered efi as persistent store backend Feb 9 19:23:31.153052 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:23:31.153068 kernel: Segment Routing with IPv6 Feb 9 19:23:31.153082 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:23:31.153097 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:23:31.153112 kernel: Key type dns_resolver registered Feb 9 19:23:31.153132 kernel: IPI shorthand broadcast: enabled Feb 9 19:23:31.153148 kernel: sched_clock: Marking stable (772059190, 187799715)->(1047832468, -87973563) Feb 9 19:23:31.153163 kernel: registered taskstats version 1 Feb 9 19:23:31.153180 kernel: Loading compiled-in X.509 certificates Feb 9 19:23:31.153197 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 19:23:31.153214 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:23:31.153231 kernel: Key type .fscrypt registered Feb 9 19:23:31.153247 kernel: Key type fscrypt-provisioning registered Feb 9 19:23:31.153265 kernel: pstore: Using crash dump compression: deflate Feb 9 19:23:31.153286 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:23:31.153303 kernel: ima: No architecture policies found Feb 9 19:23:31.153319 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:23:31.153337 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:23:31.153354 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:23:31.153371 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:23:31.153386 kernel: Run /init as init process Feb 9 19:23:31.153401 kernel: with arguments: Feb 9 19:23:31.153421 kernel: /init Feb 9 19:23:31.153436 kernel: with environment: Feb 9 19:23:31.153452 kernel: HOME=/ Feb 9 19:23:31.153467 kernel: TERM=linux Feb 9 19:23:31.153483 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:23:31.153503 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:23:31.153523 systemd[1]: Detected virtualization kvm. Feb 9 19:23:31.153541 systemd[1]: Detected architecture x86-64. Feb 9 19:23:31.153576 systemd[1]: Running in initrd. Feb 9 19:23:31.153593 systemd[1]: No hostname configured, using default hostname. Feb 9 19:23:31.153609 systemd[1]: Hostname set to . Feb 9 19:23:31.153627 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:23:31.153645 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:23:31.153663 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:23:31.153679 systemd[1]: Reached target cryptsetup.target. Feb 9 19:23:31.153695 systemd[1]: Reached target paths.target. Feb 9 19:23:31.153722 systemd[1]: Reached target slices.target. Feb 9 19:23:31.153737 systemd[1]: Reached target swap.target. Feb 9 19:23:31.153752 systemd[1]: Reached target timers.target. Feb 9 19:23:31.153769 systemd[1]: Listening on iscsid.socket. Feb 9 19:23:31.153784 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:23:31.153801 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:23:31.153817 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:23:31.153836 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:23:31.153878 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:23:31.153917 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:23:31.153933 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:23:31.153949 systemd[1]: Reached target sockets.target. Feb 9 19:23:31.153965 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:23:31.153993 systemd[1]: Finished network-cleanup.service. Feb 9 19:23:31.154010 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:23:31.154026 systemd[1]: Starting systemd-journald.service... Feb 9 19:23:31.154047 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:23:31.161859 systemd[1]: Starting systemd-resolved.service... Feb 9 19:23:31.161917 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:23:31.161959 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:23:31.161992 systemd-journald[189]: Journal started Feb 9 19:23:31.162085 systemd-journald[189]: Runtime Journal (/run/log/journal/f585396ba38c09cc4682bd7ae571cebf) is 8.0M, max 148.8M, 140.8M free. Feb 9 19:23:31.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.170249 kernel: audit: type=1130 audit(1707506611.163:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.170306 systemd[1]: Started systemd-journald.service. Feb 9 19:23:31.171223 systemd-modules-load[190]: Inserted module 'overlay' Feb 9 19:23:31.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.179565 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:23:31.210235 kernel: audit: type=1130 audit(1707506611.177:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.210282 kernel: audit: type=1130 audit(1707506611.185:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.210305 kernel: audit: type=1130 audit(1707506611.195:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.187287 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:23:31.198454 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:23:31.209878 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:23:31.224916 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:23:31.232300 systemd-modules-load[190]: Inserted module 'br_netfilter' Feb 9 19:23:31.233010 kernel: Bridge firewalling registered Feb 9 19:23:31.239999 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:23:31.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.245909 kernel: audit: type=1130 audit(1707506611.238:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.253935 systemd-resolved[191]: Positive Trust Anchors: Feb 9 19:23:31.253958 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:23:31.254008 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:23:31.265224 systemd-resolved[191]: Defaulting to hostname 'linux'. Feb 9 19:23:31.267304 systemd[1]: Started systemd-resolved.service. Feb 9 19:23:31.272060 kernel: SCSI subsystem initialized Feb 9 19:23:31.281930 kernel: audit: type=1130 audit(1707506611.274:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.276405 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:23:31.305042 kernel: audit: type=1130 audit(1707506611.283:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.305082 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:23:31.305108 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:23:31.305131 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:23:31.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.285165 systemd[1]: Reached target nss-lookup.target. Feb 9 19:23:31.298369 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:23:31.301979 systemd-modules-load[190]: Inserted module 'dm_multipath' Feb 9 19:23:31.302923 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:23:31.322051 dracut-cmdline[205]: dracut-dracut-053 Feb 9 19:23:31.322051 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:23:31.351048 kernel: audit: type=1130 audit(1707506611.324:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.327465 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:23:31.345314 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:23:31.370059 kernel: audit: type=1130 audit(1707506611.359:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.407920 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:23:31.421932 kernel: iscsi: registered transport (tcp) Feb 9 19:23:31.447692 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:23:31.447773 kernel: QLogic iSCSI HBA Driver Feb 9 19:23:31.493309 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:23:31.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.495742 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:23:31.553948 kernel: raid6: avx2x4 gen() 18060 MB/s Feb 9 19:23:31.571931 kernel: raid6: avx2x4 xor() 7875 MB/s Feb 9 19:23:31.589948 kernel: raid6: avx2x2 gen() 18070 MB/s Feb 9 19:23:31.607963 kernel: raid6: avx2x2 xor() 18577 MB/s Feb 9 19:23:31.625952 kernel: raid6: avx2x1 gen() 13746 MB/s Feb 9 19:23:31.643945 kernel: raid6: avx2x1 xor() 16029 MB/s Feb 9 19:23:31.660936 kernel: raid6: sse2x4 gen() 10983 MB/s Feb 9 19:23:31.677930 kernel: raid6: sse2x4 xor() 6665 MB/s Feb 9 19:23:31.694934 kernel: raid6: sse2x2 gen() 11978 MB/s Feb 9 19:23:31.711927 kernel: raid6: sse2x2 xor() 7410 MB/s Feb 9 19:23:31.728928 kernel: raid6: sse2x1 gen() 10520 MB/s Feb 9 19:23:31.746585 kernel: raid6: sse2x1 xor() 5174 MB/s Feb 9 19:23:31.746626 kernel: raid6: using algorithm avx2x2 gen() 18070 MB/s Feb 9 19:23:31.746647 kernel: raid6: .... xor() 18577 MB/s, rmw enabled Feb 9 19:23:31.747416 kernel: raid6: using avx2x2 recovery algorithm Feb 9 19:23:31.762932 kernel: xor: automatically using best checksumming function avx Feb 9 19:23:31.869934 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:23:31.882876 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:23:31.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.882000 audit: BPF prog-id=7 op=LOAD Feb 9 19:23:31.882000 audit: BPF prog-id=8 op=LOAD Feb 9 19:23:31.885378 systemd[1]: Starting systemd-udevd.service... Feb 9 19:23:31.902206 systemd-udevd[387]: Using default interface naming scheme 'v252'. Feb 9 19:23:31.909902 systemd[1]: Started systemd-udevd.service. Feb 9 19:23:31.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.912519 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:23:31.936375 dracut-pre-trigger[392]: rd.md=0: removing MD RAID activation Feb 9 19:23:31.978087 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:23:31.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:31.979685 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:23:32.052973 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:23:32.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:32.129918 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:23:32.183797 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:23:32.183877 kernel: AES CTR mode by8 optimization enabled Feb 9 19:23:32.217929 kernel: scsi host0: Virtio SCSI HBA Feb 9 19:23:32.255913 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Feb 9 19:23:32.322712 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Feb 9 19:23:32.323058 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Feb 9 19:23:32.323285 kernel: sd 0:0:1:0: [sda] Write Protect is off Feb 9 19:23:32.337742 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Feb 9 19:23:32.338146 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 19:23:32.357310 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:23:32.357397 kernel: GPT:17805311 != 25165823 Feb 9 19:23:32.357421 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:23:32.363679 kernel: GPT:17805311 != 25165823 Feb 9 19:23:32.367397 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:23:32.372699 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:23:32.383916 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Feb 9 19:23:32.429927 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (441) Feb 9 19:23:32.448991 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:23:32.472939 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:23:32.473181 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:23:32.515723 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:23:32.521185 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:23:32.533230 systemd[1]: Starting disk-uuid.service... Feb 9 19:23:32.562714 disk-uuid[508]: Primary Header is updated. Feb 9 19:23:32.562714 disk-uuid[508]: Secondary Entries is updated. Feb 9 19:23:32.562714 disk-uuid[508]: Secondary Header is updated. Feb 9 19:23:32.590030 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:23:32.590068 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:23:32.596927 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:23:33.609871 disk-uuid[509]: The operation has completed successfully. Feb 9 19:23:33.620047 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:23:33.675851 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:23:33.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:33.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:33.675998 systemd[1]: Finished disk-uuid.service. Feb 9 19:23:33.687090 systemd[1]: Starting verity-setup.service... Feb 9 19:23:33.716224 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 19:23:33.796161 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:23:33.798618 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:23:33.818413 systemd[1]: Finished verity-setup.service. Feb 9 19:23:33.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:33.899945 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:23:33.899976 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:23:33.900371 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:23:33.945122 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:23:33.945155 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:23:33.945170 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:23:33.901304 systemd[1]: Starting ignition-setup.service... Feb 9 19:23:33.958043 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:23:33.966235 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:23:33.973190 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:23:33.992536 systemd[1]: Finished ignition-setup.service. Feb 9 19:23:33.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:33.994026 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:23:34.083780 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:23:34.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:34.091000 audit: BPF prog-id=9 op=LOAD Feb 9 19:23:34.094597 systemd[1]: Starting systemd-networkd.service... Feb 9 19:23:34.131227 systemd-networkd[683]: lo: Link UP Feb 9 19:23:34.131241 systemd-networkd[683]: lo: Gained carrier Feb 9 19:23:34.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:34.132673 systemd-networkd[683]: Enumeration completed Feb 9 19:23:34.132831 systemd[1]: Started systemd-networkd.service. Feb 9 19:23:34.133378 systemd-networkd[683]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:23:34.135746 systemd-networkd[683]: eth0: Link UP Feb 9 19:23:34.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:34.135753 systemd-networkd[683]: eth0: Gained carrier Feb 9 19:23:34.218081 iscsid[694]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:23:34.218081 iscsid[694]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 19:23:34.218081 iscsid[694]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:23:34.218081 iscsid[694]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:23:34.218081 iscsid[694]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:23:34.218081 iscsid[694]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:23:34.218081 iscsid[694]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:23:34.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:34.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:34.140407 systemd[1]: Reached target network.target. Feb 9 19:23:34.294962 ignition[589]: Ignition 2.14.0 Feb 9 19:23:34.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:34.148041 systemd-networkd[683]: eth0: DHCPv4 address 10.128.0.29/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 9 19:23:34.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:34.294978 ignition[589]: Stage: fetch-offline Feb 9 19:23:34.162503 systemd[1]: Starting iscsiuio.service... Feb 9 19:23:34.295093 ignition[589]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:23:34.190231 systemd[1]: Started iscsiuio.service. Feb 9 19:23:34.295255 ignition[589]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:23:34.198433 systemd[1]: Starting iscsid.service... Feb 9 19:23:34.310971 ignition[589]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:23:34.206287 systemd[1]: Started iscsid.service. Feb 9 19:23:34.311180 ignition[589]: parsed url from cmdline: "" Feb 9 19:23:34.226812 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:23:34.311187 ignition[589]: no config URL provided Feb 9 19:23:34.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:34.245266 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:23:34.311196 ignition[589]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:23:34.269476 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:23:34.311207 ignition[589]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:23:34.303224 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:23:34.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:34.311216 ignition[589]: failed to fetch config: resource requires networking Feb 9 19:23:34.321221 systemd[1]: Reached target remote-fs.target. Feb 9 19:23:34.311385 ignition[589]: Ignition finished successfully Feb 9 19:23:34.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:34.340284 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:23:34.408858 ignition[708]: Ignition 2.14.0 Feb 9 19:23:34.363551 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:23:34.408869 ignition[708]: Stage: fetch Feb 9 19:23:34.379466 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:23:34.409058 ignition[708]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:23:34.396365 systemd[1]: Starting ignition-fetch.service... Feb 9 19:23:34.409090 ignition[708]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:23:34.472160 unknown[708]: fetched base config from "system" Feb 9 19:23:34.420246 ignition[708]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:23:34.472173 unknown[708]: fetched base config from "system" Feb 9 19:23:34.420442 ignition[708]: parsed url from cmdline: "" Feb 9 19:23:34.472182 unknown[708]: fetched user config from "gcp" Feb 9 19:23:34.420450 ignition[708]: no config URL provided Feb 9 19:23:34.474958 systemd[1]: Finished ignition-fetch.service. Feb 9 19:23:34.420460 ignition[708]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:23:34.489196 systemd[1]: Starting ignition-kargs.service... Feb 9 19:23:34.420471 ignition[708]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:23:34.521489 systemd[1]: Finished ignition-kargs.service. Feb 9 19:23:34.420511 ignition[708]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Feb 9 19:23:34.545441 systemd[1]: Starting ignition-disks.service... Feb 9 19:23:34.426822 ignition[708]: GET result: OK Feb 9 19:23:34.569348 systemd[1]: Finished ignition-disks.service. Feb 9 19:23:34.426946 ignition[708]: parsing config with SHA512: 562fac865a4a9e2370005494fc38dfad0eb65702def55e8d88ee9669b0b4f19aa97d956b3aa51ae02fb1dfa51d72cb27c7c89494674a1d78a34840668aa7dcda Feb 9 19:23:34.584289 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:23:34.473188 ignition[708]: fetch: fetch complete Feb 9 19:23:34.600123 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:23:34.473196 ignition[708]: fetch: fetch passed Feb 9 19:23:34.614093 systemd[1]: Reached target local-fs.target. Feb 9 19:23:34.473243 ignition[708]: Ignition finished successfully Feb 9 19:23:34.614218 systemd[1]: Reached target sysinit.target. Feb 9 19:23:34.503089 ignition[714]: Ignition 2.14.0 Feb 9 19:23:34.635119 systemd[1]: Reached target basic.target. Feb 9 19:23:34.503100 ignition[714]: Stage: kargs Feb 9 19:23:34.636417 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:23:34.503222 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:23:34.503249 ignition[714]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:23:34.510084 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:23:34.511554 ignition[714]: kargs: kargs passed Feb 9 19:23:34.511605 ignition[714]: Ignition finished successfully Feb 9 19:23:34.557241 ignition[720]: Ignition 2.14.0 Feb 9 19:23:34.557252 ignition[720]: Stage: disks Feb 9 19:23:34.557399 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:23:34.557429 ignition[720]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:23:34.564778 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:23:34.566527 ignition[720]: disks: disks passed Feb 9 19:23:34.566583 ignition[720]: Ignition finished successfully Feb 9 19:23:34.678685 systemd-fsck[728]: ROOT: clean, 602/1628000 files, 124051/1617920 blocks Feb 9 19:23:34.888822 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:23:34.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:34.898168 systemd[1]: Mounting sysroot.mount... Feb 9 19:23:34.928115 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:23:34.924906 systemd[1]: Mounted sysroot.mount. Feb 9 19:23:34.935333 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:23:34.957350 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:23:34.974565 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:23:34.974641 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:23:34.974685 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:23:34.995779 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:23:35.026837 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:23:35.053398 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (734) Feb 9 19:23:35.031151 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:23:35.086040 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:23:35.086074 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:23:35.086090 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:23:35.086349 initrd-setup-root[739]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:23:35.096059 initrd-setup-root[763]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:23:35.112012 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:23:35.112089 initrd-setup-root[771]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:23:35.112405 initrd-setup-root[779]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:23:35.112242 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:23:35.172040 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:23:35.213148 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 19:23:35.213199 kernel: audit: type=1130 audit(1707506615.170:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:35.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:35.173645 systemd[1]: Starting ignition-mount.service... Feb 9 19:23:35.221376 systemd[1]: Starting sysroot-boot.service... Feb 9 19:23:35.235491 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:23:35.235730 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:23:35.261038 ignition[800]: INFO : Ignition 2.14.0 Feb 9 19:23:35.261038 ignition[800]: INFO : Stage: mount Feb 9 19:23:35.261038 ignition[800]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:23:35.261038 ignition[800]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:23:35.358061 kernel: audit: type=1130 audit(1707506615.266:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:35.358107 kernel: audit: type=1130 audit(1707506615.317:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:35.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:35.