Feb 9 19:37:20.114616 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:37:20.114679 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:37:20.114698 kernel: BIOS-provided physical RAM map: Feb 9 19:37:20.114712 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Feb 9 19:37:20.114724 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Feb 9 19:37:20.114737 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Feb 9 19:37:20.114758 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Feb 9 19:37:20.114772 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Feb 9 19:37:20.114785 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Feb 9 19:37:20.114799 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Feb 9 19:37:20.114813 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Feb 9 19:37:20.114827 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Feb 9 19:37:20.114840 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Feb 9 19:37:20.114855 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Feb 9 19:37:20.114876 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Feb 9 19:37:20.114892 kernel: NX (Execute Disable) protection: active Feb 9 19:37:20.114906 kernel: efi: EFI v2.70 by EDK II Feb 9 19:37:20.114922 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe379198 RNG=0xbfb73018 TPMEventLog=0xbe2bd018 Feb 9 19:37:20.114937 kernel: random: crng init done Feb 9 19:37:20.114952 kernel: SMBIOS 2.4 present. Feb 9 19:37:20.114967 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Feb 9 19:37:20.114982 kernel: Hypervisor detected: KVM Feb 9 19:37:20.115000 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 19:37:20.115015 kernel: kvm-clock: cpu 0, msr 55faa001, primary cpu clock Feb 9 19:37:20.115030 kernel: kvm-clock: using sched offset of 13137270172 cycles Feb 9 19:37:20.115054 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 19:37:20.115070 kernel: tsc: Detected 2299.998 MHz processor Feb 9 19:37:20.115086 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:37:20.115102 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:37:20.115117 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Feb 9 19:37:20.115133 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:37:20.115148 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Feb 9 19:37:20.115167 kernel: Using GB pages for direct mapping Feb 9 19:37:20.115181 kernel: Secure boot disabled Feb 9 19:37:20.115196 kernel: ACPI: Early table checksum verification disabled Feb 9 19:37:20.115211 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Feb 9 19:37:20.115226 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Feb 9 19:37:20.115241 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Feb 9 19:37:20.115257 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Feb 9 19:37:20.115273 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Feb 9 19:37:20.115298 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Feb 9 19:37:20.115314 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Feb 9 19:37:20.115330 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Feb 9 19:37:20.115347 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Feb 9 19:37:20.115364 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Feb 9 19:37:20.115381 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Feb 9 19:37:20.115401 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Feb 9 19:37:20.115417 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Feb 9 19:37:20.115433 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Feb 9 19:37:20.115449 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Feb 9 19:37:20.115466 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Feb 9 19:37:20.115482 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Feb 9 19:37:20.115499 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Feb 9 19:37:20.115516 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Feb 9 19:37:20.115532 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Feb 9 19:37:20.115551 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 19:37:20.115568 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 19:37:20.115584 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 9 19:37:20.115601 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Feb 9 19:37:20.115618 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Feb 9 19:37:20.115635 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Feb 9 19:37:20.115705 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Feb 9 19:37:20.115722 kernel: NODE_DATA(0) allocated [mem 0x21fff8000-0x21fffdfff] Feb 9 19:37:20.115739 kernel: Zone ranges: Feb 9 19:37:20.115761 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:37:20.115778 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 19:37:20.115794 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Feb 9 19:37:20.115810 kernel: Movable zone start for each node Feb 9 19:37:20.115827 kernel: Early memory node ranges Feb 9 19:37:20.115843 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Feb 9 19:37:20.115859 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Feb 9 19:37:20.115877 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Feb 9 19:37:20.115894 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Feb 9 19:37:20.115914 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Feb 9 19:37:20.115931 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Feb 9 19:37:20.115947 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:37:20.115964 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Feb 9 19:37:20.115980 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Feb 9 19:37:20.115996 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Feb 9 19:37:20.116012 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Feb 9 19:37:20.116029 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 19:37:20.116053 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 19:37:20.116073 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:37:20.116090 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 19:37:20.116106 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:37:20.116122 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 19:37:20.116139 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 19:37:20.116155 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:37:20.116172 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:37:20.116186 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Feb 9 19:37:20.116202 kernel: Booting paravirtualized kernel on KVM Feb 9 19:37:20.116222 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:37:20.116238 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:37:20.116255 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:37:20.116271 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:37:20.116287 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:37:20.116302 kernel: kvm-guest: PV spinlocks enabled Feb 9 19:37:20.116318 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 19:37:20.116335 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Feb 9 19:37:20.116351 kernel: Policy zone: Normal Feb 9 19:37:20.116373 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:37:20.116390 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:37:20.116406 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 9 19:37:20.116423 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:37:20.116440 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:37:20.116457 kernel: Memory: 7536508K/7860584K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 323816K reserved, 0K cma-reserved) Feb 9 19:37:20.116474 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:37:20.116491 kernel: Kernel/User page tables isolation: enabled Feb 9 19:37:20.116511 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:37:20.116526 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:37:20.116541 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:37:20.116558 kernel: rcu: RCU event tracing is enabled. Feb 9 19:37:20.116574 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:37:20.116590 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:37:20.116607 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:37:20.116624 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:37:20.116641 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:37:20.116675 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 19:37:20.116705 kernel: Console: colour dummy device 80x25 Feb 9 19:37:20.116723 kernel: printk: console [ttyS0] enabled Feb 9 19:37:20.116743 kernel: ACPI: Core revision 20210730 Feb 9 19:37:20.116761 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:37:20.116778 kernel: x2apic enabled Feb 9 19:37:20.116795 kernel: Switched APIC routing to physical x2apic. Feb 9 19:37:20.116813 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Feb 9 19:37:20.116830 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 9 19:37:20.116848 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Feb 9 19:37:20.116868 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Feb 9 19:37:20.116886 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Feb 9 19:37:20.116903 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:37:20.116921 kernel: Spectre V2 : Mitigation: IBRS Feb 9 19:37:20.116938 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:37:20.116956 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:37:20.116973 kernel: RETBleed: Mitigation: IBRS Feb 9 19:37:20.116994 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 19:37:20.117011 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Feb 9 19:37:20.117030 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 19:37:20.117053 kernel: MDS: Mitigation: Clear CPU buffers Feb 9 19:37:20.117071 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:37:20.117088 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:37:20.117106 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:37:20.117123 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:37:20.117144 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:37:20.117162 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 19:37:20.117179 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:37:20.117196 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:37:20.117213 kernel: LSM: Security Framework initializing Feb 9 19:37:20.117230 kernel: SELinux: Initializing. Feb 9 19:37:20.117248 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:37:20.117266 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:37:20.117283 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Feb 9 19:37:20.117305 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 9 19:37:20.117322 kernel: signal: max sigframe size: 1776 Feb 9 19:37:20.117340 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:37:20.117357 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 19:37:20.117374 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:37:20.117390 kernel: x86: Booting SMP configuration: Feb 9 19:37:20.117407 kernel: .... node #0, CPUs: #1 Feb 9 19:37:20.117424 kernel: kvm-clock: cpu 1, msr 55faa041, secondary cpu clock Feb 9 19:37:20.117441 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 9 19:37:20.117464 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 19:37:20.117480 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:37:20.117498 kernel: smpboot: Max logical packages: 1 Feb 9 19:37:20.117516 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Feb 9 19:37:20.117533 kernel: devtmpfs: initialized Feb 9 19:37:20.117550 kernel: x86/mm: Memory block size: 128MB Feb 9 19:37:20.117567 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Feb 9 19:37:20.117585 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:37:20.117603 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:37:20.117624 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:37:20.117642 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:37:20.117677 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:37:20.117694 kernel: audit: type=2000 audit(1707507438.706:1): state=initialized audit_enabled=0 res=1 Feb 9 19:37:20.117710 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:37:20.117727 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:37:20.117744 kernel: cpuidle: using governor menu Feb 9 19:37:20.117761 kernel: ACPI: bus type PCI registered Feb 9 19:37:20.117778 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:37:20.117799 kernel: dca service started, version 1.12.1 Feb 9 19:37:20.117816 kernel: PCI: Using configuration type 1 for base access Feb 9 19:37:20.117833 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:37:20.117851 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:37:20.117866 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:37:20.117882 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:37:20.117899 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:37:20.117916 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:37:20.117933 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:37:20.117953 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:37:20.117970 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:37:20.117988 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:37:20.118005 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 9 19:37:20.118022 kernel: ACPI: Interpreter enabled Feb 9 19:37:20.118045 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 19:37:20.118063 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:37:20.118080 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:37:20.118097 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 9 19:37:20.118118 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 19:37:20.118348 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:37:20.118510 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 19:37:20.118533 kernel: PCI host bridge to bus 0000:00 Feb 9 19:37:20.118700 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 19:37:20.118848 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 19:37:20.118995 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 19:37:20.119146 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Feb 9 19:37:20.119287 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 19:37:20.119466 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 19:37:20.119636 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Feb 9 