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:35.264926 systemd[1]: Finished sysroot-boot.service. Feb 9 19:23:35.372066 ignition[800]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:23:35.372066 ignition[800]: INFO : mount: mount passed Feb 9 19:23:35.372066 ignition[800]: INFO : Ignition finished successfully Feb 9 19:23:35.450041 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (809) Feb 9 19:23:35.450082 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:23:35.450107 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:23:35.450130 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:23:35.450148 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:23:35.270582 systemd[1]: Finished ignition-mount.service. Feb 9 19:23:35.320486 systemd[1]: Starting ignition-files.service... Feb 9 19:23:35.369118 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:23:35.473090 ignition[828]: INFO : Ignition 2.14.0 Feb 9 19:23:35.473090 ignition[828]: INFO : Stage: files Feb 9 19:23:35.473090 ignition[828]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:23:35.473090 ignition[828]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:23:35.473090 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:23:35.473090 ignition[828]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:23:35.430880 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:23:35.548053 ignition[828]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:23:35.548053 ignition[828]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:23:35.548053 ignition[828]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:23:35.548053 ignition[828]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:23:35.548053 ignition[828]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:23:35.548053 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:23:35.548053 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 19:23:35.484369 unknown[828]: wrote ssh authorized keys file for user: core Feb 9 19:23:35.783177 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:23:36.014777 ignition[828]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 19:23:36.039088 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:23:36.039088 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:23:36.039088 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 19:23:36.095037 systemd-networkd[683]: eth0: Gained IPv6LL Feb 9 19:23:36.324696 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:23:36.463698 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:23:36.491041 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (828) Feb 9 19:23:36.490568 systemd[1]: mnt-oem2868942495.mount: Deactivated successfully. Feb 9 19:23:36.500024 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/hosts" Feb 9 19:23:36.500024 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(5): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:23:36.500024 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2868942495" Feb 9 19:23:36.500024 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(5): op(6): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2868942495": device or resource busy Feb 9 19:23:36.500024 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(5): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2868942495", trying btrfs: device or resource busy Feb 9 19:23:36.500024 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2868942495" Feb 9 19:23:36.500024 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2868942495" Feb 9 19:23:36.500024 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [started] unmounting "/mnt/oem2868942495" Feb 9 19:23:36.500024 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [finished] unmounting "/mnt/oem2868942495" Feb 9 19:23:36.500024 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/hosts" Feb 9 19:23:36.500024 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:23:36.500024 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:23:36.701115 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Feb 9 19:23:36.788521 ignition[828]: DEBUG : files: createFilesystemsFiles: createFiles: op(9): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 19:23:36.812027 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:23:36.812027 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:23:36.812027 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 9 19:23:36.860655 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Feb 9 19:23:37.164568 ignition[828]: DEBUG : files: createFilesystemsFiles: createFiles: op(a): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 9 19:23:37.188046 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:23:37.188046 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 9 19:23:37.188046 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:23:37.188046 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem393822505" Feb 9 19:23:37.188046 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem393822505": device or resource busy Feb 9 19:23:37.188046 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem393822505", trying btrfs: device or resource busy Feb 9 19:23:37.188046 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem393822505" Feb 9 19:23:37.188046 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem393822505" Feb 9 19:23:37.188046 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem393822505" Feb 9 19:23:37.188046 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem393822505" Feb 9 19:23:37.188046 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 9 19:23:37.188046 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:23:37.188046 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:23:37.178415 systemd[1]: mnt-oem393822505.mount: Deactivated successfully. Feb 9 19:23:37.412059 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Feb 9 19:23:37.439215 ignition[828]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 19:23:37.463074 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:23:37.463074 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:23:37.463074 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:23:37.463074 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET result: OK Feb 9 19:23:38.153005 ignition[828]: DEBUG : files: createFilesystemsFiles: createFiles: op(10): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(14): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(14): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(15): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(15): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:23:38.177041 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem267822573" Feb 9 19:23:38.625096 kernel: audit: type=1130 audit(1707506618.222:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.625148 kernel: audit: type=1130 audit(1707506618.321:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.625175 kernel: audit: type=1130 audit(1707506618.375:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.625197 kernel: audit: type=1131 audit(1707506618.375:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.625220 kernel: audit: type=1130 audit(1707506618.500:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.625249 kernel: audit: type=1131 audit(1707506618.500:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.625482 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem267822573": device or resource busy Feb 9 19:23:38.625482 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem267822573", trying btrfs: device or resource busy Feb 9 19:23:38.625482 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem267822573" Feb 9 19:23:38.625482 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem267822573" Feb 9 19:23:38.625482 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem267822573" Feb 9 19:23:38.625482 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem267822573" Feb 9 19:23:38.625482 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 9 19:23:38.625482 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 9 19:23:38.625482 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(1b): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:23:38.625482 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3342618858" Feb 9 19:23:38.625482 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3342618858": device or resource busy Feb 9 19:23:38.625482 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(1b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3342618858", trying btrfs: device or resource busy Feb 9 19:23:38.625482 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3342618858" Feb 9 19:23:38.625482 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3342618858" Feb 9 19:23:38.962254 kernel: audit: type=1130 audit(1707506618.631:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.178197 systemd[1]: mnt-oem267822573.mount: Deactivated successfully. Feb 9 19:23:38.978264 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [started] unmounting "/mnt/oem3342618858" Feb 9 19:23:38.978264 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [finished] unmounting "/mnt/oem3342618858" Feb 9 19:23:38.978264 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(1f): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(1f): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(20): [started] processing unit "oem-gce.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(20): [finished] processing unit "oem-gce.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(21): [started] processing unit "oem-gce-enable-oslogin.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(21): [finished] processing unit "oem-gce-enable-oslogin.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(22): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(22): op(23): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(22): op(23): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(22): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(24): [started] processing unit "prepare-critools.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(24): op(25): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(24): op(25): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(24): [finished] processing unit "prepare-critools.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(26): [started] processing unit "prepare-helm.service" Feb 9 19:23:38.978264 ignition[828]: INFO : files: op(26): op(27): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:23:39.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.200942 systemd[1]: mnt-oem3342618858.mount: Deactivated successfully. Feb 9 19:23:39.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.375138 iscsid[694]: iscsid shutting down. Feb 9 19:23:39.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(26): op(27): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(26): [finished] processing unit "prepare-helm.service" Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(28): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(28): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(29): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(29): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(2a): [started] setting preset to enabled for "prepare-helm.service" Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(2a): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(2b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(2b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(2c): [started] setting preset to enabled for "oem-gce.service" Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(2c): [finished] setting preset to enabled for "oem-gce.service" Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(2d): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 9 19:23:39.390270 ignition[828]: INFO : files: op(2d): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 9 19:23:39.390270 ignition[828]: INFO : files: createResultFile: createFiles: op(2e): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:23:39.390270 ignition[828]: INFO : files: createResultFile: createFiles: op(2e): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:23:39.390270 ignition[828]: INFO : files: files passed Feb 9 19:23:39.390270 ignition[828]: INFO : Ignition finished successfully Feb 9 19:23:39.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.731473 initrd-setup-root-after-ignition[851]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:23:38.213330 systemd[1]: Finished ignition-files.service. Feb 9 19:23:38.234705 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:23:38.265248 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:23:39.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.266369 systemd[1]: Starting ignition-quench.service... Feb 9 19:23:39.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.813000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:23:38.308505 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:23:38.323655 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:23:38.323793 systemd[1]: Finished ignition-quench.service. Feb 9 19:23:39.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.870210 ignition[866]: INFO : Ignition 2.14.0 Feb 9 19:23:39.870210 ignition[866]: INFO : Stage: umount Feb 9 19:23:39.870210 ignition[866]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:23:39.870210 ignition[866]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:23:39.870210 ignition[866]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:23:39.870210 ignition[866]: INFO : umount: umount passed Feb 9 19:23:39.870210 ignition[866]: INFO : Ignition finished successfully Feb 9 19:23:39.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:39.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.377304 systemd[1]: Reached target ignition-complete.target. Feb 9 19:23:38.456199 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:23:39.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.492235 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:23:40.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.492360 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:23:40.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.502271 systemd[1]: Reached target initrd-fs.target. Feb 9 19:23:38.558293 systemd[1]: Reached target initrd.target. Feb 9 19:23:38.581350 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:23:40.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.582498 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:23:40.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.603520 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:23:40.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.634574 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:23:40.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.683265 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:23:40.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:40.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:38.700453 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:23:38.746413 systemd[1]: Stopped target timers.target. Feb 9 19:23:38.780376 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:23:38.780614 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:23:38.797557 systemd[1]: Stopped target initrd.target. Feb 9 19:23:40.198060 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Feb 9 19:23:38.821383 systemd[1]: Stopped target basic.target. Feb 9 19:23:38.843368 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:23:38.891245 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:23:38.920203 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:23:38.945273 systemd[1]: Stopped target remote-fs.target. Feb 9 19:23:38.970266 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:23:38.986285 systemd[1]: Stopped target sysinit.target. Feb 9 19:23:39.009262 systemd[1]: Stopped target local-fs.target. Feb 9 19:23:39.032278 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:23:39.059298 systemd[1]: Stopped target swap.target. Feb 9 19:23:39.079289 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:23:39.079484 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:23:39.109503 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:23:39.120356 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:23:39.120541 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:23:39.156467 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:23:39.156639 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:23:39.179411 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:23:39.179583 systemd[1]: Stopped ignition-files.service. Feb 9 19:23:39.222858 systemd[1]: Stopping ignition-mount.service... Feb 9 19:23:39.245557 systemd[1]: Stopping iscsid.service... Feb 9 19:23:39.275281 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:23:39.300839 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:23:39.301154 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:23:39.320365 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:23:39.320536 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:23:39.346750 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:23:39.347556 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:23:39.347667 systemd[1]: Stopped iscsid.service. Feb 9 19:23:39.367807 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:23:39.367926 systemd[1]: Stopped ignition-mount.service. Feb 9 19:23:39.383702 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:23:39.383806 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:23:39.398686 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:23:39.398856 systemd[1]: Stopped ignition-disks.service. Feb 9 19:23:39.423207 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:23:39.423281 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:23:39.442227 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:23:39.442305 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:23:39.463216 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:23:39.463297 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:23:39.484158 systemd[1]: Stopped target paths.target. Feb 9 19:23:39.504058 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:23:39.507959 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:23:39.525058 systemd[1]: Stopped target slices.target. Feb 9 19:23:39.543071 systemd[1]: Stopped target sockets.target. Feb 9 19:23:39.543253 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:23:39.543308 systemd[1]: Closed iscsid.socket. Feb 9 19:23:39.568163 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:23:39.568257 systemd[1]: Stopped ignition-setup.service. Feb 9 19:23:39.590185 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:23:39.590271 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:23:39.612326 systemd[1]: Stopping iscsiuio.service... Feb 9 19:23:39.642527 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:23:39.642655 systemd[1]: Stopped iscsiuio.service. Feb 9 19:23:39.674543 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:23:39.674655 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:23:39.711074 systemd[1]: Stopped target network.target. Feb 9 19:23:39.717256 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:23:39.717317 systemd[1]: Closed iscsiuio.socket. Feb 9 19:23:39.739519 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:23:39.743975 systemd-networkd[683]: eth0: DHCPv6 lease lost Feb 9 19:23:40.206000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:23:39.760231 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:23:39.768030 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:23:39.768144 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:23:39.789826 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:23:39.789980 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:23:39.815132 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:23:39.815181 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:23:39.830094 systemd[1]: Stopping network-cleanup.service... Feb 9 19:23:39.846068 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:23:39.846284 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:23:39.863318 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:23:39.863387 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:23:39.878315 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:23:39.878379 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:23:39.898454 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:23:39.910843 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:23:39.911553 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:23:39.911816 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:23:39.934993 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:23:39.935072 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:23:39.964170 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:23:39.964245 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:23:39.980119 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:23:39.980215 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:23:39.996210 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:23:39.996284 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:23:40.013275 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:23:40.013343 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:23:40.030370 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:23:40.052031 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 19:23:40.052179 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 19:23:40.067331 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:23:40.067399 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:23:40.086257 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:23:40.086330 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:23:40.103604 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 19:23:40.104314 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:23:40.104424 systemd[1]: Stopped network-cleanup.service. Feb 9 19:23:40.117483 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:23:40.117600 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:23:40.132369 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:23:40.148040 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:23:40.163618 systemd[1]: Switching root. Feb 9 19:23:40.211328 systemd-journald[189]: Journal stopped Feb 9 19:23:44.841583 kernel: kauditd_printk_skb: 35 callbacks suppressed Feb 9 19:23:44.841692 kernel: audit: type=1334 audit(1707506620.206:79): prog-id=9 op=UNLOAD Feb 9 19:23:44.841732 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:23:44.841766 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:23:44.841790 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:23:44.841817 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:23:44.841839 kernel: SELinux: policy capability open_perms=1 Feb 9 19:23:44.841867 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:23:44.841911 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:23:44.841940 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:23:44.841962 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:23:44.841983 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:23:44.842004 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:23:44.842024 kernel: audit: type=1403 audit(1707506620.496:80): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:23:44.842051 systemd[1]: Successfully loaded SELinux policy in 121.962ms. Feb 9 19:23:44.842089 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.580ms. Feb 9 19:23:44.842118 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:23:44.842142 systemd[1]: Detected virtualization kvm. Feb 9 19:23:44.842158 systemd[1]: Detected architecture x86-64. Feb 9 19:23:44.842180 systemd[1]: Detected first boot. Feb 9 19:23:44.842203 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:23:44.842227 kernel: audit: type=1400 audit(1707506620.650:81): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:23:44.842263 kernel: audit: type=1400 audit(1707506620.650:82): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:23:44.842287 kernel: audit: type=1334 audit(1707506620.670:83): prog-id=10 op=LOAD Feb 9 19:23:44.842309 kernel: audit: type=1334 audit(1707506620.670:84): prog-id=10 op=UNLOAD Feb 9 19:23:44.842335 kernel: audit: type=1334 audit(1707506620.691:85): prog-id=11 op=LOAD Feb 9 19:23:44.842349 kernel: audit: type=1334 audit(1707506620.691:86): prog-id=11 op=UNLOAD Feb 9 19:23:44.842364 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:23:44.842379 kernel: audit: type=1400 audit(1707506620.876:87): avc: denied { associate } for pid=899 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:23:44.842394 kernel: audit: type=1300 audit(1707506620.876:87): arch=c000003e syscall=188 success=yes exit=0 a0=c0001858e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:23:44.842409 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:23:44.842426 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:23:44.842447 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:23:44.842463 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:23:44.842479 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:23:44.842493 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:23:44.842508 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:23:44.842523 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:23:44.842548 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:23:44.842573 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 19:23:44.842600 systemd[1]: Created slice system-getty.slice. Feb 9 19:23:44.842623 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:23:44.842647 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:23:44.842670 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:23:44.842689 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:23:44.842704 systemd[1]: Created slice user.slice. Feb 9 19:23:44.842723 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:23:44.842737 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:23:44.842753 systemd[1]: Set up automount boot.automount. Feb 9 19:23:44.842771 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:23:44.842786 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:23:44.842801 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:23:44.842816 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:23:44.842831 systemd[1]: Reached target integritysetup.target. Feb 9 19:23:44.842846 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:23:44.842868 systemd[1]: Reached target remote-fs.target. Feb 9 19:23:44.842882 systemd[1]: Reached target slices.target. Feb 9 19:23:44.842924 systemd[1]: Reached target swap.target. Feb 9 19:23:44.842948 systemd[1]: Reached target torcx.target. Feb 9 19:23:44.842964 systemd[1]: Reached target veritysetup.target. Feb 9 19:23:44.842979 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:23:44.842995 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:23:44.843011 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:23:44.843026 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:23:44.843040 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:23:44.843062 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:23:44.843084 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:23:44.843108 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:23:44.843130 systemd[1]: Mounting media.mount... Feb 9 19:23:44.843154 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:23:44.843177 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:23:44.843206 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:23:44.843227 systemd[1]: Mounting tmp.mount... Feb 9 19:23:44.843257 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:23:44.843285 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:23:44.843306 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:23:44.843330 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:23:44.843351 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:23:44.843380 systemd[1]: Starting modprobe@drm.service... Feb 9 19:23:44.843404 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:23:44.843428 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:23:44.843451 systemd[1]: Starting modprobe@loop.service... Feb 9 19:23:44.843476 kernel: fuse: init (API version 7.34) Feb 9 19:23:44.843503 kernel: loop: module loaded Feb 9 19:23:44.843526 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:23:44.843550 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:23:44.843571 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:23:44.843596 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:23:44.843633 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:23:44.843660 systemd[1]: Stopped systemd-journald.service. Feb 9 19:23:44.843684 systemd[1]: Starting systemd-journald.service... Feb 9 19:23:44.843707 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:23:44.843730 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:23:44.843759 systemd-journald[990]: Journal started Feb 9 19:23:44.843843 systemd-journald[990]: Runtime Journal (/run/log/journal/f585396ba38c09cc4682bd7ae571cebf) is 8.0M, max 148.8M, 140.8M free. Feb 9 19:23:40.496000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:23:40.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:23:40.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:23:40.670000 audit: BPF prog-id=10 op=LOAD Feb 9 19:23:40.670000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:23:40.691000 audit: BPF prog-id=11 op=LOAD Feb 9 19:23:40.691000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:23:40.876000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:23:40.876000 audit[899]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:23:40.876000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:23:40.887000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:23:40.887000 audit[899]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859b9 a2=1ed a3=0 items=2 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:23:40.887000 audit: CWD cwd="/" Feb 9 19:23:40.887000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:40.887000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:40.887000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:23:44.039000 audit: BPF prog-id=12 op=LOAD Feb 9 19:23:44.039000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:23:44.039000 audit: BPF prog-id=13 op=LOAD Feb 9 19:23:44.039000 audit: BPF prog-id=14 op=LOAD Feb 9 19:23:44.039000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:23:44.039000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:23:44.040000 audit: BPF prog-id=15 op=LOAD Feb 9 19:23:44.040000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:23:44.040000 audit: BPF prog-id=16 op=LOAD Feb 9 19:23:44.040000 audit: BPF prog-id=17 op=LOAD Feb 9 19:23:44.040000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:23:44.040000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:23:44.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:44.055000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:23:44.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:44.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:44.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:44.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:44.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:44.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:44.798000 audit: BPF prog-id=18 op=LOAD Feb 9 19:23:44.798000 audit: BPF prog-id=19 op=LOAD Feb 9 19:23:44.798000 audit: BPF prog-id=20 op=LOAD Feb 9 19:23:44.798000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:23:44.798000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:23:44.830000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:23:44.830000 audit[990]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fff15bc46d0 a2=4000 a3=7fff15bc476c items=0 ppid=1 pid=990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:23:44.830000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:23:40.874501 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:23:44.038794 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:23:40.876075 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:23:44.043412 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:23:40.876102 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:23:40.876141 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:23:40.876153 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:23:40.876200 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:23:40.876216 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:23:40.876434 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:23:40.876485 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:23:40.876501 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:23:40.877637 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:23:40.877689 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:23:40.877713 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:23:40.877731 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:23:40.877750 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:23:40.877767 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:23:43.432304 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:43Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:23:43.432601 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:43Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:23:43.432729 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:43Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:23:43.432993 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:43Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:23:43.433056 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:43Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:23:43.433126 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:23:43Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:23:44.856935 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:23:44.871928 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:23:44.885911 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:23:44.891956 systemd[1]: Stopped verity-setup.service. Feb 9 19:23:44.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:44.912095 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:23:44.920924 systemd[1]: Started systemd-journald.service. Feb 9 19:23:44.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:44.930282 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:23:44.937216 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:23:44.944247 systemd[1]: Mounted media.mount. Feb 9 19:23:44.951221 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:23:44.960178 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:23:44.969160 systemd[1]: Mounted tmp.mount. Feb 9 19:23:44.976247 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:23:44.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:44.985326 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:23:44.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:44.994322 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:23:44.994522 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:23:45.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.003387 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:23:45.003594 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:23:45.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.012356 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:23:45.012554 systemd[1]: Finished modprobe@drm.service. Feb 9 19:23:45.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.021325 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:23:45.021523 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:23:45.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.030362 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:23:45.030557 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:23:45.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.039326 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:23:45.039519 systemd[1]: Finished modprobe@loop.service. Feb 9 19:23:45.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.048337 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:23:45.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.057291 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:23:45.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.066282 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:23:45.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.075296 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:23:45.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.084662 systemd[1]: Reached target network-pre.target. Feb 9 19:23:45.095379 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:23:45.105281 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:23:45.111999 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:23:45.114513 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:23:45.123516 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:23:45.130478 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:23:45.132044 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:23:45.139053 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:23:45.140660 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:23:45.147272 systemd-journald[990]: Time spent on flushing to /var/log/journal/f585396ba38c09cc4682bd7ae571cebf is 79.741ms for 1189 entries. Feb 9 19:23:45.147272 systemd-journald[990]: System Journal (/var/log/journal/f585396ba38c09cc4682bd7ae571cebf) is 8.0M, max 584.8M, 576.8M free. Feb 9 19:23:45.268723 systemd-journald[990]: Received client request to flush runtime journal. Feb 9 19:23:45.268812 kernel: kauditd_printk_skb: 56 callbacks suppressed Feb 9 19:23:45.268849 kernel: audit: type=1130 audit(1707506625.221:136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.156864 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:23:45.165460 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:23:45.175294 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:23:45.269562 udevadm[1004]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 19:23:45.184148 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:23:45.193347 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:23:45.205562 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:23:45.214677 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:23:45.261763 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:23:45.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.271534 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:23:45.296354 kernel: audit: type=1130 audit(1707506625.269:137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.303963 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:23:45.325312 kernel: audit: type=1130 audit(1707506625.300:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.384033 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:23:45.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.415937 kernel: audit: type=1130 audit(1707506625.390:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.890349 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:23:45.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.919000 audit: BPF prog-id=21 op=LOAD Feb 9 19:23:45.922608 systemd[1]: Starting systemd-udevd.service... Feb 9 19:23:45.928839 kernel: audit: type=1130 audit(1707506625.897:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:45.928975 kernel: audit: type=1334 audit(1707506625.919:141): prog-id=21 op=LOAD Feb 9 19:23:45.929011 kernel: audit: type=1334 audit(1707506625.919:142): prog-id=22 op=LOAD Feb 9 19:23:45.929041 kernel: audit: type=1334 audit(1707506625.919:143): prog-id=7 op=UNLOAD Feb 9 19:23:45.929088 kernel: audit: type=1334 audit(1707506625.919:144): prog-id=8 op=UNLOAD Feb 9 19:23:45.919000 audit: BPF prog-id=22 op=LOAD Feb 9 19:23:45.919000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:23:45.919000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:23:45.968260 systemd-udevd[1011]: Using default interface naming scheme 'v252'. Feb 9 19:23:46.020197 systemd[1]: Started systemd-udevd.service. Feb 9 19:23:46.056989 kernel: audit: type=1130 audit(1707506626.027:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:46.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:46.032879 systemd[1]: Starting systemd-networkd.service... Feb 9 19:23:46.069725 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:23:46.029000 audit: BPF prog-id=23 op=LOAD Feb 9 19:23:46.066000 audit: BPF prog-id=24 op=LOAD Feb 9 19:23:46.066000 audit: BPF prog-id=25 op=LOAD Feb 9 19:23:46.066000 audit: BPF prog-id=26 op=LOAD Feb 9 19:23:46.096221 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:23:46.144815 systemd[1]: Started systemd-userdbd.service. Feb 9 19:23:46.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:46.196917 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 19:23:46.276153 systemd-networkd[1022]: lo: Link UP Feb 9 19:23:46.276167 systemd-networkd[1022]: lo: Gained carrier Feb 9 19:23:46.277496 systemd-networkd[1022]: Enumeration completed Feb 9 19:23:46.277752 systemd[1]: Started systemd-networkd.service. Feb 9 19:23:46.277802 systemd-networkd[1022]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:23:46.279803 systemd-networkd[1022]: eth0: Link UP Feb 9 19:23:46.279821 systemd-networkd[1022]: eth0: Gained carrier Feb 9 19:23:46.295001 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1017) Feb 9 19:23:46.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:46.306113 systemd-networkd[1022]: eth0: DHCPv4 address 10.128.0.29/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 9 19:23:46.324000 audit[1041]: AVC avc: denied { confidentiality } for pid=1041 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:23:46.332681 kernel: ACPI: button: Power Button [PWRF] Feb 9 19:23:46.324000 audit[1041]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5622a2d7cb30 a1=32194 a2=7f736ef20bc5 a3=5 items=108 ppid=1011 pid=1041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:23:46.324000 audit: CWD cwd="/" Feb 9 19:23:46.324000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=1 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=2 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=3 name=(null) inode=13738 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=4 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=5 name=(null) inode=13739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=6 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=7 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=8 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=9 name=(null) inode=13741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=10 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=11 name=(null) inode=13742 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=12 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=13 name=(null) inode=13743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=14 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=15 name=(null) inode=13744 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=16 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=17 name=(null) inode=13745 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=18 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=19 name=(null) inode=13746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=20 name=(null) inode=13746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=21 name=(null) inode=13747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=22 name=(null) inode=13746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=23 name=(null) inode=13748 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=24 name=(null) inode=13746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=25 name=(null) inode=13749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=26 name=(null) inode=13746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=27 name=(null) inode=13750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=28 name=(null) inode=13746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=29 name=(null) inode=13751 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=30 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=31 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=32 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=33 name=(null) inode=13753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=34 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=35 name=(null) inode=13754 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=36 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=37 name=(null) inode=13755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=38 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=39 name=(null) inode=13756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=40 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=41 name=(null) inode=13757 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=42 name=(null) inode=13737 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=43 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=44 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=45 name=(null) inode=13759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=46 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=47 name=(null) inode=13760 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=48 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=49 name=(null) inode=13761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=50 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=51 name=(null) inode=13762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=52 name=(null) inode=13758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=53 name=(null) inode=13763 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=55 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=56 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=57 name=(null) inode=13765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=58 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=59 name=(null) inode=13766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=60 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=61 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=62 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=63 name=(null) inode=13768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=64 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=65 name=(null) inode=13769 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=66 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=67 name=(null) inode=13770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.343977 kernel: EDAC MC: Ver: 3.0.0 Feb 9 19:23:46.324000 audit: PATH item=68 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=69 name=(null) inode=13771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=70 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=71 name=(null) inode=13772 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=72 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=73 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=74 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=75 name=(null) inode=13774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=76 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=77 name=(null) inode=13775 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=78 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=79 name=(null) inode=13776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=80 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=81 name=(null) inode=13777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=82 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=83 name=(null) inode=13778 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=84 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=85 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=86 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=87 name=(null) inode=13780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=88 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=89 name=(null) inode=13781 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=90 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=91 name=(null) inode=13782 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=92 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=93 name=(null) inode=13783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=94 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=95 name=(null) inode=13784 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=96 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=97 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=98 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=99 name=(null) inode=13786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=100 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=101 name=(null) inode=13787 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=102 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=103 name=(null) inode=13788 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=104 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=105 name=(null) inode=13789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=106 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PATH item=107 name=(null) inode=13790 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:23:46.324000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:23:46.364913 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 9 19:23:46.374956 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Feb 9 19:23:46.389937 kernel: ACPI: button: Sleep Button [SLPF] Feb 9 19:23:46.413917 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Feb 9 19:23:46.422014 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:23:46.421127 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:23:46.438376 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:23:46.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:46.448501 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:23:46.478859 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:23:46.512217 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:23:46.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:46.522190 systemd[1]: Reached target cryptsetup.target. Feb 9 19:23:46.532439 systemd[1]: Starting lvm2-activation.service... Feb 9 19:23:46.538542 lvm[1049]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:23:46.564092 systemd[1]: Finished lvm2-activation.service. Feb 9 19:23:46.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:46.572181 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:23:46.580992 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:23:46.581042 systemd[1]: Reached target local-fs.target. Feb 9 19:23:46.588992 systemd[1]: Reached target machines.target. Feb 9 19:23:46.598470 systemd[1]: Starting ldconfig.service... Feb 9 19:23:46.605988 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:23:46.606076 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:23:46.607768 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:23:46.616506 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:23:46.627659 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:23:46.628123 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:23:46.628233 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:23:46.630001 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:23:46.631074 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1051 (bootctl) Feb 9 19:23:46.639160 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:23:46.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:46.657180 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:23:46.661681 systemd-tmpfiles[1055]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:23:46.666098 systemd-tmpfiles[1055]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:23:46.669926 systemd-tmpfiles[1055]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:23:46.783503 systemd-fsck[1059]: fsck.fat 4.2 (2021-01-31) Feb 9 19:23:46.783503 systemd-fsck[1059]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 19:23:46.789328 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:23:46.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:46.801011 systemd[1]: Mounting boot.mount... Feb 9 19:23:46.831799 systemd[1]: Mounted boot.mount. Feb 9 19:23:46.856212 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:23:46.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:46.952671 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:23:46.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:46.963773 systemd[1]: Starting audit-rules.service... Feb 9 19:23:46.972293 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:23:46.982609 systemd[1]: Starting oem-gce-enable-oslogin.service... Feb 9 19:23:46.992677 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:23:47.000000 audit: BPF prog-id=27 op=LOAD Feb 9 19:23:47.003437 systemd[1]: Starting systemd-resolved.service... Feb 9 19:23:47.009000 audit: BPF prog-id=28 op=LOAD Feb 9 19:23:47.012620 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:23:47.021781 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:23:47.030694 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:23:47.034000 audit[1084]: SYSTEM_BOOT pid=1084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:23:47.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:47.040093 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Feb 9 19:23:47.040329 systemd[1]: Finished oem-gce-enable-oslogin.service. Feb 9 19:23:47.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:47.