19:37:20.119826 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 19:37:20.119982 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 19:37:20.120159 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Feb 9 19:37:20.120313 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Feb 9 19:37:20.120467 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Feb 9 19:37:20.120686 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 9 19:37:20.120868 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Feb 9 19:37:20.121041 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Feb 9 19:37:20.121216 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 19:37:20.121378 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 9 19:37:20.121542 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Feb 9 19:37:20.121565 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 19:37:20.121583 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 19:37:20.121601 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 19:37:20.121619 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 19:37:20.121636 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 19:37:20.121672 kernel: iommu: Default domain type: Translated Feb 9 19:37:20.121690 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:37:20.121708 kernel: vgaarb: loaded Feb 9 19:37:20.121726 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:37:20.121743 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:37:20.121761 kernel: PTP clock support registered Feb 9 19:37:20.121778 kernel: Registered efivars operations Feb 9 19:37:20.121796 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:37:20.121814 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 19:37:20.121835 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Feb 9 19:37:20.121853 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Feb 9 19:37:20.121870 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Feb 9 19:37:20.121887 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Feb 9 19:37:20.121904 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 19:37:20.121922 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:37:20.121940 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:37:20.121958 kernel: pnp: PnP ACPI init Feb 9 19:37:20.121976 kernel: pnp: PnP ACPI: found 7 devices Feb 9 19:37:20.121996 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:37:20.122013 kernel: NET: Registered PF_INET protocol family Feb 9 19:37:20.122038 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:37:20.122057 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 9 19:37:20.122074 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:37:20.122092 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:37:20.122110 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 19:37:20.122128 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 9 19:37:20.122145 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:37:20.122166 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:37:20.122184 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:37:20.122202 kernel: NET: Registered PF_XDP protocol family Feb 9 19:37:20.122359 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 19:37:20.122504 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 19:37:20.122668 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 19:37:20.122816 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Feb 9 19:37:20.122976 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 19:37:20.123004 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:37:20.123021 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 19:37:20.123049 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Feb 9 19:37:20.123066 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 19:37:20.123084 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 9 19:37:20.123101 kernel: clocksource: Switched to clocksource tsc Feb 9 19:37:20.123117 kernel: Initialise system trusted keyrings Feb 9 19:37:20.123132 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 9 19:37:20.123152 kernel: Key type asymmetric registered Feb 9 19:37:20.123167 kernel: Asymmetric key parser 'x509' registered Feb 9 19:37:20.123183 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:37:20.123199 kernel: io scheduler mq-deadline registered Feb 9 19:37:20.123215 kernel: io scheduler kyber registered Feb 9 19:37:20.123232 kernel: io scheduler bfq registered Feb 9 19:37:20.123246 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:37:20.123264 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 19:37:20.123437 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Feb 9 19:37:20.123462 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 9 19:37:20.123615 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Feb 9 19:37:20.123635 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 19:37:20.123887 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Feb 9 19:37:20.123910 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:37:20.123928 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:37:20.123945 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 19:37:20.123963 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Feb 9 19:37:20.123980 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Feb 9 19:37:20.124163 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Feb 9 19:37:20.124188 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 19:37:20.124205 kernel: i8042: Warning: Keylock active Feb 9 19:37:20.124222 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 19:37:20.124240 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 19:37:20.124395 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 9 19:37:20.124541 kernel: rtc_cmos 00:00: registered as rtc0 Feb 9 19:37:20.124705 kernel: rtc_cmos 00:00: setting system clock to 2024-02-09T19:37:19 UTC (1707507439) Feb 9 19:37:20.131823 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 9 19:37:20.131869 kernel: intel_pstate: CPU model not supported Feb 9 19:37:20.131887 kernel: pstore: Registered efi as persistent store backend Feb 9 19:37:20.131903 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:37:20.131919 kernel: Segment Routing with IPv6 Feb 9 19:37:20.131935 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:37:20.131952 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:37:20.131968 kernel: Key type dns_resolver registered Feb 9 19:37:20.131992 kernel: IPI shorthand broadcast: enabled Feb 9 19:37:20.132008 kernel: sched_clock: Marking stable (761522346, 186004621)->(1012913138, -65386171) Feb 9 19:37:20.132024 kernel: registered taskstats version 1 Feb 9 19:37:20.132049 kernel: Loading compiled-in X.509 certificates Feb 9 19:37:20.132066 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 19:37:20.132082 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:37:20.132098 kernel: Key type .fscrypt registered Feb 9 19:37:20.132114 kernel: Key type fscrypt-provisioning registered Feb 9 19:37:20.132130 kernel: pstore: Using crash dump compression: deflate Feb 9 19:37:20.132149 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:37:20.132166 kernel: ima: No architecture policies found Feb 9 19:37:20.132183 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:37:20.132199 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:37:20.132215 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:37:20.132231 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:37:20.132247 kernel: Run /init as init process Feb 9 19:37:20.132264 kernel: with arguments: Feb 9 19:37:20.132283 kernel: /init Feb 9 19:37:20.132299 kernel: with environment: Feb 9 19:37:20.132314 kernel: HOME=/ Feb 9 19:37:20.132330 kernel: TERM=linux Feb 9 19:37:20.132346 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:37:20.132366 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:37:20.132386 systemd[1]: Detected virtualization kvm. Feb 9 19:37:20.132403 systemd[1]: Detected architecture x86-64. Feb 9 19:37:20.132423 systemd[1]: Running in initrd. Feb 9 19:37:20.132438 systemd[1]: No hostname configured, using default hostname. Feb 9 19:37:20.132452 systemd[1]: Hostname set to . Feb 9 19:37:20.132468 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:37:20.132483 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:37:20.132499 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:37:20.132515 systemd[1]: Reached target cryptsetup.target. Feb 9 19:37:20.132532 systemd[1]: Reached target paths.target. Feb 9 19:37:20.132553 systemd[1]: Reached target slices.target. Feb 9 19:37:20.132569 systemd[1]: Reached target swap.target. Feb 9 19:37:20.132586 systemd[1]: Reached target timers.target. Feb 9 19:37:20.132603 systemd[1]: Listening on iscsid.socket. Feb 9 19:37:20.132620 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:37:20.132637 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:37:20.132676 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:37:20.132693 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:37:20.132713 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:37:20.132730 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:37:20.132748 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:37:20.132765 systemd[1]: Reached target sockets.target. Feb 9 19:37:20.132783 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:37:20.132800 systemd[1]: Finished network-cleanup.service. Feb 9 19:37:20.132816 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:37:20.132834 systemd[1]: Starting systemd-journald.service... Feb 9 19:37:20.132851 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:37:20.132873 systemd[1]: Starting systemd-resolved.service... Feb 9 19:37:20.132890 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:37:20.132925 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:37:20.132952 systemd-journald[189]: Journal started Feb 9 19:37:20.133046 systemd-journald[189]: Runtime Journal (/run/log/journal/e880b52abaf83cbb33a8b13c780d1f90) is 8.0M, max 148.8M, 140.8M free. Feb 9 19:37:20.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.145670 kernel: audit: type=1130 audit(1707507440.139:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.145713 systemd[1]: Started systemd-journald.service. Feb 9 19:37:20.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.150075 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:37:20.167825 kernel: audit: type=1130 audit(1707507440.147:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.167866 kernel: audit: type=1130 audit(1707507440.156:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.150114 systemd-modules-load[190]: Inserted module 'overlay' Feb 9 19:37:20.158154 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:37:20.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.181433 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:37:20.195899 kernel: audit: type=1130 audit(1707507440.178:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.195943 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:37:20.191126 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:37:20.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.205827 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:37:20.210681 kernel: audit: type=1130 audit(1707507440.204:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.210731 kernel: Bridge firewalling registered Feb 9 19:37:20.211483 systemd-modules-load[190]: Inserted module 'br_netfilter' Feb 9 19:37:20.217722 systemd-resolved[191]: Positive Trust Anchors: Feb 9 19:37:20.218168 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:37:20.220756 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:37:20.229742 systemd-resolved[191]: Defaulting to hostname 'linux'. Feb 9 19:37:20.231946 systemd[1]: Started systemd-resolved.service. Feb 9 19:37:20.232134 systemd[1]: Reached target nss-lookup.target. Feb 9 19:37:20.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.236676 kernel: audit: type=1130 audit(1707507440.230:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.240488 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:37:20.251202 kernel: audit: type=1130 audit(1707507440.243:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.250080 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:37:20.254774 kernel: SCSI subsystem initialized Feb 9 19:37:20.266352 dracut-cmdline[205]: dracut-dracut-053 Feb 9 19:37:20.270429 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:37:20.285841 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:37:20.285881 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:37:20.285903 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:37:20.286605 systemd-modules-load[190]: Inserted module 'dm_multipath' Feb 9 19:37:20.288065 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:37:20.302165 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:37:20.311816 kernel: audit: type=1130 audit(1707507440.299:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.319197 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:37:20.330809 kernel: audit: type=1130 audit(1707507440.322:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.363676 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:37:20.378682 kernel: iscsi: registered transport (tcp) Feb 9 19:37:20.403129 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:37:20.403227 kernel: QLogic iSCSI HBA Driver Feb 9 19:37:20.448207 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:37:20.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.450527 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:37:20.510706 kernel: raid6: avx2x4 gen() 17891 MB/s Feb 9 19:37:20.526716 kernel: raid6: avx2x4 xor() 7923 MB/s Feb 9 19:37:20.544701 kernel: raid6: avx2x2 gen() 17982 MB/s Feb 9 19:37:20.562713 kernel: raid6: avx2x2 xor() 18470 MB/s Feb 9 19:37:20.580707 kernel: raid6: avx2x1 gen() 13729 MB/s Feb 9 19:37:20.598701 kernel: raid6: avx2x1 xor() 16089 MB/s Feb 9 19:37:20.615703 kernel: raid6: sse2x4 gen() 11018 MB/s Feb 9 19:37:20.633698 kernel: raid6: sse2x4 xor() 6637 MB/s Feb 9 19:37:20.650712 kernel: raid6: sse2x2 gen() 11827 MB/s Feb 9 19:37:20.668697 kernel: raid6: sse2x2 xor() 7337 MB/s Feb 9 19:37:20.685692 kernel: raid6: sse2x1 gen() 10379 MB/s Feb 9 19:37:20.704132 kernel: raid6: sse2x1 xor() 5148 MB/s Feb 9 19:37:20.704205 kernel: raid6: using algorithm avx2x2 gen() 17982 MB/s Feb 9 19:37:20.704228 kernel: raid6: .... xor() 18470 MB/s, rmw enabled Feb 9 19:37:20.705017 kernel: raid6: using avx2x2 recovery algorithm Feb 9 19:37:20.720691 kernel: xor: automatically using best checksumming function avx Feb 9 19:37:20.829694 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:37:20.841835 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:37:20.