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:23:47.054729 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:23:47.076941 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:23:47.078000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:23:47.078000 audit[1093]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd4b510340 a2=420 a3=0 items=0 ppid=1062 pid=1093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:23:47.078000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:23:47.080568 augenrules[1093]: No rules Feb 9 19:23:47.085823 systemd[1]: Finished audit-rules.service. Feb 9 19:23:47.102377 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:23:47.206818 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:23:47.209328 systemd-resolved[1074]: Positive Trust Anchors: Feb 9 19:23:47.209350 systemd-resolved[1074]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:23:47.209401 systemd-resolved[1074]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:23:47.210085 systemd-timesyncd[1078]: Contacted time server 169.254.169.254:123 (169.254.169.254). Feb 9 19:23:47.210158 systemd-timesyncd[1078]: Initial clock synchronization to Fri 2024-02-09 19:23:47.384027 UTC. Feb 9 19:23:47.215344 systemd[1]: Reached target time-set.target. Feb 9 19:23:47.248319 systemd-resolved[1074]: Defaulting to hostname 'linux'. Feb 9 19:23:47.252282 systemd[1]: Started systemd-resolved.service. Feb 9 19:23:47.261083 systemd[1]: Reached target network.target. Feb 9 19:23:47.269016 systemd[1]: Reached target nss-lookup.target. Feb 9 19:23:47.459799 ldconfig[1050]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:23:47.742084 systemd-networkd[1022]: eth0: Gained IPv6LL Feb 9 19:23:47.752192 systemd[1]: Finished ldconfig.service. Feb 9 19:23:47.760711 systemd[1]: Starting systemd-update-done.service... Feb 9 19:23:47.770220 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:23:47.771487 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:23:47.780275 systemd[1]: Finished systemd-update-done.service. Feb 9 19:23:47.789137 systemd[1]: Reached target sysinit.target. Feb 9 19:23:47.797113 systemd[1]: Started motdgen.path. Feb 9 19:23:47.804033 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:23:47.814193 systemd[1]: Started logrotate.timer. Feb 9 19:23:47.821087 systemd[1]: Started mdadm.timer. Feb 9 19:23:47.827991 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:23:47.836024 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:23:47.836084 systemd[1]: Reached target paths.target. Feb 9 19:23:47.843020 systemd[1]: Reached target timers.target. Feb 9 19:23:47.850597 systemd[1]: Listening on dbus.socket. Feb 9 19:23:47.859371 systemd[1]: Starting docker.socket... Feb 9 19:23:47.869673 systemd[1]: Listening on sshd.socket. Feb 9 19:23:47.877140 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:23:47.877812 systemd[1]: Listening on docker.socket. Feb 9 19:23:47.885114 systemd[1]: Reached target sockets.target. Feb 9 19:23:47.892978 systemd[1]: Reached target basic.target. Feb 9 19:23:47.900031 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:23:47.900075 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:23:47.901505 systemd[1]: Starting containerd.service... Feb 9 19:23:47.909248 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 19:23:47.919532 systemd[1]: Starting dbus.service... Feb 9 19:23:47.926756 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:23:47.935292 systemd[1]: Starting extend-filesystems.service... Feb 9 19:23:47.941228 jq[1110]: false Feb 9 19:23:47.943409 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:23:47.945111 systemd[1]: Starting motdgen.service... Feb 9 19:23:47.954018 systemd[1]: Starting oem-gce.service... Feb 9 19:23:47.962547 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:23:47.971575 systemd[1]: Starting prepare-critools.service... Feb 9 19:23:47.981410 systemd[1]: Starting prepare-helm.service... Feb 9 19:23:47.991615 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:23:48.007739 extend-filesystems[1111]: Found sda Feb 9 19:23:48.007739 extend-filesystems[1111]: Found sda1 Feb 9 19:23:48.007739 extend-filesystems[1111]: Found sda2 Feb 9 19:23:48.007739 extend-filesystems[1111]: Found sda3 Feb 9 19:23:48.007739 extend-filesystems[1111]: Found usr Feb 9 19:23:48.007739 extend-filesystems[1111]: Found sda4 Feb 9 19:23:48.007739 extend-filesystems[1111]: Found sda6 Feb 9 19:23:48.007739 extend-filesystems[1111]: Found sda7 Feb 9 19:23:48.007739 extend-filesystems[1111]: Found sda9 Feb 9 19:23:48.007739 extend-filesystems[1111]: Checking size of /dev/sda9 Feb 9 19:23:48.171759 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Feb 9 19:23:48.000705 systemd[1]: Starting sshd-keygen.service... Feb 9 19:23:48.172281 extend-filesystems[1111]: Resized partition /dev/sda9 Feb 9 19:23:48.012121 systemd[1]: Starting systemd-logind.service... Feb 9 19:23:48.181507 extend-filesystems[1154]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:23:48.019073 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:23:48.189639 dbus-daemon[1109]: [system] SELinux support is enabled Feb 9 19:23:48.019187 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Feb 9 19:23:48.019946 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:23:48.191268 jq[1135]: true Feb 9 19:23:48.021145 systemd[1]: Starting update-engine.service... Feb 9 19:23:48.030170 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:23:48.192132 tar[1139]: ./ Feb 9 19:23:48.192132 tar[1139]: ./macvlan Feb 9 19:23:48.042425 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:23:48.042742 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:23:48.193094 tar[1141]: linux-amd64/helm Feb 9 19:23:48.043431 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:23:48.043695 systemd[1]: Finished motdgen.service. Feb 9 19:23:48.193742 jq[1145]: true Feb 9 19:23:48.056669 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:23:48.057032 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:23:48.194476 mkfs.ext4[1147]: mke2fs 1.46.5 (30-Dec-2021) Feb 9 19:23:48.194476 mkfs.ext4[1147]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Feb 9 19:23:48.194476 mkfs.ext4[1147]: Creating filesystem with 262144 4k blocks and 65536 inodes Feb 9 19:23:48.194476 mkfs.ext4[1147]: Filesystem UUID: 138c330c-b665-4dab-acba-f5b6f35b1ef3 Feb 9 19:23:48.194476 mkfs.ext4[1147]: Superblock backups stored on blocks: Feb 9 19:23:48.194476 mkfs.ext4[1147]: 32768, 98304, 163840, 229376 Feb 9 19:23:48.194476 mkfs.ext4[1147]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:23:48.194476 mkfs.ext4[1147]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:23:48.194476 mkfs.ext4[1147]: Creating journal (8192 blocks): done Feb 9 19:23:48.194476 mkfs.ext4[1147]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:23:48.077780 systemd[1]: Created slice system-sshd.slice. Feb 9 19:23:48.195420 tar[1140]: crictl Feb 9 19:23:48.189861 systemd[1]: Started dbus.service. Feb 9 19:23:48.201858 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:23:48.203892 umount[1157]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Feb 9 19:23:48.204138 kernel: loop0: detected capacity change from 0 to 2097152 Feb 9 19:23:48.201899 systemd[1]: Reached target system-config.target. Feb 9 19:23:48.212960 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:23:48.213016 systemd[1]: Reached target user-config.target. Feb 9 19:23:48.220077 dbus-daemon[1109]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1022 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 9 19:23:48.245207 dbus-daemon[1109]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 19:23:48.251055 systemd[1]: Starting systemd-hostnamed.service... Feb 9 19:23:48.266701 update_engine[1134]: I0209 19:23:48.266640 1134 main.cc:92] Flatcar Update Engine starting Feb 9 19:23:48.276928 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Feb 9 19:23:48.277112 systemd[1]: Started update-engine.service. Feb 9 19:23:48.301341 update_engine[1134]: I0209 19:23:48.277396 1134 update_check_scheduler.cc:74] Next update check in 3m55s Feb 9 19:23:48.289737 systemd[1]: Started locksmithd.service. Feb 9 19:23:48.310798 bash[1178]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:23:48.310575 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:23:48.322019 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:23:48.322121 extend-filesystems[1154]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 19:23:48.322121 extend-filesystems[1154]: old_desc_blocks = 1, new_desc_blocks = 2 Feb 9 19:23:48.322121 extend-filesystems[1154]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Feb 9 19:23:48.391200 extend-filesystems[1111]: Resized filesystem in /dev/sda9 Feb 9 19:23:48.330867 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:23:48.331113 systemd[1]: Finished extend-filesystems.service. Feb 9 19:23:48.426500 coreos-metadata[1108]: Feb 09 19:23:48.426 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Feb 9 19:23:48.428577 env[1146]: time="2024-02-09T19:23:48.428517843Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:23:48.442225 coreos-metadata[1108]: Feb 09 19:23:48.442 INFO Fetch failed with 404: resource not found Feb 9 19:23:48.442514 coreos-metadata[1108]: Feb 09 19:23:48.442 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Feb 9 19:23:48.450570 coreos-metadata[1108]: Feb 09 19:23:48.450 INFO Fetch successful Feb 9 19:23:48.450711 coreos-metadata[1108]: Feb 09 19:23:48.450 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Feb 9 19:23:48.451709 coreos-metadata[1108]: Feb 09 19:23:48.451 INFO Fetch failed with 404: resource not found Feb 9 19:23:48.452002 coreos-metadata[1108]: Feb 09 19:23:48.451 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Feb 9 19:23:48.453134 coreos-metadata[1108]: Feb 09 19:23:48.453 INFO Fetch failed with 404: resource not found Feb 9 19:23:48.453342 coreos-metadata[1108]: Feb 09 19:23:48.453 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Feb 9 19:23:48.454682 coreos-metadata[1108]: Feb 09 19:23:48.454 INFO Fetch successful Feb 9 19:23:48.456976 unknown[1108]: wrote ssh authorized keys file for user: core Feb 9 19:23:48.500599 update-ssh-keys[1188]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:23:48.502451 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 19:23:48.515842 systemd-logind[1130]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 19:23:48.535974 systemd-logind[1130]: Watching system buttons on /dev/input/event3 (Sleep Button) Feb 9 19:23:48.537017 systemd-logind[1130]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:23:48.540927 systemd-logind[1130]: New seat seat0. Feb 9 19:23:48.560865 systemd[1]: Started systemd-logind.service. Feb 9 19:23:48.598328 env[1146]: time="2024-02-09T19:23:48.598272009Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:23:48.603833 tar[1139]: ./static Feb 9 19:23:48.606649 env[1146]: time="2024-02-09T19:23:48.606609278Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:23:48.613344 dbus-daemon[1109]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 9 19:23:48.613888 dbus-daemon[1109]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1177 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 9 19:23:48.613586 systemd[1]: Started systemd-hostnamed.service. Feb 9 19:23:48.614478 env[1146]: time="2024-02-09T19:23:48.614425170Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:23:48.614478 env[1146]: time="2024-02-09T19:23:48.614464983Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:23:48.614841 env[1146]: time="2024-02-09T19:23:48.614791433Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:23:48.614841 env[1146]: time="2024-02-09T19:23:48.614823259Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:23:48.614997 env[1146]: time="2024-02-09T19:23:48.614845325Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:23:48.614997 env[1146]: time="2024-02-09T19:23:48.614863618Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:23:48.615118 env[1146]: time="2024-02-09T19:23:48.615018391Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:23:48.615496 env[1146]: time="2024-02-09T19:23:48.615450754Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:23:48.615730 env[1146]: time="2024-02-09T19:23:48.615685263Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:23:48.615730 env[1146]: time="2024-02-09T19:23:48.615714594Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:23:48.615852 env[1146]: time="2024-02-09T19:23:48.615798605Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:23:48.615852 env[1146]: time="2024-02-09T19:23:48.615818597Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:23:48.630430 systemd[1]: Starting polkit.service... Feb 9 19:23:48.660199 env[1146]: time="2024-02-09T19:23:48.660135223Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:23:48.660351 env[1146]: time="2024-02-09T19:23:48.660208415Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:23:48.660351 env[1146]: time="2024-02-09T19:23:48.660230819Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:23:48.660351 env[1146]: time="2024-02-09T19:23:48.660324586Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:23:48.660505 env[1146]: time="2024-02-09T19:23:48.660427728Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:23:48.660505 env[1146]: time="2024-02-09T19:23:48.660473981Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:23:48.660604 env[1146]: time="2024-02-09T19:23:48.660507525Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:23:48.660604 env[1146]: time="2024-02-09T19:23:48.660559482Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:23:48.660604 env[1146]: time="2024-02-09T19:23:48.660587151Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:23:48.660752 env[1146]: time="2024-02-09T19:23:48.660628353Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:23:48.660752 env[1146]: time="2024-02-09T19:23:48.660654412Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:23:48.660752 env[1146]: time="2024-02-09T19:23:48.660676853Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:23:48.660947 env[1146]: time="2024-02-09T19:23:48.660919825Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:23:48.661126 env[1146]: time="2024-02-09T19:23:48.661100516Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:23:48.661745 env[1146]: time="2024-02-09T19:23:48.661705125Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:23:48.661850 env[1146]: time="2024-02-09T19:23:48.661779870Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:23:48.661850 env[1146]: time="2024-02-09T19:23:48.661820114Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:23:48.661975 env[1146]: time="2024-02-09T19:23:48.661939557Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:23:48.661975 env[1146]: time="2024-02-09T19:23:48.661966826Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:23:48.662118 env[1146]: time="2024-02-09T19:23:48.662092978Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:23:48.662178 env[1146]: time="2024-02-09T19:23:48.662123886Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:23:48.662178 env[1146]: time="2024-02-09T19:23:48.662146309Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:23:48.662270 env[1146]: time="2024-02-09T19:23:48.662188973Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:23:48.662270 env[1146]: time="2024-02-09T19:23:48.662211002Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:23:48.662270 env[1146]: time="2024-02-09T19:23:48.662231665Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:23:48.662501 env[1146]: time="2024-02-09T19:23:48.662275117Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:23:48.662564 env[1146]: time="2024-02-09T19:23:48.662542479Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:23:48.662618 env[1146]: time="2024-02-09T19:23:48.662571647Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:23:48.662675 env[1146]: time="2024-02-09T19:23:48.662613996Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:23:48.662675 env[1146]: time="2024-02-09T19:23:48.662635317Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:23:48.662772 env[1146]: time="2024-02-09T19:23:48.662663369Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:23:48.662772 env[1146]: time="2024-02-09T19:23:48.662703091Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:23:48.662772 env[1146]: time="2024-02-09T19:23:48.662739922Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:23:48.662931 env[1146]: time="2024-02-09T19:23:48.662812483Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:23:48.675364 env[1146]: time="2024-02-09T19:23:48.675236076Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:23:48.682329 env[1146]: time="2024-02-09T19:23:48.675383322Z" level=info msg="Connect containerd service" Feb 9 19:23:48.682329 env[1146]: time="2024-02-09T19:23:48.675457498Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:23:48.698317 env[1146]: time="2024-02-09T19:23:48.698254083Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:23:48.698487 env[1146]: time="2024-02-09T19:23:48.698443410Z" level=info msg="Start subscribing containerd event" Feb 9 19:23:48.698560 env[1146]: time="2024-02-09T19:23:48.698524087Z" level=info msg="Start recovering state" Feb 9 19:23:48.698641 env[1146]: time="2024-02-09T19:23:48.698617472Z" level=info msg="Start event monitor" Feb 9 19:23:48.698699 env[1146]: time="2024-02-09T19:23:48.698659529Z" level=info msg="Start snapshots syncer" Feb 9 19:23:48.698699 env[1146]: time="2024-02-09T19:23:48.698678333Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:23:48.698699 env[1146]: time="2024-02-09T19:23:48.698692841Z" level=info msg="Start streaming server" Feb 9 19:23:48.723843 env[1146]: time="2024-02-09T19:23:48.723254157Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:23:48.723843 env[1146]: time="2024-02-09T19:23:48.723400186Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:23:48.723666 systemd[1]: Started containerd.service. Feb 9 19:23:48.724178 env[1146]: time="2024-02-09T19:23:48.723992096Z" level=info msg="containerd successfully booted in 0.350380s" Feb 9 19:23:48.751416 polkitd[1191]: Started polkitd version 121 Feb 9 19:23:48.783866 polkitd[1191]: Loading rules from directory /etc/polkit-1/rules.d Feb 9 19:23:48.784177 polkitd[1191]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 9 19:23:48.786311 polkitd[1191]: Finished loading, compiling and executing 2 rules Feb 9 19:23:48.787065 dbus-daemon[1109]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 9 19:23:48.787291 systemd[1]: Started polkit.service. Feb 9 19:23:48.787844 polkitd[1191]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 9 19:23:48.821245 systemd-hostnamed[1177]: Hostname set to (transient) Feb 9 19:23:48.823159 tar[1139]: ./vlan Feb 9 19:23:48.824786 systemd-resolved[1074]: System hostname changed to 'ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal'. Feb 9 19:23:48.932664 tar[1139]: ./portmap Feb 9 19:23:49.043287 tar[1139]: ./host-local Feb 9 19:23:49.134139 tar[1139]: ./vrf Feb 9 19:23:49.254032 tar[1139]: ./bridge Feb 9 19:23:49.375742 tar[1139]: ./tuning Feb 9 19:23:49.473840 tar[1139]: ./firewall Feb 9 19:23:49.606029 tar[1139]: ./host-device Feb 9 19:23:49.719855 tar[1139]: ./sbr Feb 9 19:23:49.821230 tar[1139]: ./loopback Feb 9 19:23:49.914279 tar[1139]: ./dhcp Feb 9 19:23:50.108017 tar[1141]: linux-amd64/LICENSE Feb 9 19:23:50.110075 tar[1141]: linux-amd64/README.md Feb 9 19:23:50.122257 systemd[1]: Finished prepare-helm.service. Feb 9 19:23:50.210457 tar[1139]: ./ptp Feb 9 19:23:50.326300 tar[1139]: ./ipvlan Feb 9 19:23:50.430980 tar[1139]: ./bandwidth Feb 9 19:23:50.458449 systemd[1]: Finished prepare-critools.service. Feb 9 19:23:50.544979 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:23:51.067428 sshd_keygen[1149]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:23:51.115256 systemd[1]: Finished sshd-keygen.service. Feb 9 19:23:51.125344 systemd[1]: Starting issuegen.service... Feb 9 19:23:51.133887 systemd[1]: Started sshd@0-10.128.0.29:22-147.75.109.163:52860.service. Feb 9 19:23:51.145191 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:23:51.145468 systemd[1]: Finished issuegen.service. Feb 9 19:23:51.155546 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:23:51.167721 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:23:51.178432 systemd[1]: Started getty@tty1.service. Feb 9 19:23:51.189288 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:23:51.199882 systemd[1]: Reached target getty.target. Feb 9 19:23:51.287502 locksmithd[1179]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:23:51.473965 sshd[1214]: Accepted publickey for core from 147.75.109.163 port 52860 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:23:51.477400 sshd[1214]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:23:51.495178 systemd[1]: Created slice user-500.slice. Feb 9 19:23:51.503955 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:23:51.515689 systemd-logind[1130]: New session 1 of user core. Feb 9 19:23:51.523459 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:23:51.534466 systemd[1]: Starting user@500.service... Feb 9 19:23:51.559451 (systemd)[1224]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:23:51.731374 systemd[1224]: Queued start job for default target default.target. Feb 9 19:23:51.733115 systemd[1224]: Reached target paths.target. Feb 9 19:23:51.733149 systemd[1224]: Reached target sockets.target. Feb 9 19:23:51.733171 systemd[1224]: Reached target timers.target. Feb 9 19:23:51.733199 systemd[1224]: Reached target basic.target. Feb 9 19:23:51.733270 systemd[1224]: Reached target default.target. Feb 9 19:23:51.733323 systemd[1224]: Startup finished in 162ms. Feb 9 19:23:51.733366 systemd[1]: Started user@500.service. Feb 9 19:23:51.742507 systemd[1]: Started session-1.scope. Feb 9 19:23:51.978424 systemd[1]: Started sshd@1-10.128.0.29:22-147.75.109.163:52874.service. Feb 9 19:23:52.309576 sshd[1233]: Accepted publickey for core from 147.75.109.163 port 52874 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:23:52.311022 sshd[1233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:23:52.319564 systemd[1]: Started session-2.scope. Feb 9 19:23:52.320982 systemd-logind[1130]: New session 2 of user core. Feb 9 19:23:52.534779 sshd[1233]: pam_unix(sshd:session): session closed for user core Feb 9 19:23:52.538781 systemd[1]: sshd@1-10.128.0.29:22-147.75.109.163:52874.service: Deactivated successfully. Feb 9 19:23:52.539795 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:23:52.541081 systemd-logind[1130]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:23:52.542577 systemd-logind[1130]: Removed session 2. Feb 9 19:23:52.579130 systemd[1]: Started sshd@2-10.128.0.29:22-147.75.109.163:52886.service. Feb 9 19:23:52.887271 sshd[1239]: Accepted publickey for core from 147.75.109.163 port 52886 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:23:52.888669 sshd[1239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:23:52.896270 systemd[1]: Started session-3.scope. Feb 9 19:23:52.896935 systemd-logind[1130]: New session 3 of user core. Feb 9 19:23:53.108481 sshd[1239]: pam_unix(sshd:session): session closed for user core Feb 9 19:23:53.113344 systemd[1]: sshd@2-10.128.0.29:22-147.75.109.163:52886.service: Deactivated successfully. Feb 9 19:23:53.114480 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:23:53.117206 systemd-logind[1130]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:23:53.118954 systemd-logind[1130]: Removed session 3. Feb 9 19:23:54.294757 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Feb 9 19:23:56.297941 kernel: loop0: detected capacity change from 0 to 2097152 Feb 9 19:23:56.318219 systemd-nspawn[1245]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Feb 9 19:23:56.318219 systemd-nspawn[1245]: Press ^] three times within 1s to kill container. Feb 9 19:23:56.331919 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:23:56.418595 systemd[1]: Started oem-gce.service. Feb 9 19:23:56.419125 systemd[1]: Reached target multi-user.target. Feb 9 19:23:56.421367 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:23:56.431731 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:23:56.432007 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:23:56.432276 systemd[1]: Startup finished in 1.083s (kernel) + 9.537s (initrd) + 16.062s (userspace) = 26.684s. Feb 9 19:23:56.533207 systemd-nspawn[1245]: + '[' -e /etc/default/instance_configs.cfg.template ']' Feb 9 19:23:56.533207 systemd-nspawn[1245]: + echo -e '[InstanceSetup]\nset_host_keys = false' Feb 9 19:23:56.533443 systemd-nspawn[1245]: + /usr/bin/google_instance_setup Feb 9 19:23:57.164162 instance-setup[1251]: INFO Running google_set_multiqueue. Feb 9 19:23:57.179054 instance-setup[1251]: INFO Set channels for eth0 to 2. Feb 9 19:23:57.182678 instance-setup[1251]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Feb 9 19:23:57.184087 instance-setup[1251]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Feb 9 19:23:57.184511 instance-setup[1251]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Feb 9 19:23:57.186002 instance-setup[1251]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Feb 9 19:23:57.186342 instance-setup[1251]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Feb 9 19:23:57.187711 instance-setup[1251]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Feb 9 19:23:57.188162 instance-setup[1251]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Feb 9 19:23:57.189612 instance-setup[1251]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Feb 9 19:23:57.201717 instance-setup[1251]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Feb 9 19:23:57.202068 instance-setup[1251]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Feb 9 19:23:57.246693 systemd-nspawn[1245]: + /usr/bin/google_metadata_script_runner --script-type startup Feb 9 19:23:57.579881 startup-script[1282]: INFO Starting startup scripts. Feb 9 19:23:57.594536 startup-script[1282]: INFO No startup scripts found in metadata. Feb 9 19:23:57.594712 startup-script[1282]: INFO Finished running startup scripts. Feb 9 19:23:57.629450 systemd-nspawn[1245]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Feb 9 19:23:57.629450 systemd-nspawn[1245]: + daemon_pids=() Feb 9 19:23:57.630062 systemd-nspawn[1245]: + for d in accounts clock_skew network Feb 9 19:23:57.630562 systemd-nspawn[1245]: + daemon_pids+=($!) Feb 9 19:23:57.630672 systemd-nspawn[1245]: + /usr/bin/google_accounts_daemon Feb 9 19:23:57.630925 systemd-nspawn[1245]: + for d in accounts clock_skew network Feb 9 19:23:57.631227 systemd-nspawn[1245]: + daemon_pids+=($!) Feb 9 19:23:57.631329 systemd-nspawn[1245]: + for d in accounts clock_skew network Feb 9 19:23:57.631486 systemd-nspawn[1245]: + daemon_pids+=($!) Feb 9 19:23:57.631583 systemd-nspawn[1245]: + NOTIFY_SOCKET=/run/systemd/notify Feb 9 19:23:57.631583 systemd-nspawn[1245]: + /usr/bin/systemd-notify --ready Feb 9 19:23:57.632325 systemd-nspawn[1245]: + /usr/bin/google_network_daemon Feb 9 19:23:57.632820 systemd-nspawn[1245]: + /usr/bin/google_clock_skew_daemon Feb 9 19:23:57.706716 systemd-nspawn[1245]: + wait -n 36 37 38 Feb 9 19:23:58.219970 google-clock-skew[1286]: INFO Starting Google Clock Skew daemon. Feb 9 19:23:58.246478 google-clock-skew[1286]: INFO Clock drift token has changed: 0. Feb 9 19:23:58.259294 systemd-nspawn[1245]: hwclock: Cannot access the Hardware Clock via any known method. Feb 9 19:23:58.259649 systemd-nspawn[1245]: hwclock: Use the --verbose option to see the details of our search for an access method. Feb 9 19:23:58.260634 google-clock-skew[1286]: WARNING Failed to sync system time with hardware clock. Feb 9 19:23:58.282938 google-networking[1287]: INFO Starting Google Networking daemon. Feb 9 19:23:58.418794 groupadd[1297]: group added to /etc/group: name=google-sudoers, GID=1000 Feb 9 19:23:58.422937 groupadd[1297]: group added to /etc/gshadow: name=google-sudoers Feb 9 19:23:58.426941 groupadd[1297]: new group: name=google-sudoers, GID=1000 Feb 9 19:23:58.440426 google-accounts[1285]: INFO Starting Google Accounts daemon. Feb 9 19:23:58.466644 google-accounts[1285]: WARNING OS Login not installed. Feb 9 19:23:58.467730 google-accounts[1285]: INFO Creating a new user account for 0. Feb 9 19:23:58.473013 systemd-nspawn[1245]: useradd: invalid user name '0': use --badname to ignore Feb 9 19:23:58.473989 google-accounts[1285]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Feb 9 19:24:03.216749 systemd[1]: Started sshd@3-10.128.0.29:22-147.75.109.163:37030.service. Feb 9 19:24:03.501455 sshd[1308]: Accepted publickey for core from 147.75.109.163 port 37030 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:24:03.502343 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:24:03.507971 systemd-logind[1130]: New session 4 of user core. Feb 9 19:24:03.509259 systemd[1]: Started session-4.scope. Feb 9 19:24:03.713768 sshd[1308]: pam_unix(sshd:session): session closed for user core Feb 9 19:24:03.717916 systemd[1]: sshd@3-10.128.0.29:22-147.75.109.163:37030.service: Deactivated successfully. Feb 9 19:24:03.719055 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:24:03.719945 systemd-logind[1130]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:24:03.721232 systemd-logind[1130]: Removed session 4. Feb 9 19:24:03.760221 systemd[1]: Started sshd@4-10.128.0.29:22-147.75.109.163:37032.service. Feb 9 19:24:04.048842 sshd[1314]: Accepted publickey for core from 147.75.109.163 port 37032 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:24:04.050613 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:24:04.056773 systemd-logind[1130]: New session 5 of user core. Feb 9 19:24:04.057545 systemd[1]: Started session-5.scope. Feb 9 19:24:04.259230 sshd[1314]: pam_unix(sshd:session): session closed for user core Feb 9 19:24:04.263716 systemd[1]: sshd@4-10.128.0.29:22-147.75.109.163:37032.service: Deactivated successfully. Feb 9 19:24:04.264959 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:24:04.265854 systemd-logind[1130]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:24:04.267319 systemd-logind[1130]: Removed session 5. Feb 9 19:24:04.305358 systemd[1]: Started sshd@5-10.128.0.29:22-147.75.109.163:37048.service. Feb 9 19:24:04.590878 sshd[1321]: Accepted publickey for core from 147.75.109.163 port 37048 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:24:04.592972 sshd[1321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:24:04.599752 systemd[1]: Started session-6.scope. Feb 9 19:24:04.600379 systemd-logind[1130]: New session 6 of user core. Feb 9 19:24:04.806339 sshd[1321]: pam_unix(sshd:session): session closed for user core Feb 9 19:24:04.810902 systemd[1]: sshd@5-10.128.0.29:22-147.75.109.163:37048.service: Deactivated successfully. Feb 9 19:24:04.812124 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:24:04.813019 systemd-logind[1130]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:24:04.814558 systemd-logind[1130]: Removed session 6. Feb 9 19:24:04.852927 systemd[1]: Started sshd@6-10.128.0.29:22-147.75.109.163:40358.service. Feb 9 19:24:05.140884 sshd[1327]: Accepted publickey for core from 147.75.109.163 port 40358 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:24:05.142787 sshd[1327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:24:05.149753 systemd[1]: Started session-7.scope. Feb 9 19:24:05.150576 systemd-logind[1130]: New session 7 of user core. Feb 9 19:24:05.340049 sudo[1330]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:24:05.340473 sudo[1330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:24:05.350171 dbus-daemon[1109]: \xd0=\u0003[\xa4U: received setenforce notice (enforcing=1717079904) Feb 9 19:24:05.352414 sudo[1330]: pam_unix(sudo:session): session closed for user root Feb 9 19:24:05.397537 sshd[1327]: pam_unix(sshd:session): session closed for user core Feb 9 19:24:05.402461 systemd[1]: sshd@6-10.128.0.29:22-147.75.109.163:40358.service: Deactivated successfully. Feb 9 19:24:05.403746 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:24:05.404635 systemd-logind[1130]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:24:05.406361 systemd-logind[1130]: Removed session 7. Feb 9 19:24:05.443487 systemd[1]: Started sshd@7-10.128.0.29:22-147.75.109.163:40372.service. Feb 9 19:24:05.729027 sshd[1334]: Accepted publickey for core from 147.75.109.163 port 40372 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:24:05.730746 sshd[1334]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:24:05.737566 systemd[1]: Started session-8.scope. Feb 9 19:24:05.738371 systemd-logind[1130]: New session 8 of user core. Feb 9 19:24:05.906149 sudo[1338]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:24:05.906532 sudo[1338]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:24:05.910792 sudo[1338]: pam_unix(sudo:session): session closed for user root Feb 9 19:24:05.922975 sudo[1337]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:24:05.923355 sudo[1337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:24:05.935641 systemd[1]: Stopping audit-rules.service... Feb 9 19:24:05.936000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:24:05.942852 kernel: kauditd_printk_skb: 134 callbacks suppressed Feb 9 19:24:05.942968 kernel: audit: type=1305 audit(1707506645.936:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:24:05.943014 auditctl[1341]: No rules Feb 9 19:24:05.943800 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:24:05.944051 systemd[1]: Stopped audit-rules.service. Feb 9 19:24:05.936000 audit[1341]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffaeb14190 a2=420 a3=0 items=0 ppid=1 pid=1341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:05.959067 systemd[1]: Starting audit-rules.service... Feb 9 19:24:05.988475 kernel: audit: type=1300 audit(1707506645.936:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffaeb14190 a2=420 a3=0 items=0 ppid=1 pid=1341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:05.998947 kernel: audit: type=1327 audit(1707506645.936:167): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:24:05.936000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:24:05.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:06.024977 kernel: audit: type=1131 audit(1707506645.943:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:06.038802 augenrules[1358]: No rules Feb 9 19:24:06.039645 systemd[1]: Finished audit-rules.service. Feb 9 19:24:06.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:06.041911 sudo[1337]: pam_unix(sudo:session): session closed for user root Feb 9 19:24:06.063973 kernel: audit: type=1130 audit(1707506646.039:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:06.064127 kernel: audit: type=1106 audit(1707506646.041:170): pid=1337 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:24:06.041000 audit[1337]: USER_END pid=1337 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:24:06.041000 audit[1337]: CRED_DISP pid=1337 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:24:06.091156 sshd[1334]: pam_unix(sshd:session): session closed for user core Feb 9 19:24:06.096778 systemd[1]: sshd@7-10.128.0.29:22-147.75.109.163:40372.service: Deactivated successfully. Feb 9 19:24:06.097951 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:24:06.099764 systemd-logind[1130]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:24:06.101193 systemd-logind[1130]: Removed session 8. Feb 9 19:24:06.111347 kernel: audit: type=1104 audit(1707506646.041:171): pid=1337 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:24:06.111462 kernel: audit: type=1106 audit(1707506646.092:172): pid=1334 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:24:06.092000 audit[1334]: USER_END pid=1334 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:24:06.168823 kernel: audit: type=1104 audit(1707506646.092:173): pid=1334 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:24:06.092000 audit[1334]: CRED_DISP pid=1334 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:24:06.150406 systemd[1]: Started sshd@8-10.128.0.29:22-147.75.109.163:40388.service. Feb 9 19:24:06.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.29:22-147.75.109.163:40372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:06.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.29:22-147.75.109.163:40388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:06.195971 kernel: audit: type=1131 audit(1707506646.092:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.29:22-147.75.109.163:40372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:06.444000 audit[1364]: USER_ACCT pid=1364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:24:06.445860 sshd[1364]: Accepted publickey for core from 147.75.109.163 port 40388 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:24:06.446000 audit[1364]: CRED_ACQ pid=1364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:24:06.446000 audit[1364]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdad88f0e0 a2=3 a3=0 items=0 ppid=1 pid=1364 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:06.446000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:24:06.447938 sshd[1364]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:24:06.454554 systemd-logind[1130]: New session 9 of user core. Feb 9 19:24:06.455300 systemd[1]: Started session-9.scope. Feb 9 19:24:06.462000 audit[1364]: USER_START pid=1364 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:24:06.465000 audit[1366]: CRED_ACQ pid=1366 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:24:06.624000 audit[1367]: USER_ACCT pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:24:06.626002 sudo[1367]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:24:06.625000 audit[1367]: CRED_REFR pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:24:06.626442 sudo[1367]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:24:06.628000 audit[1367]: USER_START pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:24:07.380833 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:24:07.389424 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:24:07.389786 systemd[1]: Reached target network-online.target. Feb 9 19:24:07.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:07.392829 systemd[1]: Starting docker.service... Feb 9 19:24:07.442041 env[1383]: time="2024-02-09T19:24:07.441960355Z" level=info msg="Starting up" Feb 9 19:24:07.443743 env[1383]: time="2024-02-09T19:24:07.443690896Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:24:07.443743 env[1383]: time="2024-02-09T19:24:07.443717910Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:24:07.444010 env[1383]: time="2024-02-09T19:24:07.443746628Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:24:07.444010 env[1383]: time="2024-02-09T19:24:07.443762742Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:24:07.447647 env[1383]: time="2024-02-09T19:24:07.447606353Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:24:07.447647 env[1383]: time="2024-02-09T19:24:07.447641093Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:24:07.447817 env[1383]: time="2024-02-09T19:24:07.447665699Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:24:07.447817 env[1383]: time="2024-02-09T19:24:07.447680164Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:24:07.457686 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport476513040-merged.mount: Deactivated successfully. Feb 9 19:24:07.518556 env[1383]: time="2024-02-09T19:24:07.518494792Z" level=info msg="Loading containers: start." Feb 9 19:24:07.587000 audit[1414]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.587000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdfbaacb90 a2=0 a3=7ffdfbaacb7c items=0 ppid=1383 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.587000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 19:24:07.590000 audit[1416]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.590000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc949fc8a0 a2=0 a3=7ffc949fc88c items=0 ppid=1383 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.590000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 19:24:07.593000 audit[1418]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.593000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe78dbd1d0 a2=0 a3=7ffe78dbd1bc items=0 ppid=1383 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.593000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:24:07.596000 audit[1420]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.596000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcc6a99680 a2=0 a3=7ffcc6a9966c items=0 ppid=1383 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.596000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:24:07.600000 audit[1422]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.600000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc3543b1b0 a2=0 a3=7ffc3543b19c items=0 ppid=1383 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.600000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 19:24:07.620000 audit[1427]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.620000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd548b8370 a2=0 a3=7ffd548b835c items=0 ppid=1383 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.620000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 19:24:07.632000 audit[1429]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.632000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe07fc27f0 a2=0 a3=7ffe07fc27dc items=0 ppid=1383 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.632000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 19:24:07.635000 audit[1431]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.635000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffde40bbe10 a2=0 a3=7ffde40bbdfc items=0 ppid=1383 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.635000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 19:24:07.638000 audit[1433]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.638000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffde9ebdce0 a2=0 a3=7ffde9ebdccc items=0 ppid=1383 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:24:07.652000 audit[1437]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.652000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc7b76a8b0 a2=0 a3=7ffc7b76a89c items=0 ppid=1383 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.652000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:24:07.653000 audit[1438]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.653000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff3b17d5c0 a2=0 a3=7fff3b17d5ac items=0 ppid=1383 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.653000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:24:07.668924 kernel: Initializing XFRM netlink socket Feb 9 19:24:07.713381 env[1383]: time="2024-02-09T19:24:07.713316498Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 19:24:07.743000 audit[1446]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.743000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff08ef9d10 a2=0 a3=7fff08ef9cfc items=0 ppid=1383 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 19:24:07.755000 audit[1449]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.755000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcf0b84fb0 a2=0 a3=7ffcf0b84f9c items=0 ppid=1383 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 19:24:07.759000 audit[1452]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.759000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdb6e34cb0 a2=0 a3=7ffdb6e34c9c items=0 ppid=1383 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.759000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 19:24:07.762000 audit[1454]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.762000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff21899f80 a2=0 a3=7fff21899f6c items=0 ppid=1383 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 19:24:07.765000 audit[1456]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.765000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd7aed9140 a2=0 a3=7ffd7aed912c items=0 ppid=1383 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.765000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 19:24:07.768000 audit[1458]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.768000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd1884aba0 a2=0 a3=7ffd1884ab8c items=0 ppid=1383 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.768000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 19:24:07.772000 audit[1460]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.772000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc6b3329b0 a2=0 a3=7ffc6b33299c items=0 ppid=1383 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.772000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 19:24:07.784000 audit[1463]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.784000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffb5ffcb90 a2=0 a3=7fffb5ffcb7c items=0 ppid=1383 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.784000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 19:24:07.788000 audit[1465]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.788000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc71851e20 a2=0 a3=7ffc71851e0c items=0 ppid=1383 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.788000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:24:07.791000 audit[1467]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.791000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffffa39e120 a2=0 a3=7ffffa39e10c items=0 ppid=1383 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.791000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:24:07.794000 audit[1469]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.794000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffcb9fe280 a2=0 a3=7fffcb9fe26c items=0 ppid=1383 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.794000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 19:24:07.796128 systemd-networkd[1022]: docker0: Link UP Feb 9 19:24:07.809000 audit[1473]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.809000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdf63aacc0 a2=0 a3=7ffdf63aacac items=0 ppid=1383 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.809000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:24:07.810000 audit[1474]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:07.810000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd487a99e0 a2=0 a3=7ffd487a99cc items=0 ppid=1383 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:07.810000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:24:07.812306 env[1383]: time="2024-02-09T19:24:07.812235600Z" level=info msg="Loading containers: done." Feb 9 19:24:07.831622 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3626657429-merged.mount: Deactivated successfully. Feb 9 19:24:07.842847 env[1383]: time="2024-02-09T19:24:07.842790767Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 19:24:07.844039 env[1383]: time="2024-02-09T19:24:07.844002508Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 19:24:07.844198 env[1383]: time="2024-02-09T19:24:07.844166567Z" level=info msg="Daemon has completed initialization" Feb 9 19:24:07.864770 systemd[1]: Started docker.service. Feb 9 19:24:07.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:07.875742 env[1383]: time="2024-02-09T19:24:07.875666910Z" level=info msg="API listen on /run/docker.sock" Feb 9 19:24:07.902187 systemd[1]: Reloading. Feb 9 19:24:08.050075 /usr/lib/systemd/system-generators/torcx-generator[1525]: time="2024-02-09T19:24:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:24:08.053999 /usr/lib/systemd/system-generators/torcx-generator[1525]: time="2024-02-09T19:24:08Z" level=info msg="torcx already run" Feb 9 19:24:08.125521 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:24:08.125552 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:24:08.152551 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:24:08.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.240000 audit: BPF prog-id=37 op=LOAD Feb 9 19:24:08.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.240000 audit: BPF prog-id=38 op=LOAD Feb 9 19:24:08.240000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:24:08.240000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:24:08.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.243000 audit: BPF prog-id=39 op=LOAD Feb 9 19:24:08.243000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:24:08.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.245000 audit: BPF prog-id=40 op=LOAD Feb 9 19:24:08.245000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit: BPF prog-id=41 op=LOAD Feb 9 19:24:08.246000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit: BPF prog-id=42 op=LOAD Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.247000 audit: BPF prog-id=43 op=LOAD Feb 9 19:24:08.247000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:24:08.247000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:24:08.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.248000 audit: BPF prog-id=44 op=LOAD Feb 9 19:24:08.248000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:24:08.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit: BPF prog-id=45 op=LOAD Feb 9 19:24:08.274000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit: BPF prog-id=46 op=LOAD Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.274000 audit: BPF prog-id=47 op=LOAD Feb 9 19:24:08.274000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:24:08.274000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:24:08.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.277000 audit: BPF prog-id=48 op=LOAD Feb 9 19:24:08.278000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:24:08.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit: BPF prog-id=49 op=LOAD Feb 9 19:24:08.280000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit: BPF prog-id=50 op=LOAD Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.280000 audit: BPF prog-id=51 op=LOAD Feb 9 19:24:08.280000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:24:08.280000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit: BPF prog-id=52 op=LOAD Feb 9 19:24:08.282000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.282000 audit: BPF prog-id=53 op=LOAD Feb 9 19:24:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:08.283000 audit: BPF prog-id=54 op=LOAD Feb 9 19:24:08.283000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:24:08.283000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:24:08.300813 systemd[1]: Started kubelet.service. Feb 9 19:24:08.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:08.412322 kubelet[1565]: E0209 19:24:08.412130 1565 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:24:08.415182 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:24:08.415425 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:24:08.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:24:08.952498 env[1146]: time="2024-02-09T19:24:08.952446715Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 19:24:09.444587 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount590971533.mount: Deactivated successfully. Feb 9 19:24:11.740522 env[1146]: time="2024-02-09T19:24:11.740445856Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:11.743386 env[1146]: time="2024-02-09T19:24:11.743328570Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:11.746052 env[1146]: time="2024-02-09T19:24:11.746009435Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:11.748847 env[1146]: time="2024-02-09T19:24:11.748807443Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:11.750176 env[1146]: time="2024-02-09T19:24:11.750134738Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 9 19:24:11.766803 env[1146]: time="2024-02-09T19:24:11.766761884Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 19:24:13.767003 env[1146]: time="2024-02-09T19:24:13.766919859Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:13.770028 env[1146]: time="2024-02-09T19:24:13.769971719Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:13.773219 env[1146]: time="2024-02-09T19:24:13.773176918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:13.777014 env[1146]: time="2024-02-09T19:24:13.776953733Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:13.778398 env[1146]: time="2024-02-09T19:24:13.778350315Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 9 19:24:13.795805 env[1146]: time="2024-02-09T19:24:13.795758777Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 19:24:15.139503 env[1146]: time="2024-02-09T19:24:15.139429966Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:15.142422 env[1146]: time="2024-02-09T19:24:15.142374179Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:15.144983 env[1146]: time="2024-02-09T19:24:15.144941158Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:15.147419 env[1146]: time="2024-02-09T19:24:15.147379180Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:15.148437 env[1146]: time="2024-02-09T19:24:15.148384473Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 9 19:24:15.164940 env[1146]: time="2024-02-09T19:24:15.164878696Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 19:24:16.156681 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1980482668.mount: Deactivated successfully. Feb 9 19:24:16.749765 env[1146]: time="2024-02-09T19:24:16.749692382Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:16.753019 env[1146]: time="2024-02-09T19:24:16.752972617Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:16.755466 env[1146]: time="2024-02-09T19:24:16.755429073Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:16.757785 env[1146]: time="2024-02-09T19:24:16.757725719Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:16.758465 env[1146]: time="2024-02-09T19:24:16.758425439Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 19:24:16.774475 env[1146]: time="2024-02-09T19:24:16.774429485Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 19:24:17.112514 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2761680966.mount: Deactivated successfully. Feb 9 19:24:17.122256 env[1146]: time="2024-02-09T19:24:17.122191147Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:17.125389 env[1146]: time="2024-02-09T19:24:17.125340583Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:17.127819 env[1146]: time="2024-02-09T19:24:17.127781419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:17.129990 env[1146]: time="2024-02-09T19:24:17.129955056Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:17.130781 env[1146]: time="2024-02-09T19:24:17.130741154Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 19:24:17.147404 env[1146]: time="2024-02-09T19:24:17.147342969Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 19:24:17.894249 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1412922091.mount: Deactivated successfully. Feb 9 19:24:18.626381 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 19:24:18.626758 systemd[1]: Stopped kubelet.service. Feb 9 19:24:18.655318 kernel: kauditd_printk_skb: 293 callbacks suppressed Feb 9 19:24:18.655462 kernel: audit: type=1130 audit(1707506658.625:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:18.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:18.629409 systemd[1]: Started kubelet.service. Feb 9 19:24:18.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:18.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:18.699814 kernel: audit: type=1131 audit(1707506658.625:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:18.699998 kernel: audit: type=1130 audit(1707506658.630:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:18.768036 kubelet[1611]: E0209 19:24:18.767973 1611 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:24:18.