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.841000 audit: BPF prog-id=7 op=LOAD Feb 9 19:37:20.841000 audit: BPF prog-id=8 op=LOAD Feb 9 19:37:20.844236 systemd[1]: Starting systemd-udevd.service... Feb 9 19:37:20.860923 systemd-udevd[388]: Using default interface naming scheme 'v252'. Feb 9 19:37:20.868301 systemd[1]: Started systemd-udevd.service. Feb 9 19:37:20.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.873051 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:37:20.893790 dracut-pre-trigger[398]: rd.md=0: removing MD RAID activation Feb 9 19:37:20.933520 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:37:20.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:20.934829 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:37:20.999394 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:37:21.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:21.093680 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:37:21.093751 kernel: scsi host0: Virtio SCSI HBA Feb 9 19:37:21.142770 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:37:21.158692 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Feb 9 19:37:21.169872 kernel: AES CTR mode by8 optimization enabled Feb 9 19:37:21.259140 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Feb 9 19:37:21.259509 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Feb 9 19:37:21.259720 kernel: sd 0:0:1:0: [sda] Write Protect is off Feb 9 19:37:21.273458 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Feb 9 19:37:21.273831 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 19:37:21.292271 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:37:21.292380 kernel: GPT:17805311 != 25165823 Feb 9 19:37:21.292403 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:37:21.298512 kernel: GPT:17805311 != 25165823 Feb 9 19:37:21.302222 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:37:21.307582 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:37:21.319713 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Feb 9 19:37:21.374684 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (437) Feb 9 19:37:21.388022 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:37:21.407837 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:37:21.413001 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:37:21.448664 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:37:21.464213 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:37:21.479130 systemd[1]: Starting disk-uuid.service... Feb 9 19:37:21.504003 disk-uuid[517]: Primary Header is updated. Feb 9 19:37:21.504003 disk-uuid[517]: Secondary Entries is updated. Feb 9 19:37:21.504003 disk-uuid[517]: Secondary Header is updated. Feb 9 19:37:21.536820 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:37:21.536864 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:37:21.558682 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:37:22.548681 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:37:22.549022 disk-uuid[518]: The operation has completed successfully. Feb 9 19:37:22.623954 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:37:22.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:22.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:22.624088 systemd[1]: Finished disk-uuid.service. Feb 9 19:37:22.630471 systemd[1]: Starting verity-setup.service... Feb 9 19:37:22.658174 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 19:37:22.735826 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:37:22.738361 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:37:22.750183 systemd[1]: Finished verity-setup.service. Feb 9 19:37:22.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:22.840505 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:37:22.840314 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:37:22.848117 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:37:22.849085 systemd[1]: Starting ignition-setup.service... Feb 9 19:37:22.884967 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:37:22.885003 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:37:22.885025 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:37:22.898702 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:37:22.905074 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:37:22.915910 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:37:22.933834 systemd[1]: Finished ignition-setup.service. Feb 9 19:37:22.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:22.935599 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:37:23.025478 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:37:23.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:23.025000 audit: BPF prog-id=9 op=LOAD Feb 9 19:37:23.027795 systemd[1]: Starting systemd-networkd.service... Feb 9 19:37:23.064339 systemd-networkd[692]: lo: Link UP Feb 9 19:37:23.064354 systemd-networkd[692]: lo: Gained carrier Feb 9 19:37:23.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:23.065292 systemd-networkd[692]: Enumeration completed Feb 9 19:37:23.065442 systemd[1]: Started systemd-networkd.service. Feb 9 19:37:23.065939 systemd-networkd[692]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:37:23.068509 systemd-networkd[692]: eth0: Link UP Feb 9 19:37:23.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:23.068517 systemd-networkd[692]: eth0: Gained carrier Feb 9 19:37:23.153844 iscsid[702]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:37:23.153844 iscsid[702]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 19:37:23.153844 iscsid[702]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:37:23.153844 iscsid[702]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:37:23.153844 iscsid[702]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:37:23.153844 iscsid[702]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:37:23.153844 iscsid[702]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:37:23.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:23.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:23.073115 systemd[1]: Reached target network.target. Feb 9 19:37:23.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:23.209810 ignition[602]: Ignition 2.14.0 Feb 9 19:37:23.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:23.079762 systemd-networkd[692]: eth0: DHCPv4 address 10.128.0.34/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 9 19:37:23.209829 ignition[602]: Stage: fetch-offline Feb 9 19:37:23.095977 systemd[1]: Starting iscsiuio.service... Feb 9 19:37:23.209917 ignition[602]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:37:23.125934 systemd[1]: Started iscsiuio.service. Feb 9 19:37:23.209959 ignition[602]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:37:23.134290 systemd[1]: Starting iscsid.service... Feb 9 19:37:23.236693 ignition[602]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:37:23.147083 systemd[1]: Started iscsid.service. Feb 9 19:37:23.236913 ignition[602]: parsed url from cmdline: "" Feb 9 19:37:23.162177 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:37:23.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:23.236920 ignition[602]: no config URL provided Feb 9 19:37:23.225148 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:37:23.236927 ignition[602]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:37:23.234013 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:37:23.236938 ignition[602]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:37:23.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:23.242934 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:37:23.236948 ignition[602]: failed to fetch config: resource requires networking Feb 9 19:37:23.250983 systemd[1]: Reached target remote-fs.target. Feb 9 19:37:23.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:23.237358 ignition[602]: Ignition finished successfully Feb 9 19:37:23.269095 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:37:23.341311 ignition[716]: Ignition 2.14.0 Feb 9 19:37:23.286285 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:37:23.341322 ignition[716]: Stage: fetch Feb 9 19:37:23.312310 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:37:23.341492 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:37:23.329138 systemd[1]: Starting ignition-fetch.service... Feb 9 19:37:23.341531 ignition[716]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:37:23.403232 unknown[716]: fetched base config from "system" Feb 9 19:37:23.350035 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:37:23.403242 unknown[716]: fetched base config from "system" Feb 9 19:37:23.350230 ignition[716]: parsed url from cmdline: "" Feb 9 19:37:23.403248 unknown[716]: fetched user config from "gcp" Feb 9 19:37:23.350236 ignition[716]: no config URL provided Feb 9 19:37:23.406380 systemd[1]: Finished ignition-fetch.service. Feb 9 19:37:23.350243 ignition[716]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:37:23.424185 systemd[1]: Starting ignition-kargs.service... Feb 9 19:37:23.350254 ignition[716]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:37:23.464303 systemd[1]: Finished ignition-kargs.service. Feb 9 19:37:23.350294 ignition[716]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Feb 9 19:37:23.474467 systemd[1]: Starting ignition-disks.service... Feb 9 19:37:23.358562 ignition[716]: GET result: OK Feb 9 19:37:23.505138 systemd[1]: Finished ignition-disks.service. Feb 9 19:37:23.358742 ignition[716]: parsing config with SHA512: 7d4a103ee738ded8aff88bb49a926445c9ed8fcd954fbc8abf9397b78c43fbdafa1a035444229d140f8835ecee344941adedc00156c25ecf7b7b0834925525a2 Feb 9 19:37:23.523092 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:37:23.404635 ignition[716]: fetch: fetch complete Feb 9 19:37:23.537923 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:37:23.404665 ignition[716]: fetch: fetch passed Feb 9 19:37:23.538024 systemd[1]: Reached target local-fs.target. Feb 9 19:37:23.404744 ignition[716]: Ignition finished successfully Feb 9 19:37:23.559875 systemd[1]: Reached target sysinit.target. Feb 9 19:37:23.438203 ignition[722]: Ignition 2.14.0 Feb 9 19:37:23.573881 systemd[1]: Reached target basic.target. Feb 9 19:37:23.438211 ignition[722]: Stage: kargs Feb 9 19:37:23.575188 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:37:23.438346 ignition[722]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:37:23.438379 ignition[722]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:37:23.446087 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:37:23.447734 ignition[722]: kargs: kargs passed Feb 9 19:37:23.447794 ignition[722]: Ignition finished successfully Feb 9 19:37:23.485759 ignition[728]: Ignition 2.14.0 Feb 9 19:37:23.485768 ignition[728]: Stage: disks Feb 9 19:37:23.485910 ignition[728]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:37:23.485940 ignition[728]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:37:23.493537 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:37:23.495056 ignition[728]: disks: disks passed Feb 9 19:37:23.495115 ignition[728]: Ignition finished successfully Feb 9 19:37:23.610223 systemd-fsck[736]: ROOT: clean, 602/1628000 files, 124051/1617920 blocks Feb 9 19:37:23.830700 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:37:23.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:23.840082 systemd[1]: Mounting sysroot.mount... Feb 9 19:37:23.865680 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:37:23.871047 systemd[1]: Mounted sysroot.mount. Feb 9 19:37:23.871377 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:37:23.887924 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:37:23.908295 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:37:23.908381 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:37:23.908424 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:37:23.929375 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:37:23.963839 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:37:23.986700 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (742) Feb 9 19:37:23.988536 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:37:24.014251 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:37:24.014295 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:37:24.014318 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:37:24.014493 initrd-setup-root[747]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:37:24.037848 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:37:24.037921 initrd-setup-root[771]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:37:24.047810 initrd-setup-root[781]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:37:24.039769 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:37:24.074789 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:37:24.108537 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:37:24.148840 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 19:37:24.148888 kernel: audit: type=1130 audit(1707507444.107:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:24.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:24.110053 systemd[1]: Starting ignition-mount.service... Feb 9 19:37:24.156941 systemd[1]: Starting sysroot-boot.service... Feb 9 19:37:24.171606 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:37:24.171821 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:37:24.199814 ignition[808]: INFO : Ignition 2.14.0 Feb 9 19:37:24.199814 ignition[808]: INFO : Stage: mount Feb 9 19:37:24.199814 ignition[808]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:37:24.199814 ignition[808]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:37:24.297847 kernel: audit: type=1130 audit(1707507444.205:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:24.297895 kernel: audit: type=1130 audit(1707507444.255:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:24.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:24.