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:24:18.773807 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:24:18.774042 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:24:18.796109 kernel: audit: type=1131 audit(1707506658.773:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:24:18.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:18.876906 kernel: audit: type=1131 audit(1707506658.853:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:18.853850 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 9 19:24:18.892000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:24:18.907724 kernel: audit: type=1334 audit(1707506658.892:423): prog-id=43 op=UNLOAD Feb 9 19:24:18.907840 kernel: audit: type=1334 audit(1707506658.892:424): prog-id=42 op=UNLOAD Feb 9 19:24:18.892000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:24:18.892000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:24:18.915930 kernel: audit: type=1334 audit(1707506658.892:425): prog-id=41 op=UNLOAD Feb 9 19:24:22.552282 env[1146]: time="2024-02-09T19:24:22.552206092Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:22.555023 env[1146]: time="2024-02-09T19:24:22.554975464Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:22.557379 env[1146]: time="2024-02-09T19:24:22.557336862Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:22.559796 env[1146]: time="2024-02-09T19:24:22.559748219Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:22.560840 env[1146]: time="2024-02-09T19:24:22.560784493Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 9 19:24:22.578927 env[1146]: time="2024-02-09T19:24:22.578865747Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 19:24:23.304844 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount56311482.mount: Deactivated successfully. Feb 9 19:24:23.904880 env[1146]: time="2024-02-09T19:24:23.904816126Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:23.908117 env[1146]: time="2024-02-09T19:24:23.908062793Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:23.910830 env[1146]: time="2024-02-09T19:24:23.910784068Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:23.913192 env[1146]: time="2024-02-09T19:24:23.913135304Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:23.914045 env[1146]: time="2024-02-09T19:24:23.914000588Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 9 19:24:26.387479 systemd[1]: Stopped kubelet.service. Feb 9 19:24:26.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:26.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:26.421774 systemd[1]: Reloading. Feb 9 19:24:26.431434 kernel: audit: type=1130 audit(1707506666.387:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:26.431557 kernel: audit: type=1131 audit(1707506666.387:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:26.548128 /usr/lib/systemd/system-generators/torcx-generator[1706]: time="2024-02-09T19:24:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:24:26.548726 /usr/lib/systemd/system-generators/torcx-generator[1706]: time="2024-02-09T19:24:26Z" level=info msg="torcx already run" Feb 9 19:24:26.638251 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:24:26.638278 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:24:26.664808 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:24:26.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.789860 kernel: audit: type=1400 audit(1707506666.747:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.790007 kernel: audit: type=1400 audit(1707506666.747:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.790056 kernel: audit: type=1400 audit(1707506666.747:430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.831447 kernel: audit: type=1400 audit(1707506666.747:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.831579 kernel: audit: type=1400 audit(1707506666.747:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.873132 kernel: audit: type=1400 audit(1707506666.747:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.894136 kernel: audit: type=1400 audit(1707506666.747:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.894280 kernel: audit: type=1400 audit(1707506666.747:435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.747000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit: BPF prog-id=55 op=LOAD Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit: BPF prog-id=56 op=LOAD Feb 9 19:24:26.768000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:24:26.768000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.810000 audit: BPF prog-id=57 op=LOAD Feb 9 19:24:26.810000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:24:26.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.851000 audit: BPF prog-id=58 op=LOAD Feb 9 19:24:26.851000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:24:26.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.872000 audit: BPF prog-id=59 op=LOAD Feb 9 19:24:26.872000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:24:26.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.913000 audit: BPF prog-id=60 op=LOAD Feb 9 19:24:26.913000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit: BPF prog-id=61 op=LOAD Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.914000 audit: BPF prog-id=62 op=LOAD Feb 9 19:24:26.914000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:24:26.914000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:24:26.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.916000 audit: BPF prog-id=63 op=LOAD Feb 9 19:24:26.916000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit: BPF prog-id=64 op=LOAD Feb 9 19:24:26.918000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.919000 audit: BPF prog-id=65 op=LOAD Feb 9 19:24:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.919000 audit: BPF prog-id=66 op=LOAD Feb 9 19:24:26.919000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:24:26.919000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:24:26.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit: BPF prog-id=67 op=LOAD Feb 9 19:24:26.921000 audit: BPF prog-id=52 op=UNLOAD Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit: BPF prog-id=68 op=LOAD Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:26.921000 audit: BPF prog-id=69 op=LOAD Feb 9 19:24:26.921000 audit: BPF prog-id=53 op=UNLOAD Feb 9 19:24:26.921000 audit: BPF prog-id=54 op=UNLOAD Feb 9 19:24:26.945159 systemd[1]: Started kubelet.service. Feb 9 19:24:26.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:27.009740 kubelet[1748]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:24:27.009740 kubelet[1748]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:24:27.010349 kubelet[1748]: I0209 19:24:27.009832 1748 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:24:27.011702 kubelet[1748]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:24:27.011702 kubelet[1748]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:24:27.507291 kubelet[1748]: I0209 19:24:27.507231 1748 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:24:27.507291 kubelet[1748]: I0209 19:24:27.507271 1748 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:24:27.507666 kubelet[1748]: I0209 19:24:27.507640 1748 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:24:27.512916 kubelet[1748]: E0209 19:24:27.512870 1748 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.29:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:27.513137 kubelet[1748]: I0209 19:24:27.513116 1748 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:24:27.517927 kubelet[1748]: I0209 19:24:27.517875 1748 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:24:27.518499 kubelet[1748]: I0209 19:24:27.518474 1748 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:24:27.518610 kubelet[1748]: I0209 19:24:27.518585 1748 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:24:27.518809 kubelet[1748]: I0209 19:24:27.518620 1748 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:24:27.518809 kubelet[1748]: I0209 19:24:27.518641 1748 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:24:27.518809 kubelet[1748]: I0209 19:24:27.518797 1748 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:24:27.523388 kubelet[1748]: I0209 19:24:27.523361 1748 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:24:27.523388 kubelet[1748]: I0209 19:24:27.523393 1748 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:24:27.523546 kubelet[1748]: I0209 19:24:27.523436 1748 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:24:27.523546 kubelet[1748]: I0209 19:24:27.523463 1748 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:24:27.530260 kubelet[1748]: W0209 19:24:27.530073 1748 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:27.530260 kubelet[1748]: E0209 19:24:27.530148 1748 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:27.530696 kubelet[1748]: W0209 19:24:27.530630 1748 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:27.530696 kubelet[1748]: E0209 19:24:27.530681 1748 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:27.530864 kubelet[1748]: I0209 19:24:27.530780 1748 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:24:27.537059 kubelet[1748]: W0209 19:24:27.537038 1748 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:24:27.537856 kubelet[1748]: I0209 19:24:27.537832 1748 server.go:1186] "Started kubelet" Feb 9 19:24:27.540145 kubelet[1748]: E0209 19:24:27.539983 1748 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal.17b24844723363bb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", UID:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 537785787, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 537785787, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.128.0.29:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.29:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:24:27.540933 kubelet[1748]: I0209 19:24:27.540759 1748 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:24:27.541767 kubelet[1748]: I0209 19:24:27.541738 1748 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:24:27.541000 audit[1748]: AVC avc: denied { mac_admin } for pid=1748 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:27.541000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:24:27.541000 audit[1748]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ceea80 a1=c000efc8a0 a2=c000ceea50 a3=25 items=0 ppid=1 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.541000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:24:27.541000 audit[1748]: AVC avc: denied { mac_admin } for pid=1748 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:27.541000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:24:27.541000 audit[1748]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d362a0 a1=c000efc8b8 a2=c000ceeb10 a3=25 items=0 ppid=1 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.541000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:24:27.542803 kubelet[1748]: I0209 19:24:27.542144 1748 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:24:27.542803 kubelet[1748]: I0209 19:24:27.542201 1748 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:24:27.542803 kubelet[1748]: I0209 19:24:27.542312 1748 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:24:27.543684 kubelet[1748]: E0209 19:24:27.543646 1748 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:24:27.543684 kubelet[1748]: E0209 19:24:27.543679 1748 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:24:27.548415 kubelet[1748]: I0209 19:24:27.546845 1748 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:24:27.548415 kubelet[1748]: I0209 19:24:27.546951 1748 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:24:27.548415 kubelet[1748]: W0209 19:24:27.547356 1748 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:27.548415 kubelet[1748]: E0209 19:24:27.547411 1748 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:27.548415 kubelet[1748]: E0209 19:24:27.547926 1748 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.128.0.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:27.553000 audit[1758]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.553000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdc8008f00 a2=0 a3=7ffdc8008eec items=0 ppid=1748 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:24:27.556000 audit[1759]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.556000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcddaa5990 a2=0 a3=7ffcddaa597c items=0 ppid=1748 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.556000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:24:27.561000 audit[1761]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.561000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc63ee36b0 a2=0 a3=7ffc63ee369c items=0 ppid=1748 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:24:27.566000 audit[1763]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.566000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffe03ce6f0 a2=0 a3=7fffe03ce6dc items=0 ppid=1748 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:24:27.581000 audit[1770]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.581000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff602e33d0 a2=0 a3=7fff602e33bc items=0 ppid=1748 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:24:27.584000 audit[1771]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.584000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffec22b5c20 a2=0 a3=7ffec22b5c0c items=0 ppid=1748 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:24:27.589229 kubelet[1748]: I0209 19:24:27.589211 1748 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:24:27.589356 kubelet[1748]: I0209 19:24:27.589345 1748 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:24:27.589428 kubelet[1748]: I0209 19:24:27.589418 1748 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:24:27.592271 kubelet[1748]: I0209 19:24:27.592240 1748 policy_none.go:49] "None policy: Start" Feb 9 19:24:27.593333 kubelet[1748]: I0209 19:24:27.593313 1748 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:24:27.593475 kubelet[1748]: I0209 19:24:27.593459 1748 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:24:27.592000 audit[1774]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.592000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe95d44b00 a2=0 a3=7ffe95d44aec items=0 ppid=1748 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:24:27.602416 systemd[1]: Created slice kubepods.slice. Feb 9 19:24:27.603000 audit[1777]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.603000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc1151c430 a2=0 a3=7ffc1151c41c items=0 ppid=1748 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:24:27.604000 audit[1778]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.604000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffec58ffdb0 a2=0 a3=7ffec58ffd9c items=0 ppid=1748 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:24:27.606000 audit[1779]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.606000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd629ec90 a2=0 a3=7ffcd629ec7c items=0 ppid=1748 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.606000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:24:27.609000 audit[1781]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.609000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff74b9a150 a2=0 a3=7fff74b9a13c items=0 ppid=1748 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:24:27.612000 audit[1783]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.612000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe052371d0 a2=0 a3=7ffe052371bc items=0 ppid=1748 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.612000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:24:27.616000 audit[1785]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.616000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffcad6cf110 a2=0 a3=7ffcad6cf0fc items=0 ppid=1748 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:24:27.621000 audit[1787]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.621000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffddd890bf0 a2=0 a3=7ffddd890bdc items=0 ppid=1748 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.621000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:24:27.624257 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:24:27.629918 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:24:27.632000 audit[1789]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.632000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffd11bfbad0 a2=0 a3=7ffd11bfbabc items=0 ppid=1748 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:24:27.633682 kubelet[1748]: I0209 19:24:27.633653 1748 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:24:27.636010 kubelet[1748]: I0209 19:24:27.635984 1748 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:24:27.635000 audit[1790]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.635000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffccbab8eb0 a2=0 a3=7ffccbab8e9c items=0 ppid=1748 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:24:27.636000 audit[1748]: AVC avc: denied { mac_admin } for pid=1748 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:27.636000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:24:27.636000 audit[1748]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e5fa70 a1=c000fa3c20 a2=c000e5fa40 a3=25 items=0 ppid=1 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.636000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:24:27.638409 kubelet[1748]: I0209 19:24:27.637503 1748 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:24:27.638409 kubelet[1748]: I0209 19:24:27.637860 1748 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:24:27.639011 kubelet[1748]: E0209 19:24:27.638971 1748 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" not found" Feb 9 19:24:27.639000 audit[1791]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.639000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde6e5cee0 a2=0 a3=7ffde6e5cecc items=0 ppid=1748 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.639000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:24:27.642000 audit[1793]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.642000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe1935fce0 a2=0 a3=7ffe1935fccc items=0 ppid=1748 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:24:27.643000 audit[1794]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.643000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd137611c0 a2=0 a3=7ffd137611ac items=0 ppid=1748 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.643000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:24:27.645000 audit[1795]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:24:27.645000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff40bac010 a2=0 a3=7fff40babffc items=0 ppid=1748 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:24:27.648000 audit[1797]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.648000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff2820d780 a2=0 a3=7fff2820d76c items=0 ppid=1748 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:24:27.649000 audit[1798]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.649000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd94d651d0 a2=0 a3=7ffd94d651bc items=0 ppid=1748 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:24:27.653000 audit[1800]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.653000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffd81b92ee0 a2=0 a3=7ffd81b92ecc items=0 ppid=1748 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:24:27.655000 audit[1801]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.655000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd586ffd90 a2=0 a3=7ffd586ffd7c items=0 ppid=1748 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:24:27.657000 audit[1802]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.657000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc010ee6e0 a2=0 a3=7ffc010ee6cc items=0 ppid=1748 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:24:27.660000 audit[1804]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.660000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff90b7a8c0 a2=0 a3=7fff90b7a8ac items=0 ppid=1748 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:24:27.662504 kubelet[1748]: I0209 19:24:27.662479 1748 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:27.663213 kubelet[1748]: E0209 19:24:27.663190 1748 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.29:6443/api/v1/nodes\": dial tcp 10.128.0.29:6443: connect: connection refused" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:27.664000 audit[1806]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.664000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc78866360 a2=0 a3=7ffc7886634c items=0 ppid=1748 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:24:27.668000 audit[1808]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.668000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe6a8ab940 a2=0 a3=7ffe6a8ab92c items=0 ppid=1748 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.668000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:24:27.671000 audit[1810]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=1810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.671000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffcb9c90620 a2=0 a3=7ffcb9c9060c items=0 ppid=1748 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.671000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:24:27.676000 audit[1812]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.676000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7fff48230f60 a2=0 a3=7fff48230f4c items=0 ppid=1748 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:24:27.678257 kubelet[1748]: I0209 19:24:27.678235 1748 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:24:27.678382 kubelet[1748]: I0209 19:24:27.678367 1748 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:24:27.678494 kubelet[1748]: I0209 19:24:27.678479 1748 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:24:27.678661 kubelet[1748]: E0209 19:24:27.678646 1748 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 19:24:27.679940 kubelet[1748]: W0209 19:24:27.679859 1748 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:27.679000 audit[1813]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.679000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe82f5b530 a2=0 a3=7ffe82f5b51c items=0 ppid=1748 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:24:27.680393 kubelet[1748]: E0209 19:24:27.680376 1748 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:27.681000 audit[1814]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.681000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcaf8f0db0 a2=0 a3=7ffcaf8f0d9c items=0 ppid=1748 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:24:27.682000 audit[1815]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:24:27.682000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3575e540 a2=0 a3=7ffc3575e52c items=0 ppid=1748 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:27.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:24:27.748633 kubelet[1748]: E0209 19:24:27.748560 1748 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.128.0.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:27.779983 kubelet[1748]: I0209 19:24:27.779584 1748 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:24:27.786269 kubelet[1748]: I0209 19:24:27.786230 1748 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:24:27.790676 kubelet[1748]: I0209 19:24:27.790652 1748 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:24:27.791508 kubelet[1748]: I0209 19:24:27.791477 1748 status_manager.go:698] "Failed to get status for pod" podUID=fdabc6215a00ff4ed70ee1970cca3dcc pod="kube-system/kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" err="Get \"https://10.128.0.29:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\": dial tcp 10.128.0.29:6443: connect: connection refused" Feb 9 19:24:27.797088 systemd[1]: Created slice kubepods-burstable-podfdabc6215a00ff4ed70ee1970cca3dcc.slice. Feb 9 19:24:27.803882 kubelet[1748]: I0209 19:24:27.803858 1748 status_manager.go:698] "Failed to get status for pod" podUID=69ab8d9723f571f08d9bdd6d77d180d9 pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" err="Get \"https://10.128.0.29:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\": dial tcp 10.128.0.29:6443: connect: connection refused" Feb 9 19:24:27.805548 kubelet[1748]: I0209 19:24:27.805506 1748 status_manager.go:698] "Failed to get status for pod" podUID=0af471bcb35b846bcb60546e1cb3beb4 pod="kube-system/kube-scheduler-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" err="Get \"https://10.128.0.29:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\": dial tcp 10.128.0.29:6443: connect: connection refused" Feb 9 19:24:27.814314 systemd[1]: Created slice kubepods-burstable-pod69ab8d9723f571f08d9bdd6d77d180d9.slice. Feb 9 19:24:27.821590 systemd[1]: Created slice kubepods-burstable-pod0af471bcb35b846bcb60546e1cb3beb4.slice. Feb 9 19:24:27.848287 kubelet[1748]: I0209 19:24:27.848246 1748 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fdabc6215a00ff4ed70ee1970cca3dcc-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"fdabc6215a00ff4ed70ee1970cca3dcc\") " pod="kube-system/kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:27.848620 kubelet[1748]: I0209 19:24:27.848596 1748 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fdabc6215a00ff4ed70ee1970cca3dcc-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"fdabc6215a00ff4ed70ee1970cca3dcc\") " pod="kube-system/kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:27.848798 kubelet[1748]: I0209 19:24:27.848775 1748 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/69ab8d9723f571f08d9bdd6d77d180d9-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"69ab8d9723f571f08d9bdd6d77d180d9\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:27.848918 kubelet[1748]: I0209 19:24:27.848825 1748 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/69ab8d9723f571f08d9bdd6d77d180d9-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"69ab8d9723f571f08d9bdd6d77d180d9\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:27.848918 kubelet[1748]: I0209 19:24:27.848870 1748 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fdabc6215a00ff4ed70ee1970cca3dcc-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"fdabc6215a00ff4ed70ee1970cca3dcc\") " pod="kube-system/kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:27.849047 kubelet[1748]: I0209 19:24:27.848943 1748 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/69ab8d9723f571f08d9bdd6d77d180d9-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"69ab8d9723f571f08d9bdd6d77d180d9\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:27.849047 kubelet[1748]: I0209 19:24:27.848992 1748 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/69ab8d9723f571f08d9bdd6d77d180d9-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"69ab8d9723f571f08d9bdd6d77d180d9\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:27.849047 kubelet[1748]: I0209 19:24:27.849040 1748 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/69ab8d9723f571f08d9bdd6d77d180d9-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"69ab8d9723f571f08d9bdd6d77d180d9\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:27.849195 kubelet[1748]: I0209 19:24:27.849083 1748 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0af471bcb35b846bcb60546e1cb3beb4-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"0af471bcb35b846bcb60546e1cb3beb4\") " pod="kube-system/kube-scheduler-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:27.869311 kubelet[1748]: I0209 19:24:27.869267 1748 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:27.869682 kubelet[1748]: E0209 19:24:27.869639 1748 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.29:6443/api/v1/nodes\": dial tcp 10.128.0.29:6443: connect: connection refused" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:28.112421 env[1146]: time="2024-02-09T19:24:28.112264774Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal,Uid:fdabc6215a00ff4ed70ee1970cca3dcc,Namespace:kube-system,Attempt:0,}" Feb 9 19:24:28.120102 env[1146]: time="2024-02-09T19:24:28.120048776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal,Uid:69ab8d9723f571f08d9bdd6d77d180d9,Namespace:kube-system,Attempt:0,}" Feb 9 19:24:28.128554 env[1146]: time="2024-02-09T19:24:28.128509837Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal,Uid:0af471bcb35b846bcb60546e1cb3beb4,Namespace:kube-system,Attempt:0,}" Feb 9 19:24:28.149656 kubelet[1748]: E0209 19:24:28.149601 1748 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.128.0.