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:24.200193 systemd[1]: Finished sysroot-boot.service. Feb 9 19:37:24.311853 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:37:24.311853 ignition[808]: INFO : mount: mount passed Feb 9 19:37:24.311853 ignition[808]: INFO : Ignition finished successfully Feb 9 19:37:24.375815 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (817) Feb 9 19:37:24.375858 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:37:24.375881 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:37:24.375904 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:37:24.375925 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:37:24.207324 systemd[1]: Finished ignition-mount.service. Feb 9 19:37:24.258406 systemd[1]: Starting ignition-files.service... Feb 9 19:37:24.309265 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:37:24.408909 ignition[836]: INFO : Ignition 2.14.0 Feb 9 19:37:24.408909 ignition[836]: INFO : Stage: files Feb 9 19:37:24.408909 ignition[836]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:37:24.408909 ignition[836]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:37:24.408909 ignition[836]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:37:24.371059 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:37:24.473824 ignition[836]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:37:24.473824 ignition[836]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:37:24.473824 ignition[836]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:37:24.473824 ignition[836]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:37:24.473824 ignition[836]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:37:24.473824 ignition[836]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:37:24.473824 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:37:24.473824 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 19:37:24.439110 unknown[836]: wrote ssh authorized keys file for user: core Feb 9 19:37:24.531844 systemd-networkd[692]: eth0: Gained IPv6LL Feb 9 19:37:24.751684 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:37:24.954551 ignition[836]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 19:37:24.978804 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:37:24.978804 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:37:24.978804 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 19:37:25.287970 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:37:25.418117 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:37:25.446808 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (840) Feb 9 19:37:25.446850 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/hosts" Feb 9 19:37:25.446850 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:37:25.446850 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1759523465" Feb 9 19:37:25.446850 ignition[836]: CRITICAL : files: createFilesystemsFiles: createFiles: op(5): op(6): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1759523465": device or resource busy Feb 9 19:37:25.446850 ignition[836]: ERROR : files: createFilesystemsFiles: createFiles: op(5): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1759523465", trying btrfs: device or resource busy Feb 9 19:37:25.446850 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1759523465" Feb 9 19:37:25.446850 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1759523465" Feb 9 19:37:25.568834 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [started] unmounting "/mnt/oem1759523465" Feb 9 19:37:25.568834 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [finished] unmounting "/mnt/oem1759523465" Feb 9 19:37:25.568834 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/hosts" Feb 9 19:37:25.568834 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:37:25.568834 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:37:25.450076 systemd[1]: mnt-oem1759523465.mount: Deactivated successfully. Feb 9 19:37:25.657849 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Feb 9 19:37:25.756756 ignition[836]: DEBUG : files: createFilesystemsFiles: createFiles: op(9): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 19:37:25.780810 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:37:25.780810 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:37:25.780810 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 9 19:37:25.834444 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Feb 9 19:37:26.106572 ignition[836]: DEBUG : files: createFilesystemsFiles: createFiles: op(a): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 9 19:37:26.130820 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:37:26.130820 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 9 19:37:26.130820 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:37:26.130820 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem934830877" Feb 9 19:37:26.130820 ignition[836]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem934830877": device or resource busy Feb 9 19:37:26.130820 ignition[836]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem934830877", trying btrfs: device or resource busy Feb 9 19:37:26.130820 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem934830877" Feb 9 19:37:26.130820 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem934830877" Feb 9 19:37:26.130820 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem934830877" Feb 9 19:37:26.130820 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem934830877" Feb 9 19:37:26.130820 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 9 19:37:26.130820 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:37:26.130820 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:37:26.124172 systemd[1]: mnt-oem934830877.mount: Deactivated successfully. Feb 9 19:37:26.358830 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Feb 9 19:37:26.358830 ignition[836]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 19:37:26.358830 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:37:26.358830 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:37:26.358830 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:37:26.440877 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET result: OK Feb 9 19:37:26.956342 ignition[836]: DEBUG : files: createFilesystemsFiles: createFiles: op(10): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(14): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(14): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(15): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(15): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:37:26.981837 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1423753498" Feb 9 19:37:27.433964 kernel: audit: type=1130 audit(1707507447.036:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.434018 kernel: audit: type=1130 audit(1707507447.125:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.434037 kernel: audit: type=1130 audit(1707507447.183:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.434058 kernel: audit: type=1131 audit(1707507447.183:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.434073 kernel: audit: type=1130 audit(1707507447.292:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.434099 kernel: audit: type=1131 audit(1707507447.292:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.434396 ignition[836]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1423753498": device or resource busy Feb 9 19:37:27.434396 ignition[836]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1423753498", trying btrfs: device or resource busy Feb 9 19:37:27.434396 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1423753498" Feb 9 19:37:27.434396 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1423753498" Feb 9 19:37:27.434396 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem1423753498" Feb 9 19:37:27.434396 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem1423753498" Feb 9 19:37:27.434396 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 9 19:37:27.434396 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 9 19:37:27.434396 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:37:27.434396 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3183385958" Feb 9 19:37:27.434396 ignition[836]: CRITICAL : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3183385958": device or resource busy Feb 9 19:37:27.434396 ignition[836]: ERROR : files: createFilesystemsFiles: createFiles: op(1b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3183385958", trying btrfs: device or resource busy Feb 9 19:37:27.434396 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3183385958" Feb 9 19:37:27.434396 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3183385958" Feb 9 19:37:27.739001 kernel: audit: type=1130 audit(1707507447.441:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:26.989069 systemd[1]: mnt-oem1423753498.mount: Deactivated successfully. Feb 9 19:37:27.770863 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [started] unmounting "/mnt/oem3183385958" Feb 9 19:37:27.770863 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [finished] unmounting "/mnt/oem3183385958" Feb 9 19:37:27.770863 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(1f): [started] processing unit "oem-gce-enable-oslogin.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(1f): [finished] processing unit "oem-gce-enable-oslogin.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(20): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(20): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(21): [started] processing unit "oem-gce.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(21): [finished] processing unit "oem-gce.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(22): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(22): op(23): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(22): op(23): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(22): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(24): [started] processing unit "prepare-critools.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(24): op(25): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(24): op(25): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(24): [finished] processing unit "prepare-critools.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(26): [started] processing unit "prepare-helm.service" Feb 9 19:37:27.770863 ignition[836]: INFO : files: op(26): op(27): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:37:27.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.019795 systemd[1]: Finished ignition-files.service. Feb 9 19:37:28.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(26): op(27): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(26): [finished] processing unit "prepare-helm.service" Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(28): [started] setting preset to enabled for "oem-gce.service" Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(28): [finished] setting preset to enabled for "oem-gce.service" Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(29): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(29): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(2a): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(2a): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(2b): [started] setting preset to enabled for "prepare-helm.service" Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(2b): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(2c): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(2c): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(2d): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:37:28.150094 ignition[836]: INFO : files: op(2d): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:37:28.150094 ignition[836]: INFO : files: createResultFile: createFiles: op(2e): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:37:28.150094 ignition[836]: INFO : files: createResultFile: createFiles: op(2e): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:37:28.150094 ignition[836]: INFO : files: files passed Feb 9 19:37:28.150094 ignition[836]: INFO : Ignition finished successfully Feb 9 19:37:28.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.490307 initrd-setup-root-after-ignition[859]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:37:27.048994 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:37:27.073028 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:37:28.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.074161 systemd[1]: Starting ignition-quench.service... Feb 9 19:37:28.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.102242 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:37:27.129392 systemd[1]: mnt-oem3183385958.mount: Deactivated successfully. Feb 9 19:37:27.130133 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:37:28.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.130278 systemd[1]: Finished ignition-quench.service. Feb 9 19:37:28.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.629968 ignition[874]: INFO : Ignition 2.14.0 Feb 9 19:37:28.629968 ignition[874]: INFO : Stage: umount Feb 9 19:37:28.629968 ignition[874]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:37:28.629968 ignition[874]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:37:28.629968 ignition[874]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:37:28.629968 ignition[874]: INFO : umount: umount passed Feb 9 19:37:28.629968 ignition[874]: INFO : Ignition finished successfully Feb 9 19:37:28.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.638000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:37:28.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.185224 systemd[1]: Reached target ignition-complete.target. Feb 9 19:37:28.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.249961 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:37:27.278222 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:37:27.278344 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:37:28.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.294128 systemd[1]: Reached target initrd-fs.target. Feb 9 19:37:28.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.370989 systemd[1]: Reached target initrd.target. Feb 9 19:37:28.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.388116 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:37:27.389418 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:37:27.417172 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:37:28.