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:28.275208 kubelet[1748]: I0209 19:24:28.274721 1748 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:28.275208 kubelet[1748]: E0209 19:24:28.275174 1748 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.29:6443/api/v1/nodes\": dial tcp 10.128.0.29:6443: connect: connection refused" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:28.673350 kubelet[1748]: W0209 19:24:28.673245 1748 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:28.673350 kubelet[1748]: E0209 19:24:28.673343 1748 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:28.735690 kubelet[1748]: W0209 19:24:28.735637 1748 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:28.735690 kubelet[1748]: E0209 19:24:28.735697 1748 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:28.802769 kubelet[1748]: W0209 19:24:28.802694 1748 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:28.802769 kubelet[1748]: E0209 19:24:28.802774 1748 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:29.000400 kubelet[1748]: E0209 19:24:28.951035 1748 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.128.0.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:29.081463 kubelet[1748]: I0209 19:24:29.081406 1748 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:29.081810 kubelet[1748]: E0209 19:24:29.081782 1748 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.29:6443/api/v1/nodes\": dial tcp 10.128.0.29:6443: connect: connection refused" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:29.177013 kubelet[1748]: W0209 19:24:29.176937 1748 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:29.177013 kubelet[1748]: E0209 19:24:29.177002 1748 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:29.529250 kubelet[1748]: E0209 19:24:29.529184 1748 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.29:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:30.339656 kubelet[1748]: W0209 19:24:30.339569 1748 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:30.339656 kubelet[1748]: E0209 19:24:30.339653 1748 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:30.552530 kubelet[1748]: E0209 19:24:30.552471 1748 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: Get "https://10.128.0.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:30.686739 kubelet[1748]: I0209 19:24:30.686687 1748 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:30.687153 kubelet[1748]: E0209 19:24:30.687112 1748 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.29:6443/api/v1/nodes\": dial tcp 10.128.0.29:6443: connect: connection refused" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:30.722988 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4010276383.mount: Deactivated successfully. Feb 9 19:24:30.728374 env[1146]: time="2024-02-09T19:24:30.728310546Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:30.732088 env[1146]: time="2024-02-09T19:24:30.732045667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:30.734086 env[1146]: time="2024-02-09T19:24:30.734033196Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:30.736244 env[1146]: time="2024-02-09T19:24:30.736194672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:30.742196 env[1146]: time="2024-02-09T19:24:30.742138412Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:30.743551 env[1146]: time="2024-02-09T19:24:30.743504633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:30.744577 env[1146]: time="2024-02-09T19:24:30.744468290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:30.745626 env[1146]: time="2024-02-09T19:24:30.745592467Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:30.749727 env[1146]: time="2024-02-09T19:24:30.749694200Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:30.752519 env[1146]: time="2024-02-09T19:24:30.752470603Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:30.754789 env[1146]: time="2024-02-09T19:24:30.754736659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:30.755648 env[1146]: time="2024-02-09T19:24:30.755597242Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:24:30.791161 env[1146]: time="2024-02-09T19:24:30.791047403Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:24:30.797323 env[1146]: time="2024-02-09T19:24:30.797265633Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:24:30.797538 env[1146]: time="2024-02-09T19:24:30.797497294Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:24:30.798369 env[1146]: time="2024-02-09T19:24:30.798309869Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9affaee2d144bb670c2776f188fe7dab6faae9197de953fd82b917be53eab083 pid=1823 runtime=io.containerd.runc.v2 Feb 9 19:24:30.816229 env[1146]: time="2024-02-09T19:24:30.816139479Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:24:30.816403 env[1146]: time="2024-02-09T19:24:30.816244552Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:24:30.816403 env[1146]: time="2024-02-09T19:24:30.816295701Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:24:30.816569 env[1146]: time="2024-02-09T19:24:30.816508396Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b99b9180d0d44887fcae63ed82a780d4f964f57c06057de8b0be17a0c3f8a3c pid=1849 runtime=io.containerd.runc.v2 Feb 9 19:24:30.824124 env[1146]: time="2024-02-09T19:24:30.823959115Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:24:30.824290 env[1146]: time="2024-02-09T19:24:30.824165102Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:24:30.824290 env[1146]: time="2024-02-09T19:24:30.824213234Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:24:30.824579 env[1146]: time="2024-02-09T19:24:30.824504675Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/256169c83484bf39dc1be606d9a3502d84ae5b634a14ec304cc287f0e3b6eb2d pid=1852 runtime=io.containerd.runc.v2 Feb 9 19:24:30.830813 systemd[1]: Started cri-containerd-9affaee2d144bb670c2776f188fe7dab6faae9197de953fd82b917be53eab083.scope. Feb 9 19:24:30.867330 systemd[1]: Started cri-containerd-256169c83484bf39dc1be606d9a3502d84ae5b634a14ec304cc287f0e3b6eb2d.scope. Feb 9 19:24:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.873000 audit: BPF prog-id=70 op=LOAD Feb 9 19:24:30.875000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.875000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1823 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666661656532643134346262363730633237373666313838666537 Feb 9 19:24:30.875000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.875000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1823 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666661656532643134346262363730633237373666313838666537 Feb 9 19:24:30.876000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.876000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.876000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.876000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.876000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.876000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.876000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.876000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.876000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.876000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.876000 audit: BPF prog-id=71 op=LOAD Feb 9 19:24:30.876000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003d26e0 items=0 ppid=1823 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666661656532643134346262363730633237373666313838666537 Feb 9 19:24:30.878000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.878000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.878000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.878000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.878000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.878000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.878000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.878000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.878000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.878000 audit: BPF prog-id=72 op=LOAD Feb 9 19:24:30.878000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003d2728 items=0 ppid=1823 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666661656532643134346262363730633237373666313838666537 Feb 9 19:24:30.879000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:24:30.880000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:24:30.880000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.880000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.880000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.880000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.880000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.880000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.880000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.880000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.880000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.889426 systemd[1]: Started cri-containerd-0b99b9180d0d44887fcae63ed82a780d4f964f57c06057de8b0be17a0c3f8a3c.scope. Feb 9 19:24:30.880000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.880000 audit: BPF prog-id=73 op=LOAD Feb 9 19:24:30.880000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d2b38 items=0 ppid=1823 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666661656532643134346262363730633237373666313838666537 Feb 9 19:24:30.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.925000 audit: BPF prog-id=74 op=LOAD Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1852 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363136396338333438346266333964633162653630366439613335 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1852 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363136396338333438346266333964633162653630366439613335 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit: BPF prog-id=75 op=LOAD Feb 9 19:24:30.926000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000296340 items=0 ppid=1852 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363136396338333438346266333964633162653630366439613335 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit: BPF prog-id=76 op=LOAD Feb 9 19:24:30.926000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000296388 items=0 ppid=1852 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363136396338333438346266333964633162653630366439613335 Feb 9 19:24:30.926000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:24:30.926000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.926000 audit: BPF prog-id=77 op=LOAD Feb 9 19:24:30.926000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000296798 items=0 ppid=1852 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363136396338333438346266333964633162653630366439613335 Feb 9 19:24:30.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.948000 audit: BPF prog-id=78 op=LOAD Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1849 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062393962393138306430643434383837666361653633656438326137 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1849 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062393962393138306430643434383837666361653633656438326137 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit: BPF prog-id=79 op=LOAD Feb 9 19:24:30.949000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00038c340 items=0 ppid=1849 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062393962393138306430643434383837666361653633656438326137 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit: BPF prog-id=80 op=LOAD Feb 9 19:24:30.949000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00038c388 items=0 ppid=1849 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062393962393138306430643434383837666361653633656438326137 Feb 9 19:24:30.949000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:24:30.949000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:30.949000 audit: BPF prog-id=81 op=LOAD Feb 9 19:24:30.949000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00038c798 items=0 ppid=1849 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:30.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062393962393138306430643434383837666361653633656438326137 Feb 9 19:24:31.013490 env[1146]: time="2024-02-09T19:24:31.013437800Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal,Uid:0af471bcb35b846bcb60546e1cb3beb4,Namespace:kube-system,Attempt:0,} returns sandbox id \"256169c83484bf39dc1be606d9a3502d84ae5b634a14ec304cc287f0e3b6eb2d\"" Feb 9 19:24:31.014179 env[1146]: time="2024-02-09T19:24:31.013846699Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal,Uid:69ab8d9723f571f08d9bdd6d77d180d9,Namespace:kube-system,Attempt:0,} returns sandbox id \"9affaee2d144bb670c2776f188fe7dab6faae9197de953fd82b917be53eab083\"" Feb 9 19:24:31.017467 kubelet[1748]: E0209 19:24:31.017429 1748 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-21291" Feb 9 19:24:31.017867 kubelet[1748]: E0209 19:24:31.017825 1748 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flat" Feb 9 19:24:31.024396 env[1146]: time="2024-02-09T19:24:31.024350072Z" level=info msg="CreateContainer within sandbox \"9affaee2d144bb670c2776f188fe7dab6faae9197de953fd82b917be53eab083\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 19:24:31.024668 env[1146]: time="2024-02-09T19:24:31.024631554Z" level=info msg="CreateContainer within sandbox \"256169c83484bf39dc1be606d9a3502d84ae5b634a14ec304cc287f0e3b6eb2d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 19:24:31.050982 env[1146]: time="2024-02-09T19:24:31.050915672Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal,Uid:fdabc6215a00ff4ed70ee1970cca3dcc,Namespace:kube-system,Attempt:0,} returns sandbox id \"0b99b9180d0d44887fcae63ed82a780d4f964f57c06057de8b0be17a0c3f8a3c\"" Feb 9 19:24:31.054213 kubelet[1748]: E0209 19:24:31.053797 1748 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-21291" Feb 9 19:24:31.063411 env[1146]: time="2024-02-09T19:24:31.063353523Z" level=info msg="CreateContainer within sandbox \"0b99b9180d0d44887fcae63ed82a780d4f964f57c06057de8b0be17a0c3f8a3c\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 19:24:31.066641 env[1146]: time="2024-02-09T19:24:31.066591240Z" level=info msg="CreateContainer within sandbox \"256169c83484bf39dc1be606d9a3502d84ae5b634a14ec304cc287f0e3b6eb2d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"7302443004312e67b1229bb4a21c675fcc73cec4a830c4f8b37eb8fcc2f171fa\"" Feb 9 19:24:31.069107 env[1146]: time="2024-02-09T19:24:31.069059539Z" level=info msg="StartContainer for \"7302443004312e67b1229bb4a21c675fcc73cec4a830c4f8b37eb8fcc2f171fa\"" Feb 9 19:24:31.089132 env[1146]: time="2024-02-09T19:24:31.089071372Z" level=info msg="CreateContainer within sandbox \"9affaee2d144bb670c2776f188fe7dab6faae9197de953fd82b917be53eab083\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"17f540b1647d03c0a6909366c9a74bc0ff25dc637827d08a3c0012951dcc2882\"" Feb 9 19:24:31.090317 env[1146]: time="2024-02-09T19:24:31.090275336Z" level=info msg="StartContainer for \"17f540b1647d03c0a6909366c9a74bc0ff25dc637827d08a3c0012951dcc2882\"" Feb 9 19:24:31.091995 kubelet[1748]: W0209 19:24:31.091909 1748 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:31.092112 kubelet[1748]: E0209 19:24:31.092010 1748 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 9 19:24:31.097033 env[1146]: time="2024-02-09T19:24:31.096967717Z" level=info msg="CreateContainer within sandbox \"0b99b9180d0d44887fcae63ed82a780d4f964f57c06057de8b0be17a0c3f8a3c\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b2edfbe0c443908218d127fde6b8b428f575da552c1b577ef1bd0b52ca2df4f0\"" Feb 9 19:24:31.098121 env[1146]: time="2024-02-09T19:24:31.098080958Z" level=info msg="StartContainer for \"b2edfbe0c443908218d127fde6b8b428f575da552c1b577ef1bd0b52ca2df4f0\"" Feb 9 19:24:31.101959 systemd[1]: Started cri-containerd-7302443004312e67b1229bb4a21c675fcc73cec4a830c4f8b37eb8fcc2f171fa.scope. Feb 9 19:24:31.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.131000 audit: BPF prog-id=82 op=LOAD Feb 9 19:24:31.133000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.133000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1852 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733303234343330303433313265363762313232396262346132316336 Feb 9 19:24:31.134000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.134000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1852 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733303234343330303433313265363762313232396262346132316336 Feb 9 19:24:31.134000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.134000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.134000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.134000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.134000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.134000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.134000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.134000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.134000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.134000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.134000 audit: BPF prog-id=83 op=LOAD Feb 9 19:24:31.134000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003058a0 items=0 ppid=1852 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733303234343330303433313265363762313232396262346132316336 Feb 9 19:24:31.135000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.135000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.135000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.135000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.135000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.135000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.135000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.135000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.135000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.135000 audit: BPF prog-id=84 op=LOAD Feb 9 19:24:31.135000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003058e8 items=0 ppid=1852 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733303234343330303433313265363762313232396262346132316336 Feb 9 19:24:31.136000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:24:31.136000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:24:31.136000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.136000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.136000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.136000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.136000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.136000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.136000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.136000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.136000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.136000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.136000 audit: BPF prog-id=85 op=LOAD Feb 9 19:24:31.136000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000305cf8 items=0 ppid=1852 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733303234343330303433313265363762313232396262346132316336 Feb 9 19:24:31.155549 systemd[1]: Started cri-containerd-17f540b1647d03c0a6909366c9a74bc0ff25dc637827d08a3c0012951dcc2882.scope. Feb 9 19:24:31.170982 systemd[1]: Started cri-containerd-b2edfbe0c443908218d127fde6b8b428f575da552c1b577ef1bd0b52ca2df4f0.scope. Feb 9 19:24:31.223962 env[1146]: time="2024-02-09T19:24:31.223814991Z" level=info msg="StartContainer for \"7302443004312e67b1229bb4a21c675fcc73cec4a830c4f8b37eb8fcc2f171fa\" returns successfully" Feb 9 19:24:31.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.230000 audit: BPF prog-id=86 op=LOAD Feb 9 19:24:31.231000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.231000 audit[1985]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1823 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137663534306231363437643033633061363930393336366339613734 Feb 9 19:24:31.231000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.231000 audit[1985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1823 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137663534306231363437643033633061363930393336366339613734 Feb 9 19:24:31.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit: BPF prog-id=87 op=LOAD Feb 9 19:24:31.232000 audit[1985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00038c360 items=0 ppid=1823 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137663534306231363437643033633061363930393336366339613734 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.232000 audit: BPF prog-id=88 op=LOAD Feb 9 19:24:31.232000 audit[1985]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00038c3a8 items=0 ppid=1823 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137663534306231363437643033633061363930393336366339613734 Feb 9 19:24:31.232000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:24:31.232000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:24:31.233000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1985]: AVC avc: denied { perfmon } for pid=1985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1985]: AVC avc: denied { bpf } for pid=1985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit: BPF prog-id=89 op=LOAD Feb 9 19:24:31.233000 audit[1985]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00038c7b8 items=0 ppid=1823 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.233000 audit: BPF prog-id=90 op=LOAD Feb 9 19:24:31.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137663534306231363437643033633061363930393336366339613734 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1849 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232656466626530633434333930383231386431323766646536623862 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1849 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232656466626530633434333930383231386431323766646536623862 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit: BPF prog-id=91 op=LOAD Feb 9 19:24:31.234000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00021a530 items=0 ppid=1849 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232656466626530633434333930383231386431323766646536623862 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.234000 audit: BPF prog-id=92 op=LOAD Feb 9 19:24:31.234000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00021a578 items=0 ppid=1849 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232656466626530633434333930383231386431323766646536623862 Feb 9 19:24:31.234000 audit: BPF prog-id=92 op=UNLOAD Feb 9 19:24:31.235000 audit: BPF prog-id=91 op=UNLOAD Feb 9 19:24:31.235000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.235000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.235000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.235000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.235000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.235000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.235000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.235000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.235000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.235000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:31.235000 audit: BPF prog-id=93 op=LOAD Feb 9 19:24:31.235000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00021a988 items=0 ppid=1849 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:31.