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.444367 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:37:28.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.518145 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:37:28.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:28.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:27.526187 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:37:27.548235 systemd[1]: Stopped target timers.target. Feb 9 19:37:27.590158 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:37:27.590410 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:37:27.607347 systemd[1]: Stopped target initrd.target. Feb 9 19:37:27.653039 systemd[1]: Stopped target basic.target. Feb 9 19:37:28.988858 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Feb 9 19:37:28.988919 iscsid[702]: iscsid shutting down. Feb 9 19:37:27.670234 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:37:27.722125 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:37:27.763132 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:37:27.779128 systemd[1]: Stopped target remote-fs.target. Feb 9 19:37:27.794172 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:37:27.839158 systemd[1]: Stopped target sysinit.target. Feb 9 19:37:27.870052 systemd[1]: Stopped target local-fs.target. Feb 9 19:37:27.892112 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:37:27.913030 systemd[1]: Stopped target swap.target. Feb 9 19:37:27.924134 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:37:27.924345 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:37:27.959373 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:37:27.985060 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:37:27.985414 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:37:28.003300 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:37:28.003488 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:37:28.021258 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:37:28.021438 systemd[1]: Stopped ignition-files.service. Feb 9 19:37:28.065460 systemd[1]: Stopping ignition-mount.service... Feb 9 19:37:28.094354 systemd[1]: Stopping iscsiuio.service... Feb 9 19:37:28.117839 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:37:28.118118 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:37:28.144452 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:37:28.156826 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:37:28.157114 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:37:28.182213 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:37:28.182408 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:37:28.205213 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:37:28.206032 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:37:28.206182 systemd[1]: Stopped iscsiuio.service. Feb 9 19:37:28.222604 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:37:28.222767 systemd[1]: Stopped ignition-mount.service. Feb 9 19:37:28.254568 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:37:28.254723 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:37:28.267740 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:37:28.267894 systemd[1]: Stopped ignition-disks.service. Feb 9 19:37:28.303989 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:37:28.304140 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:37:28.317137 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:37:28.317220 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:37:28.356940 systemd[1]: Stopped target network.target. Feb 9 19:37:28.378844 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:37:28.378958 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:37:28.401979 systemd[1]: Stopped target paths.target. Feb 9 19:37:28.422844 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:37:28.426798 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:37:28.446841 systemd[1]: Stopped target slices.target. Feb 9 19:37:28.467840 systemd[1]: Stopped target sockets.target. Feb 9 19:37:28.480900 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:37:28.480958 systemd[1]: Closed iscsid.socket. Feb 9 19:37:28.496931 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:37:28.497004 systemd[1]: Closed iscsiuio.socket. Feb 9 19:37:28.517877 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:37:28.517971 systemd[1]: Stopped ignition-setup.service. Feb 9 19:37:28.535936 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:37:28.536015 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:37:28.561111 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:37:28.564724 systemd-networkd[692]: eth0: DHCPv6 lease lost Feb 9 19:37:28.996000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:37:28.574969 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:37:28.591607 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:37:28.591784 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:37:28.607599 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:37:28.607752 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:37:28.623794 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:37:28.623920 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:37:28.640192 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:37:28.640246 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:37:28.647887 systemd[1]: Stopping network-cleanup.service... Feb 9 19:37:28.659970 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:37:28.660050 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:37:28.677129 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:37:28.677201 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:37:28.702192 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:37:28.702261 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:37:28.719315 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:37:28.741477 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:37:28.742116 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:37:28.742276 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:37:28.757606 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:37:28.757730 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:37:28.773997 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:37:28.774060 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:37:28.789867 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:37:28.789964 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:37:28.806970 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:37:28.807049 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:37:28.821952 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:37:28.822026 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:37:28.837997 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:37:28.862811 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:37:28.863020 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:37:28.879634 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:37:28.879833 systemd[1]: Stopped network-cleanup.service. Feb 9 19:37:28.894324 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:37:28.894436 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:37:28.910213 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:37:28.927077 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:37:28.949213 systemd[1]: Switching root. Feb 9 19:37:29.000409 systemd-journald[189]: Journal stopped Feb 9 19:37:33.690287 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:37:33.690407 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:37:33.690434 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:37:33.690457 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:37:33.690486 kernel: SELinux: policy capability open_perms=1 Feb 9 19:37:33.690514 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:37:33.690539 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:37:33.690562 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:37:33.690582 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:37:33.690606 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:37:33.691391 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:37:33.691440 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:37:33.691475 kernel: audit: type=1403 audit(1707507449.301:78): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:37:33.691511 systemd[1]: Successfully loaded SELinux policy in 118.917ms. Feb 9 19:37:33.691554 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.817ms. Feb 9 19:37:33.691581 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:37:33.691607 systemd[1]: Detected virtualization kvm. Feb 9 19:37:33.691630 systemd[1]: Detected architecture x86-64. Feb 9 19:37:33.691676 systemd[1]: Detected first boot. Feb 9 19:37:33.691702 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:37:33.691727 kernel: audit: type=1400 audit(1707507449.465:79): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:37:33.691751 kernel: audit: type=1400 audit(1707507449.466:80): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:37:33.691784 kernel: audit: type=1334 audit(1707507449.487:81): prog-id=10 op=LOAD Feb 9 19:37:33.691808 kernel: audit: type=1334 audit(1707507449.487:82): prog-id=10 op=UNLOAD Feb 9 19:37:33.691831 kernel: audit: type=1334 audit(1707507449.507:83): prog-id=11 op=LOAD Feb 9 19:37:33.691854 kernel: audit: type=1334 audit(1707507449.507:84): prog-id=11 op=UNLOAD Feb 9 19:37:33.691879 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:37:33.691901 kernel: audit: type=1400 audit(1707507449.680:85): avc: denied { associate } for pid=907 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:37:33.691927 kernel: audit: type=1300 audit(1707507449.680:85): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=890 pid=907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:33.691955 kernel: audit: type=1327 audit(1707507449.680:85): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:37:33.691971 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:37:33.691987 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:37:33.692003 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:37:33.692020 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:37:33.692038 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:37:33.692053 systemd[1]: Stopped iscsid.service. Feb 9 19:37:33.692068 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:37:33.692082 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:37:33.692097 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:37:33.692113 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:37:33.692128 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:37:33.692143 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 19:37:33.692169 systemd[1]: Created slice system-getty.slice. Feb 9 19:37:33.692184 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:37:33.692199 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:37:33.692214 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:37:33.692228 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:37:33.692243 systemd[1]: Created slice user.slice. Feb 9 19:37:33.692259 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:37:33.692273 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:37:33.692289 systemd[1]: Set up automount boot.automount. Feb 9 19:37:33.692307 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:37:33.692321 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:37:33.692336 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:37:33.692351 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:37:33.692368 systemd[1]: Reached target integritysetup.target. Feb 9 19:37:33.692383 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:37:33.692398 systemd[1]: Reached target remote-fs.target. Feb 9 19:37:33.692413 systemd[1]: Reached target slices.target. Feb 9 19:37:33.692428 systemd[1]: Reached target swap.target. Feb 9 19:37:33.692445 systemd[1]: Reached target torcx.target. Feb 9 19:37:33.692460 systemd[1]: Reached target veritysetup.target. Feb 9 19:37:33.692476 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:37:33.692490 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:37:33.692504 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:37:33.692519 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:37:33.692534 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:37:33.692548 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:37:33.692563 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:37:33.692578 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:37:33.692595 systemd[1]: Mounting media.mount... Feb 9 19:37:33.692611 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:37:33.692625 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:37:33.692640 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:37:33.692692 systemd[1]: Mounting tmp.mount... Feb 9 19:37:33.692709 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:37:33.692724 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:37:33.692739 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:37:33.692754 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:37:33.692772 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:37:33.692793 systemd[1]: Starting modprobe@drm.service... Feb 9 19:37:33.692816 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:37:33.692840 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:37:33.692863 systemd[1]: Starting modprobe@loop.service... Feb 9 19:37:33.692886 kernel: fuse: init (API version 7.34) Feb 9 19:37:33.692906 kernel: loop: module loaded Feb 9 19:37:33.692921 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:37:33.692936 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:37:33.692955 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:37:33.692969 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:37:33.692984 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:37:33.692999 systemd[1]: Stopped systemd-journald.service. Feb 9 19:37:33.693013 systemd[1]: Starting systemd-journald.service... Feb 9 19:37:33.693028 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:37:33.693043 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:37:33.693062 systemd-journald[997]: Journal started Feb 9 19:37:33.693149 systemd-journald[997]: Runtime Journal (/run/log/journal/e880b52abaf83cbb33a8b13c780d1f90) is 8.0M, max 148.8M, 140.8M free. Feb 9 19:37:29.301000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:37:29.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:37:29.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:37:29.487000 audit: BPF prog-id=10 op=LOAD Feb 9 19:37:29.487000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:37:29.507000 audit: BPF prog-id=11 op=LOAD Feb 9 19:37:29.507000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:37:29.680000 audit[907]: AVC avc: denied { associate } for pid=907 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:37:29.680000 audit[907]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=890 pid=907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:29.680000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:37:29.691000 audit[907]: AVC avc: denied { associate } for pid=907 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:37:29.691000 audit[907]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=890 pid=907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:29.691000 audit: CWD cwd="/" Feb 9 19:37:29.691000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:29.691000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:29.691000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:37:32.845000 audit: BPF prog-id=12 op=LOAD Feb 9 19:37:32.846000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:37:32.846000 audit: BPF prog-id=13 op=LOAD Feb 9 19:37:32.846000 audit: BPF prog-id=14 op=LOAD Feb 9 19:37:32.846000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:37:32.846000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:37:32.846000 audit: BPF prog-id=15 op=LOAD Feb 9 19:37:32.846000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:37:32.847000 audit: BPF prog-id=16 op=LOAD Feb 9 19:37:32.847000 audit: BPF prog-id=17 op=LOAD Feb 9 19:37:32.847000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:37:32.847000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:37:32.848000 audit: BPF prog-id=18 op=LOAD Feb 9 19:37:32.848000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:37:32.848000 audit: BPF prog-id=19 op=LOAD Feb 9 19:37:32.848000 audit: BPF prog-id=20 op=LOAD Feb 9 19:37:32.848000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:37:32.848000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:37:32.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:32.862000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:37:32.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:32.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:32.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.646000 audit: BPF prog-id=21 op=LOAD Feb 9 19:37:33.646000 audit: BPF prog-id=22 op=LOAD Feb 9 19:37:33.646000 audit: BPF prog-id=23 op=LOAD Feb 9 19:37:33.646000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:37:33.646000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:37:33.685000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:37:33.685000 audit[997]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe68c12f90 a2=4000 a3=7ffe68c1302c items=0 ppid=1 pid=997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:33.685000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:37:32.845022 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:37:29.676823 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:37:32.851053 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:37:29.678159 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:37:29.678212 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:37:29.678266 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:37:29.678285 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:37:29.678346 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:37:29.678370 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:37:29.678695 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:37:29.678773 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:37:29.678798 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:37:29.681226 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:37:29.681291 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:37:29.681327 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:37:29.681355 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:37:29.681387 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:37:29.681413 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:37:32.232528 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:32Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:37:32.232846 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:32Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:37:32.232986 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:32Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:37:32.233211 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:32Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:37:32.233272 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:32Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:37:32.233343 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:37:32Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:37:33.704696 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:37:33.719681 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:37:33.738028 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:37:33.738128 systemd[1]: Stopped verity-setup.service. Feb 9 19:37:33.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.759978 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:37:33.768675 systemd[1]: Started systemd-journald.service. Feb 9 19:37:33.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.779184 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:37:33.787051 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:37:33.794034 systemd[1]: Mounted media.mount. Feb 9 19:37:33.801031 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:37:33.810014 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:37:33.818984 systemd[1]: Mounted tmp.mount. Feb 9 19:37:33.827157 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:37:33.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.836253 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:37:33.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.845204 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:37:33.845428 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:37:33.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.854246 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:37:33.854461 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:37:33.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.863255 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:37:33.863464 systemd[1]: Finished modprobe@drm.service. Feb 9 19:37:33.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.872244 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:37:33.872448 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:37:33.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.881236 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:37:33.881447 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:37:33.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.890167 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:37:33.890363 systemd[1]: Finished modprobe@loop.service. Feb 9 19:37:33.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.899204 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:37:33.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.909322 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:37:33.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.918229 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:37:33.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.927208 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:37:33.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:33.937673 systemd[1]: Reached target network-pre.target. Feb 9 19:37:33.947334 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:37:33.957368 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:37:33.964808 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:37:33.967712 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:37:33.976693 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:37:33.985838 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:37:33.987620 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:37:33.994847 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:37:33.996657 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:37:34.003264 systemd-journald[997]: Time spent on flushing to /var/log/journal/e880b52abaf83cbb33a8b13c780d1f90 is 48.929ms for 1190 entries. Feb 9 19:37:34.003264 systemd-journald[997]: System Journal (/var/log/journal/e880b52abaf83cbb33a8b13c780d1f90) is 8.0M, max 584.8M, 576.8M free. Feb 9 19:37:34.080951 systemd-journald[997]: Received client request to flush runtime journal. Feb 9 19:37:34.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:34.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:34.013700 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:37:34.023884 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:37:34.034722 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:37:34.043971 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:37:34.053267 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:37:34.062314 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:37:34.074491 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:37:34.083539 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:37:34.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:34.094972 udevadm[1011]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 19:37:34.097470 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:37:34.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:34.700285 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:37:34.737113 kernel: kauditd_printk_skb: 65 callbacks suppressed Feb 9 19:37:34.737239 kernel: audit: type=1130 audit(1707507454.707:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:34.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:34.740583 kernel: audit: type=1334 audit(1707507454.735:145): prog-id=24 op=LOAD Feb 9 19:37:34.735000 audit: BPF prog-id=24 op=LOAD Feb 9 19:37:34.738376 systemd[1]: Starting systemd-udevd.service... Feb 9 19:37:34.735000 audit: BPF prog-id=25 op=LOAD Feb 9 19:37:34.735000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:37:34.735000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:37:34.744685 kernel: audit: type=1334 audit(1707507454.735:146): prog-id=25 op=LOAD Feb 9 19:37:34.744724 kernel: audit: type=1334 audit(1707507454.735:147): prog-id=7 op=UNLOAD Feb 9 19:37:34.744755 kernel: audit: type=1334 audit(1707507454.735:148): prog-id=8 op=UNLOAD Feb 9 19:37:34.784066 systemd-udevd[1014]: Using default interface naming scheme 'v252'. Feb 9 19:37:34.841721 systemd[1]: Started systemd-udevd.service. Feb 9 19:37:34.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:34.872721 kernel: audit: type=1130 audit(1707507454.848:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:34.878000 audit: BPF prog-id=26 op=LOAD Feb 9 19:37:34.888203 systemd[1]: Starting systemd-networkd.service... Feb 9 19:37:34.888707 kernel: audit: type=1334 audit(1707507454.878:150): prog-id=26 op=LOAD Feb 9 19:37:34.902000 audit: BPF prog-id=27 op=LOAD Feb 9 19:37:34.911674 kernel: audit: type=1334 audit(1707507454.902:151): prog-id=27 op=LOAD Feb 9 19:37:34.909000 audit: BPF prog-id=28 op=LOAD Feb 9 19:37:34.913709 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:37:34.909000 audit: BPF prog-id=29 op=LOAD Feb 9 19:37:34.928718 kernel: audit: type=1334 audit(1707507454.909:152): prog-id=28 op=LOAD Feb 9 19:37:34.928831 kernel: audit: type=1334 audit(1707507454.909:153): prog-id=29 op=LOAD Feb 9 19:37:34.953383 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:37:35.008454 systemd[1]: Started systemd-userdbd.service. Feb 9 19:37:35.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:35.080011 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 19:37:35.116851 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1024) Feb 9 19:37:35.145710 kernel: ACPI: button: Power Button [PWRF] Feb 9 19:37:35.159747 systemd-networkd[1028]: lo: Link UP Feb 9 19:37:35.159759 systemd-networkd[1028]: lo: Gained carrier Feb 9 19:37:35.160468 systemd-networkd[1028]: Enumeration completed Feb 9 19:37:35.160616 systemd[1]: Started systemd-networkd.service. Feb 9 19:37:35.161319 systemd-networkd[1028]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:37:35.163449 systemd-networkd[1028]: eth0: Link UP Feb 9 19:37:35.163461 systemd-networkd[1028]: eth0: Gained carrier Feb 9 19:37:35.