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232656466626530633434333930383231386431323766646536623862 Feb 9 19:24:31.325441 env[1146]: time="2024-02-09T19:24:31.325375517Z" level=info msg="StartContainer for \"17f540b1647d03c0a6909366c9a74bc0ff25dc637827d08a3c0012951dcc2882\" returns successfully" Feb 9 19:24:31.327099 env[1146]: time="2024-02-09T19:24:31.327051925Z" level=info msg="StartContainer for \"b2edfbe0c443908218d127fde6b8b428f575da552c1b577ef1bd0b52ca2df4f0\" returns successfully" Feb 9 19:24:33.751595 update_engine[1134]: I0209 19:24:33.751008 1134 update_attempter.cc:509] Updating boot flags... Feb 9 19:24:33.893479 kubelet[1748]: I0209 19:24:33.893439 1748 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:35.898000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:24:35.904662 kernel: kauditd_printk_skb: 618 callbacks suppressed Feb 9 19:24:35.904775 kernel: audit: type=1400 audit(1707506675.898:745): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:24:35.898000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c002939dd0 a2=fc6 a3=0 items=0 ppid=1849 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 key=(null) Feb 9 19:24:35.976920 kernel: audit: type=1300 audit(1707506675.898:745): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c002939dd0 a2=fc6 a3=0 items=0 ppid=1849 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 key=(null) Feb 9 19:24:35.898000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:24:36.006920 kernel: audit: type=1327 audit(1707506675.898:745): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:24:35.911000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:24:36.033922 kernel: audit: type=1400 audit(1707506675.911:746): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:24:35.911000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c002a24bc0 a2=fc6 a3=0 items=0 ppid=1849 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 key=(null) Feb 9 19:24:35.911000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:24:36.098134 kernel: audit: type=1300 audit(1707506675.911:746): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c002a24bc0 a2=fc6 a3=0 items=0 ppid=1849 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 key=(null) Feb 9 19:24:36.098300 kernel: audit: type=1327 audit(1707506675.911:746): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:24:36.098347 kernel: audit: type=1400 audit(1707506675.933:747): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:24:35.933000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:24:35.933000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00b9dfaa0 a2=fc6 a3=0 items=0 ppid=1849 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 key=(null) Feb 9 19:24:36.157700 kernel: audit: type=1300 audit(1707506675.933:747): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00b9dfaa0 a2=fc6 a3=0 items=0 ppid=1849 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 key=(null) Feb 9 19:24:35.933000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:24:36.188913 kernel: audit: type=1327 audit(1707506675.933:747): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:24:35.938000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:24:36.223928 kernel: audit: type=1400 audit(1707506675.938:748): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:24:35.938000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c002b1ef80 a2=fc6 a3=0 items=0 ppid=1849 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 key=(null) Feb 9 19:24:35.938000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:24:35.938000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:24:35.938000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c00bc80570 a2=fc6 a3=0 items=0 ppid=1849 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 key=(null) Feb 9 19:24:35.938000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:24:35.974000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:24:35.974000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00bc4b4d0 a2=fc6 a3=0 items=0 ppid=1849 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c130 key=(null) Feb 9 19:24:35.974000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:24:36.349000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c517,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:24:36.349000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000266a20 a2=fc6 a3=0 items=0 ppid=1823 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c517,c1022 key=(null) Feb 9 19:24:36.349000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:24:36.350000 audit[2004]: AVC avc: denied { watch } for pid=2004 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c517,c1022 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:24:36.350000 audit[2004]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0001ce040 a2=fc6 a3=0 items=0 ppid=1823 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c517,c1022 key=(null) Feb 9 19:24:36.350000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:24:36.402718 kubelet[1748]: E0209 19:24:36.402674 1748 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" not found" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:36.478369 kubelet[1748]: I0209 19:24:36.478238 1748 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:36.531019 kubelet[1748]: E0209 19:24:36.530859 1748 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal.17b24844723363bb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", UID:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 537785787, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 537785787, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:24:36.534579 kubelet[1748]: I0209 19:24:36.534547 1748 apiserver.go:52] "Watching apiserver" Feb 9 19:24:36.547196 kubelet[1748]: I0209 19:24:36.547139 1748 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:24:36.603899 kubelet[1748]: E0209 19:24:36.603714 1748 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal.17b24844728d2098", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", UID:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 543666840, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 543666840, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:24:36.622974 kubelet[1748]: I0209 19:24:36.622939 1748 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:24:36.666231 kubelet[1748]: E0209 19:24:36.666097 1748 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal.17b2484475361692", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", UID:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 588294290, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 588294290, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:24:36.739305 kubelet[1748]: E0209 19:24:36.739074 1748 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal.17b2484475368402", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", UID:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 588322306, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 588322306, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:24:36.795424 kubelet[1748]: E0209 19:24:36.795302 1748 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal.17b248447536a07c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", UID:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 588329596, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 588329596, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:24:36.852032 kubelet[1748]: E0209 19:24:36.851902 1748 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal.17b24844787190d3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", UID:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 642523859, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 642523859, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:24:36.911909 kubelet[1748]: E0209 19:24:36.911752 1748 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal.17b2484475361692", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", UID:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 588294290, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 662424366, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:24:36.974708 kubelet[1748]: E0209 19:24:36.974577 1748 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal.17b2484475368402", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", UID:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 588322306, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 662433102, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:24:37.033406 kubelet[1748]: E0209 19:24:37.033169 1748 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal.17b248447536a07c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", UID:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 588329596, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 662438943, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:24:37.186972 kubelet[1748]: E0209 19:24:37.186818 1748 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal.17b2484475361692", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", UID:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 588294290, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 24, 27, 786100596, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:24:38.103296 kubelet[1748]: I0209 19:24:38.103235 1748 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" podStartSLOduration=1.103159751 pod.CreationTimestamp="2024-02-09 19:24:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:24:37.704037017 +0000 UTC m=+10.754228120" watchObservedRunningTime="2024-02-09 19:24:38.103159751 +0000 UTC m=+11.153350842" Feb 9 19:24:38.579680 systemd[1]: Reloading. Feb 9 19:24:38.684577 /usr/lib/systemd/system-generators/torcx-generator[2092]: time="2024-02-09T19:24:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:24:38.685226 /usr/lib/systemd/system-generators/torcx-generator[2092]: time="2024-02-09T19:24:38Z" level=info msg="torcx already run" Feb 9 19:24:38.884823 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:24:38.884855 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:24:38.932202 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit: BPF prog-id=94 op=LOAD Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.064000 audit: BPF prog-id=95 op=LOAD Feb 9 19:24:39.064000 audit: BPF prog-id=55 op=UNLOAD Feb 9 19:24:39.064000 audit: BPF prog-id=56 op=UNLOAD Feb 9 19:24:39.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.067000 audit: BPF prog-id=96 op=LOAD Feb 9 19:24:39.067000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:24:39.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.068000 audit: BPF prog-id=97 op=LOAD Feb 9 19:24:39.068000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:24:39.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.070000 audit: BPF prog-id=98 op=LOAD Feb 9 19:24:39.070000 audit: BPF prog-id=57 op=UNLOAD Feb 9 19:24:39.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.074000 audit: BPF prog-id=99 op=LOAD Feb 9 19:24:39.074000 audit: BPF prog-id=58 op=UNLOAD Feb 9 19:24:39.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.075000 audit: BPF prog-id=100 op=LOAD Feb 9 19:24:39.075000 audit: BPF prog-id=86 op=UNLOAD Feb 9 19:24:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.076000 audit: BPF prog-id=101 op=LOAD Feb 9 19:24:39.076000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:24:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.077000 audit: BPF prog-id=102 op=LOAD Feb 9 19:24:39.077000 audit: BPF prog-id=59 op=UNLOAD Feb 9 19:24:39.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.081000 audit: BPF prog-id=103 op=LOAD Feb 9 19:24:39.081000 audit: BPF prog-id=60 op=UNLOAD Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit: BPF prog-id=104 op=LOAD Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.082000 audit: BPF prog-id=105 op=LOAD Feb 9 19:24:39.082000 audit: BPF prog-id=61 op=UNLOAD Feb 9 19:24:39.082000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:24:39.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.086000 audit: BPF prog-id=106 op=LOAD Feb 9 19:24:39.086000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:24:39.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.087000 audit: BPF prog-id=107 op=LOAD Feb 9 19:24:39.087000 audit: BPF prog-id=64 op=UNLOAD Feb 9 19:24:39.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit: BPF prog-id=108 op=LOAD Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.088000 audit: BPF prog-id=109 op=LOAD Feb 9 19:24:39.088000 audit: BPF prog-id=65 op=UNLOAD Feb 9 19:24:39.088000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:24:39.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.089000 audit: BPF prog-id=110 op=LOAD Feb 9 19:24:39.089000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:24:39.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit: BPF prog-id=111 op=LOAD Feb 9 19:24:39.092000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit: BPF prog-id=112 op=LOAD Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.092000 audit: BPF prog-id=113 op=LOAD Feb 9 19:24:39.092000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:24:39.092000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:24:39.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.096000 audit: BPF prog-id=114 op=LOAD Feb 9 19:24:39.096000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:24:39.146172 systemd[1]: Stopping kubelet.service... Feb 9 19:24:39.168412 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 19:24:39.168700 systemd[1]: Stopped kubelet.service. Feb 9 19:24:39.168787 systemd[1]: kubelet.service: Consumed 1.130s CPU time. Feb 9 19:24:39.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:39.172035 systemd[1]: Started kubelet.service. Feb 9 19:24:39.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:39.294691 kubelet[2134]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:24:39.294691 kubelet[2134]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:24:39.294691 kubelet[2134]: I0209 19:24:39.294432 2134 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:24:39.297043 kubelet[2134]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:24:39.297043 kubelet[2134]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:24:39.305407 kubelet[2134]: I0209 19:24:39.305375 2134 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:24:39.305407 kubelet[2134]: I0209 19:24:39.305408 2134 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:24:39.306325 kubelet[2134]: I0209 19:24:39.306296 2134 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:24:39.314580 kubelet[2134]: I0209 19:24:39.314041 2134 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 19:24:39.316540 kubelet[2134]: I0209 19:24:39.316414 2134 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:24:39.323301 kubelet[2134]: I0209 19:24:39.323259 2134 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:24:39.323641 kubelet[2134]: I0209 19:24:39.323605 2134 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:24:39.323729 kubelet[2134]: I0209 19:24:39.323711 2134 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:24:39.323924 kubelet[2134]: I0209 19:24:39.323744 2134 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:24:39.323924 kubelet[2134]: I0209 19:24:39.323766 2134 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:24:39.323924 kubelet[2134]: I0209 19:24:39.323828 2134 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:24:39.329868 kubelet[2134]: I0209 19:24:39.329839 2134 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:24:39.330001 kubelet[2134]: I0209 19:24:39.329876 2134 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:24:39.330001 kubelet[2134]: I0209 19:24:39.329921 2134 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:24:39.330001 kubelet[2134]: I0209 19:24:39.329944 2134 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:24:39.332401 kubelet[2134]: I0209 19:24:39.332376 2134 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:24:39.341246 kubelet[2134]: I0209 19:24:39.341197 2134 server.go:1186] "Started kubelet" Feb 9 19:24:39.345000 audit[2134]: AVC avc: denied { mac_admin } for pid=2134 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.345000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:24:39.345000 audit[2134]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cfdad0 a1=c000b2fd88 a2=c000cfdaa0 a3=25 items=0 ppid=1 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:39.345000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:24:39.346486 kubelet[2134]: I0209 19:24:39.346119 2134 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:24:39.346486 kubelet[2134]: I0209 19:24:39.346169 2134 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:24:39.345000 audit[2134]: AVC avc: denied { mac_admin } for pid=2134 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.345000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:24:39.345000 audit[2134]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cbd900 a1=c000b2fda0 a2=c000cfdb60 a3=25 items=0 ppid=1 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:39.345000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:24:39.346958 kubelet[2134]: E0209 19:24:39.346786 2134 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:24:39.346958 kubelet[2134]: E0209 19:24:39.346817 2134 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:24:39.348928 kubelet[2134]: I0209 19:24:39.347414 2134 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:24:39.359968 kubelet[2134]: I0209 19:24:39.359940 2134 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:24:39.360870 kubelet[2134]: I0209 19:24:39.360843 2134 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:24:39.361105 kubelet[2134]: I0209 19:24:39.361082 2134 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:24:39.377635 kubelet[2134]: I0209 19:24:39.377601 2134 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:24:39.476743 kubelet[2134]: I0209 19:24:39.474431 2134 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:39.501377 kubelet[2134]: I0209 19:24:39.501349 2134 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:39.501706 kubelet[2134]: I0209 19:24:39.501686 2134 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:39.505901 kubelet[2134]: I0209 19:24:39.505866 2134 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:24:39.572914 kubelet[2134]: I0209 19:24:39.569263 2134 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:24:39.572914 kubelet[2134]: I0209 19:24:39.569300 2134 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:24:39.572914 kubelet[2134]: I0209 19:24:39.569325 2134 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:24:39.572914 kubelet[2134]: I0209 19:24:39.569519 2134 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 19:24:39.572914 kubelet[2134]: I0209 19:24:39.569538 2134 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 19:24:39.572914 kubelet[2134]: I0209 19:24:39.569549 2134 policy_none.go:49] "None policy: Start" Feb 9 19:24:39.572914 kubelet[2134]: I0209 19:24:39.570528 2134 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:24:39.572914 kubelet[2134]: I0209 19:24:39.570556 2134 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:24:39.572914 kubelet[2134]: I0209 19:24:39.570741 2134 state_mem.go:75] "Updated machine memory state" Feb 9 19:24:39.580037 kubelet[2134]: I0209 19:24:39.580005 2134 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:24:39.580037 kubelet[2134]: I0209 19:24:39.580043 2134 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:24:39.580265 kubelet[2134]: I0209 19:24:39.580069 2134 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:24:39.580265 kubelet[2134]: E0209 19:24:39.580131 2134 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:24:39.585529 kubelet[2134]: I0209 19:24:39.585499 2134 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:24:39.585681 kubelet[2134]: I0209 19:24:39.585577 2134 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:24:39.584000 audit[2134]: AVC avc: denied { mac_admin } for pid=2134 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:24:39.584000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:24:39.584000 audit[2134]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0012a63f0 a1=c001293080 a2=c0012a63c0 a3=25 items=0 ppid=1 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:24:39.584000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:24:39.588142 kubelet[2134]: I0209 19:24:39.588116 2134 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:24:39.681147 kubelet[2134]: I0209 19:24:39.681102 2134 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:24:39.681493 kubelet[2134]: I0209 19:24:39.681472 2134 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:24:39.681715 kubelet[2134]: I0209 19:24:39.681688 2134 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:24:39.711456 kubelet[2134]: E0209 19:24:39.711417 2134 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:39.714175 kubelet[2134]: E0209 19:24:39.714141 2134 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:39.779254 kubelet[2134]: I0209 19:24:39.779115 2134 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fdabc6215a00ff4ed70ee1970cca3dcc-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"fdabc6215a00ff4ed70ee1970cca3dcc\") " pod="kube-system/kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:39.779445 kubelet[2134]: I0209 19:24:39.779280 2134 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fdabc6215a00ff4ed70ee1970cca3dcc-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"fdabc6215a00ff4ed70ee1970cca3dcc\") " pod="kube-system/kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:39.779445 kubelet[2134]: I0209 19:24:39.779360 2134 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/69ab8d9723f571f08d9bdd6d77d180d9-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"69ab8d9723f571f08d9bdd6d77d180d9\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:39.779445 kubelet[2134]: I0209 19:24:39.779432 2134 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/69ab8d9723f571f08d9bdd6d77d180d9-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"69ab8d9723f571f08d9bdd6d77d180d9\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:39.779724 kubelet[2134]: I0209 19:24:39.779510 2134 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/69ab8d9723f571f08d9bdd6d77d180d9-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"69ab8d9723f571f08d9bdd6d77d180d9\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:39.779724 kubelet[2134]: I0209 19:24:39.779598 2134 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fdabc6215a00ff4ed70ee1970cca3dcc-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"fdabc6215a00ff4ed70ee1970cca3dcc\") " pod="kube-system/kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:39.779724 kubelet[2134]: I0209 19:24:39.779641 2134 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/69ab8d9723f571f08d9bdd6d77d180d9-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"69ab8d9723f571f08d9bdd6d77d180d9\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:39.779908 kubelet[2134]: I0209 19:24:39.779728 2134 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/69ab8d9723f571f08d9bdd6d77d180d9-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"69ab8d9723f571f08d9bdd6d77d180d9\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:39.779908 kubelet[2134]: I0209 19:24:39.779800 2134 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0af471bcb35b846bcb60546e1cb3beb4-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" (UID: \"0af471bcb35b846bcb60546e1cb3beb4\") " pod="kube-system/kube-scheduler-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:40.338028 kubelet[2134]: I0209 19:24:40.337979 2134 apiserver.go:52] "Watching apiserver" Feb 9 19:24:40.378629 kubelet[2134]: I0209 19:24:40.378582 2134 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:24:40.384211 kubelet[2134]: I0209 19:24:40.384170 2134 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:24:40.701552 kubelet[2134]: E0209 19:24:40.701516 2134 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:40.771193 kubelet[2134]: E0209 19:24:40.771146 2134 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:40.952656 kubelet[2134]: E0209 19:24:40.952531 2134 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" Feb 9 19:24:42.022237 kubelet[2134]: I0209 19:24:42.022182 2134 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" podStartSLOduration=4.022094369 pod.CreationTimestamp="2024-02-09 19:24:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:24:41.349720916 +0000 UTC m=+2.170111987" watchObservedRunningTime="2024-02-09 19:24:42.022094369 +0000 UTC m=+2.842485445" Feb 9 19:24:42.297115 sudo[1367]: pam_unix(sudo:session): session closed for user root Feb 9 19:24:42.323977 kernel: kauditd_printk_skb: 272 callbacks suppressed Feb 9 19:24:42.324136 kernel: audit: type=1106 audit(1707506682.296:1002): pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:24:42.296000 audit[1367]: USER_END pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:24:42.296000 audit[1367]: CRED_DISP pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:24:42.363402 kernel: audit: type=1104 audit(1707506682.296:1003): pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:24:42.361406 sshd[1364]: pam_unix(sshd:session): session closed for user core Feb 9 19:24:42.362000 audit[1364]: USER_END pid=1364 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:24:42.366004 systemd[1]: sshd@8-10.128.0.29:22-147.75.109.163:40388.service: Deactivated successfully. Feb 9 19:24:42.367307 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:24:42.367542 systemd[1]: session-9.scope: Consumed 4.000s CPU time. Feb 9 19:24:42.398930 kernel: audit: type=1106 audit(1707506682.362:1004): pid=1364 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:24:42.399031 systemd-logind[1130]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:24:42.362000 audit[1364]: CRED_DISP pid=1364 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:24:42.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.29:22-147.75.109.163:40388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:42.449105 kernel: audit: type=1104 audit(1707506682.362:1005): pid=1364 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:24:42.449249 kernel: audit: type=1131 audit(1707506682.365:1006): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.29:22-147.75.109.163:40388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:24:42.449251 systemd-logind[1130]: Removed session 9. Feb 9 19:24:43.068982 kubelet[2134]: I0209 19:24:43.068945 2134 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-2-1ab844c2a1918760ce4c.c.flatcar-212911.internal" podStartSLOduration=4.068879474 pod.CreationTimestamp="2024-02-09 19:24:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:24:42.024020969 +0000 UTC m=+2.844412056" watchObservedRunningTime="2024-02-09 19:24:43.068879474 +0000 UTC m=+3.889270551"