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:35.178876 systemd-networkd[1028]: eth0: DHCPv4 address 10.128.0.34/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 9 19:37:35.198770 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Feb 9 19:37:35.213681 kernel: EDAC MC: Ver: 3.0.0 Feb 9 19:37:35.186000 audit[1042]: AVC avc: denied { confidentiality } for pid=1042 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:37:35.186000 audit[1042]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561351a38ac0 a1=32194 a2=7fd8e0c5abc5 a3=5 items=108 ppid=1014 pid=1042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:35.186000 audit: CWD cwd="/" Feb 9 19:37:35.186000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=1 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=2 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=3 name=(null) inode=14362 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=4 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=5 name=(null) inode=14363 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=6 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=7 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=8 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=9 name=(null) inode=14365 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=10 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=11 name=(null) inode=14366 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=12 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=13 name=(null) inode=14367 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=14 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=15 name=(null) inode=14368 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=16 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=17 name=(null) inode=14369 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=18 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=19 name=(null) inode=14370 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=20 name=(null) inode=14370 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=21 name=(null) inode=14371 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=22 name=(null) inode=14370 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=23 name=(null) inode=14372 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=24 name=(null) inode=14370 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=25 name=(null) inode=14373 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=26 name=(null) inode=14370 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=27 name=(null) inode=14374 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=28 name=(null) inode=14370 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=29 name=(null) inode=14375 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=30 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=31 name=(null) inode=14376 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=32 name=(null) inode=14376 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=33 name=(null) inode=14377 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=34 name=(null) inode=14376 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=35 name=(null) inode=14378 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=36 name=(null) inode=14376 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=37 name=(null) inode=14379 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=38 name=(null) inode=14376 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=39 name=(null) inode=14380 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=40 name=(null) inode=14376 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=41 name=(null) inode=14381 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=42 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=43 name=(null) inode=14382 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=44 name=(null) inode=14382 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=45 name=(null) inode=14383 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=46 name=(null) inode=14382 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=47 name=(null) inode=14384 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=48 name=(null) inode=14382 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=49 name=(null) inode=14385 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=50 name=(null) inode=14382 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=51 name=(null) inode=14386 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=52 name=(null) inode=14382 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=53 name=(null) inode=14387 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=55 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=56 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=57 name=(null) inode=14389 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=58 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=59 name=(null) inode=14390 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=60 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=61 name=(null) inode=14391 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=62 name=(null) inode=14391 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=63 name=(null) inode=14392 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=64 name=(null) inode=14391 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=65 name=(null) inode=14393 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=66 name=(null) inode=14391 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=67 name=(null) inode=14394 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=68 name=(null) inode=14391 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=69 name=(null) inode=14395 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=70 name=(null) inode=14391 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=71 name=(null) inode=14396 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=72 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=73 name=(null) inode=14397 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=74 name=(null) inode=14397 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=75 name=(null) inode=14398 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=76 name=(null) inode=14397 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=77 name=(null) inode=14399 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=78 name=(null) inode=14397 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=79 name=(null) inode=14400 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=80 name=(null) inode=14397 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=81 name=(null) inode=14401 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=82 name=(null) inode=14397 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=83 name=(null) inode=14402 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=84 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=85 name=(null) inode=14403 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=86 name=(null) inode=14403 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=87 name=(null) inode=14404 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=88 name=(null) inode=14403 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=89 name=(null) inode=14405 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=90 name=(null) inode=14403 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=91 name=(null) inode=14406 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=92 name=(null) inode=14403 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=93 name=(null) inode=14407 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=94 name=(null) inode=14403 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=95 name=(null) inode=14408 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=96 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=97 name=(null) inode=14409 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=98 name=(null) inode=14409 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=99 name=(null) inode=14410 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=100 name=(null) inode=14409 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=101 name=(null) inode=14411 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.241662 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:37:35.186000 audit: PATH item=102 name=(null) inode=14409 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=103 name=(null) inode=14412 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=104 name=(null) inode=14409 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=105 name=(null) inode=14413 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=106 name=(null) inode=14409 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PATH item=107 name=(null) inode=14414 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:35.186000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:37:35.266531 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Feb 9 19:37:35.266642 kernel: ACPI: button: Sleep Button [SLPF] Feb 9 19:37:35.279686 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Feb 9 19:37:35.298685 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:37:35.315198 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:37:35.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:35.325574 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:37:35.355814 lvm[1051]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:37:35.390054 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:37:35.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:35.399029 systemd[1]: Reached target cryptsetup.target. Feb 9 19:37:35.409391 systemd[1]: Starting lvm2-activation.service... Feb 9 19:37:35.414927 lvm[1052]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:37:35.443062 systemd[1]: Finished lvm2-activation.service. Feb 9 19:37:35.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:35.452052 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:37:35.460849 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:37:35.460912 systemd[1]: Reached target local-fs.target. Feb 9 19:37:35.469838 systemd[1]: Reached target machines.target. Feb 9 19:37:35.480514 systemd[1]: Starting ldconfig.service... Feb 9 19:37:35.488977 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:37:35.489098 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:37:35.491031 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:37:35.499379 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:37:35.510592 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:37:35.510955 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:37:35.511065 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:37:35.512900 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:37:35.513588 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1054 (bootctl) Feb 9 19:37:35.516941 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:37:35.532923 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:37:35.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:35.566760 systemd-tmpfiles[1058]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:37:35.584539 systemd-tmpfiles[1058]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:37:35.596019 systemd-tmpfiles[1058]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:37:35.672927 systemd-fsck[1063]: fsck.fat 4.2 (2021-01-31) Feb 9 19:37:35.672927 systemd-fsck[1063]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 19:37:35.674099 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:37:35.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:35.685817 systemd[1]: Mounting boot.mount... Feb 9 19:37:35.727550 systemd[1]: Mounted boot.mount. Feb 9 19:37:35.752883 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:37:35.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:35.870798 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:37:35.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:35.883061 systemd[1]: Starting audit-rules.service... Feb 9 19:37:35.891188 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:37:35.899594 systemd[1]: Starting oem-gce-enable-oslogin.service... Feb 9 19:37:35.909717 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:37:35.917000 audit: BPF prog-id=30 op=LOAD Feb 9 19:37:35.920798 systemd[1]: Starting systemd-resolved.service... Feb 9 19:37:35.927000 audit: BPF prog-id=31 op=LOAD Feb 9 19:37:35.930834 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:37:35.940484 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:37:35.949000 audit[1084]: SYSTEM_BOOT pid=1084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:37:35.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:35.948679 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:37:35.960619 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:37:35.975141 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:37:35.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:36.048274 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Feb 9 19:37:36.048530 systemd[1]: Finished oem-gce-enable-oslogin.service. Feb 9 19:37:36.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:36.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:36.082456 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:37:36.083747 systemd-timesyncd[1080]: Contacted time server 169.254.169.254:123 (169.254.169.254). Feb 9 19:37:36.083830 systemd-timesyncd[1080]: Initial clock synchronization to Fri 2024-02-09 19:37:35.994399 UTC. Feb 9 19:37:36.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:36.091113 systemd[1]: Reached target time-set.target. Feb 9 19:37:36.098440 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:37:36.101309 systemd-resolved[1079]: Positive Trust Anchors: Feb 9 19:37:36.101332 systemd-resolved[1079]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:37:36.101521 systemd-resolved[1079]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:37:36.100000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:37:36.100000 audit[1101]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd47d632f0 a2=420 a3=0 items=0 ppid=1066 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:36.100000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:37:36.103069 augenrules[1101]: No rules Feb 9 19:37:36.108180 systemd[1]: Finished audit-rules.service. Feb 9 19:37:36.142143 systemd-resolved[1079]: Defaulting to hostname 'linux'. Feb 9 19:37:36.144783 systemd[1]: Started systemd-resolved.service. Feb 9 19:37:36.152923 systemd[1]: Reached target network.target. Feb 9 19:37:36.161821 systemd[1]: Reached target nss-lookup.target. Feb 9 19:37:36.342991 ldconfig[1053]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:37:36.644830 systemd[1]: Finished ldconfig.service. Feb 9 19:37:36.653800 systemd[1]: Starting systemd-update-done.service... Feb 9 19:37:36.663137 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:37:36.664282 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:37:36.674246 systemd[1]: Finished systemd-update-done.service. Feb 9 19:37:36.683013 systemd[1]: Reached target sysinit.target. Feb 9 19:37:36.691926 systemd[1]: Started motdgen.path. Feb 9 19:37:36.698878 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:37:36.709028 systemd[1]: Started logrotate.timer. Feb 9 19:37:36.716009 systemd[1]: Started mdadm.timer. Feb 9 19:37:36.722826 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:37:36.731835 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:37:36.731906 systemd[1]: Reached target paths.target. Feb 9 19:37:36.738824 systemd[1]: Reached target timers.target. Feb 9 19:37:36.746254 systemd[1]: Listening on dbus.socket. Feb 9 19:37:36.755352 systemd[1]: Starting docker.socket... Feb 9 19:37:36.766908 systemd[1]: Listening on sshd.socket. Feb 9 19:37:36.773954 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:37:36.774760 systemd[1]: Listening on docker.socket. Feb 9 19:37:36.781933 systemd[1]: Reached target sockets.target. Feb 9 19:37:36.790797 systemd[1]: Reached target basic.target. Feb 9 19:37:36.797857 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:37:36.797901 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:37:36.799523 systemd[1]: Starting containerd.service... Feb 9 19:37:36.808194 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 19:37:36.819131 systemd[1]: Starting dbus.service... Feb 9 19:37:36.828784 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:37:36.837818 systemd[1]: Starting extend-filesystems.service... Feb 9 19:37:36.844701 jq[1112]: false Feb 9 19:37:36.846879 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:37:36.848663 systemd[1]: Starting motdgen.service... Feb 9 19:37:36.859600 systemd[1]: Starting oem-gce.service... Feb 9 19:37:36.868350 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:37:36.876852 systemd[1]: Starting prepare-critools.service... Feb 9 19:37:36.885448 systemd[1]: Starting prepare-helm.service... Feb 9 19:37:36.888890 extend-filesystems[1113]: Found sda Feb 9 19:37:36.894766 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:37:36.899246 extend-filesystems[1113]: Found sda1 Feb 9 19:37:36.899246 extend-filesystems[1113]: Found sda2 Feb 9 19:37:36.899246 extend-filesystems[1113]: Found sda3 Feb 9 19:37:36.899246 extend-filesystems[1113]: Found usr Feb 9 19:37:36.899246 extend-filesystems[1113]: Found sda4 Feb 9 19:37:36.899246 extend-filesystems[1113]: Found sda6 Feb 9 19:37:36.899246 extend-filesystems[1113]: Found sda7 Feb 9 19:37:36.899246 extend-filesystems[1113]: Found sda9 Feb 9 19:37:36.899246 extend-filesystems[1113]: Checking size of /dev/sda9 Feb 9 19:37:37.161310 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Feb 9 19:37:37.161381 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Feb 9 19:37:37.161415 kernel: loop0: detected capacity change from 0 to 2097152 Feb 9 19:37:36.908023 systemd[1]: Starting sshd-keygen.service... Feb 9 19:37:37.104776 dbus-daemon[1111]: [system] SELinux support is enabled Feb 9 19:37:37.164615 extend-filesystems[1113]: Resized partition /dev/sda9 Feb 9 19:37:36.930227 systemd[1]: Starting systemd-logind.service... Feb 9 19:37:37.109830 dbus-daemon[1111]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1028 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 9 19:37:37.180528 extend-filesystems[1138]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:37:37.180528 extend-filesystems[1138]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 19:37:37.180528 extend-filesystems[1138]: old_desc_blocks = 1, new_desc_blocks = 2 Feb 9 19:37:37.180528 extend-filesystems[1138]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Feb 9 19:37:36.936823 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:37:37.151446 dbus-daemon[1111]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 19:37:37.224111 extend-filesystems[1113]: Resized filesystem in /dev/sda9 Feb 9 19:37:36.936963 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Feb 9 19:37:37.235539 update_engine[1142]: I0209 19:37:37.229313 1142 main.cc:92] Flatcar Update Engine starting Feb 9 19:37:36.938715 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:37:37.237917 jq[1143]: true Feb 9 19:37:36.940579 systemd[1]: Starting update-engine.service... Feb 9 19:37:36.958125 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:37:37.238839 tar[1146]: ./ Feb 9 19:37:37.238839 tar[1146]: ./macvlan Feb 9 19:37:36.969985 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:37:37.239752 tar[1148]: linux-amd64/helm Feb 9 19:37:36.970270 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:37:37.240369 tar[1147]: crictl Feb 9 19:37:36.970879 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:37:36.971124 systemd[1]: Finished motdgen.service. Feb 9 19:37:37.241799 jq[1152]: true Feb 9 19:37:36.984724 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:37:36.984987 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:37:37.244874 mkfs.ext4[1155]: mke2fs 1.46.5 (30-Dec-2021) Feb 9 19:37:37.244874 mkfs.ext4[1155]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Feb 9 19:37:37.244874 mkfs.ext4[1155]: Creating filesystem with 262144 4k blocks and 65536 inodes Feb 9 19:37:37.244874 mkfs.ext4[1155]: Filesystem UUID: 51f4ebca-de38-4c26-852e-c510393b0fbe Feb 9 19:37:37.244874 mkfs.ext4[1155]: Superblock backups stored on blocks: Feb 9 19:37:37.244874 mkfs.ext4[1155]: 32768, 98304, 163840, 229376 Feb 9 19:37:37.244874 mkfs.ext4[1155]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:37:37.244874 mkfs.ext4[1155]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:37:37.244874 mkfs.ext4[1155]: Creating journal (8192 blocks): done Feb 9 19:37:37.244874 mkfs.ext4[1155]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:37:37.076762 systemd-networkd[1028]: eth0: Gained IPv6LL Feb 9 19:37:37.085820 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:37:37.086086 systemd[1]: Finished extend-filesystems.service. Feb 9 19:37:37.105909 systemd[1]: Started dbus.service. Feb 9 19:37:37.246348 umount[1168]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Feb 9 19:37:37.130376 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:37:37.130472 systemd[1]: Reached target system-config.target. Feb 9 19:37:37.138868 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:37:37.138902 systemd[1]: Reached target user-config.target. Feb 9 19:37:37.163347 systemd[1]: Starting systemd-hostnamed.service... Feb 9 19:37:37.254949 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:37:37.257932 systemd[1]: Started update-engine.service. Feb 9 19:37:37.260280 update_engine[1142]: I0209 19:37:37.260231 1142 update_check_scheduler.cc:74] Next update check in 4m1s Feb 9 19:37:37.269515 systemd[1]: Started locksmithd.service. Feb 9 19:37:37.279103 bash[1181]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:37:37.280216 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:37:37.351139 tar[1146]: ./static Feb 9 19:37:37.362968 systemd-logind[1140]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 19:37:37.363011 systemd-logind[1140]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 19:37:37.363041 systemd-logind[1140]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:37:37.367512 systemd-logind[1140]: New seat seat0. Feb 9 19:37:37.399209 tar[1146]: ./vlan Feb 9 19:37:37.403848 systemd[1]: Started systemd-logind.service. Feb 9 19:37:37.405707 dbus-daemon[1111]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 9 19:37:37.406277 dbus-daemon[1111]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1173 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 9 19:37:37.413191 systemd[1]: Started systemd-hostnamed.service. Feb 9 19:37:37.426632 systemd[1]: Starting polkit.service... Feb 9 19:37:37.446741 env[1153]: time="2024-02-09T19:37:37.445069830Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:37:37.462336 tar[1146]: ./portmap Feb 9 19:37:37.487898 coreos-metadata[1110]: Feb 09 19:37:37.487 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Feb 9 19:37:37.495438 coreos-metadata[1110]: Feb 09 19:37:37.495 INFO Fetch failed with 404: resource not found Feb 9 19:37:37.495606 coreos-metadata[1110]: Feb 09 19:37:37.495 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Feb 9 19:37:37.496051 coreos-metadata[1110]: Feb 09 19:37:37.496 INFO Fetch successful Feb 9 19:37:37.496162 coreos-metadata[1110]: Feb 09 19:37:37.496 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Feb 9 19:37:37.497061 coreos-metadata[1110]: Feb 09 19:37:37.497 INFO Fetch failed with 404: resource not found Feb 9 19:37:37.497183 coreos-metadata[1110]: Feb 09 19:37:37.497 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Feb 9 19:37:37.498236 coreos-metadata[1110]: Feb 09 19:37:37.498 INFO Fetch failed with 404: resource not found Feb 9 19:37:37.498353 coreos-metadata[1110]: Feb 09 19:37:37.498 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Feb 9 19:37:37.500315 coreos-metadata[1110]: Feb 09 19:37:37.499 INFO Fetch successful Feb 9 19:37:37.510900 unknown[1110]: wrote ssh authorized keys file for user: core Feb 9 19:37:37.531344 tar[1146]: ./host-local Feb 9 19:37:37.588815 update-ssh-keys[1192]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:37:37.589530 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 19:37:37.614262 env[1153]: time="2024-02-09T19:37:37.614192104Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:37:37.614430 env[1153]: time="2024-02-09T19:37:37.614384970Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:37:37.618049 env[1153]: time="2024-02-09T19:37:37.617995481Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:37:37.618049 env[1153]: time="2024-02-09T19:37:37.618046685Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:37:37.618417 env[1153]: time="2024-02-09T19:37:37.618376833Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:37:37.618520 env[1153]: time="2024-02-09T19:37:37.618426430Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:37:37.618520 env[1153]: time="2024-02-09T19:37:37.618449734Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:37:37.618520 env[1153]: time="2024-02-09T19:37:37.618466554Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:37:37.618693 env[1153]: time="2024-02-09T19:37:37.618585455Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:37:37.618978 env[1153]: time="2024-02-09T19:37:37.618946530Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:37:37.619231 env[1153]: time="2024-02-09T19:37:37.619194897Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:37:37.619328 env[1153]: time="2024-02-09T19:37:37.619232686Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:37:37.619328 env[1153]: time="2024-02-09T19:37:37.619310976Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:37:37.619429 env[1153]: time="2024-02-09T19:37:37.619331814Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:37:37.631998 polkitd[1188]: Started polkitd version 121 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.641562650Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.641622661Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.641665696Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.641719133Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.641750263Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.641783152Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.641805546Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.641826449Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.641848655Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.641868350Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.641886815Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.642072760Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.642257683Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:37:37.644193 env[1153]: time="2024-02-09T19:37:37.642404146Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:37:37.644931 env[1153]: time="2024-02-09T19:37:37.643602878Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:37:37.644931 env[1153]: time="2024-02-09T19:37:37.643670994Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:37:37.644931 env[1153]: time="2024-02-09T19:37:37.643699054Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:37:37.644931 env[1153]: time="2024-02-09T19:37:37.643781617Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:37:37.644931 env[1153]: time="2024-02-09T19:37:37.643805853Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:37:37.644931 env[1153]: time="2024-02-09T19:37:37.643826757Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:37:37.644931 env[1153]: time="2024-02-09T19:37:37.643846068Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:37:37.644931 env[1153]: time="2024-02-09T19:37:37.643867359Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:37:37.644931 env[1153]: time="2024-02-09T19:37:37.643887413Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:37:37.644931 env[1153]: time="2024-02-09T19:37:37.643908438Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:37:37.644931 env[1153]: time="2024-02-09T19:37:37.643927547Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:37:37.644931 env[1153]: time="2024-02-09T19:37:37.643950932Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:37:37.645538 env[1153]: time="2024-02-09T19:37:37.644112091Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:37:37.650670 env[1153]: time="2024-02-09T19:37:37.645272295Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:37:37.650670 env[1153]: time="2024-02-09T19:37:37.645792355Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:37:37.650670 env[1153]: time="2024-02-09T19:37:37.645816311Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:37:37.650670 env[1153]: time="2024-02-09T19:37:37.645840274Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:37:37.650670 env[1153]: time="2024-02-09T19:37:37.645861223Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:37:37.650670 env[1153]: time="2024-02-09T19:37:37.645887861Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:37:37.650670 env[1153]: time="2024-02-09T19:37:37.645937402Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:37:37.651089 env[1153]: time="2024-02-09T19:37:37.646258868Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:37:37.651089 env[1153]: time="2024-02-09T19:37:37.650720587Z" level=info msg="Connect containerd service" Feb 9 19:37:37.651089 env[1153]: time="2024-02-09T19:37:37.650806715Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:37:37.655724 env[1153]: time="2024-02-09T19:37:37.652070640Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:37:37.655724 env[1153]: time="2024-02-09T19:37:37.653474530Z" level=info msg="Start subscribing containerd event" Feb 9 19:37:37.655724 env[1153]: time="2024-02-09T19:37:37.653539411Z" level=info msg="Start recovering state" Feb 9 19:37:37.655724 env[1153]: time="2024-02-09T19:37:37.653626273Z" level=info msg="Start event monitor" Feb 9 19:37:37.656461 polkitd[1188]: Loading rules from directory /etc/polkit-1/rules.d Feb 9 19:37:37.657432 systemd[1]: Started containerd.service. Feb 9 19:37:37.658898 env[1153]: time="2024-02-09T19:37:37.656628610Z" level=info msg="Start snapshots syncer" Feb 9 19:37:37.658898 env[1153]: time="2024-02-09T19:37:37.656679805Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:37:37.658898 env[1153]: time="2024-02-09T19:37:37.656694769Z" level=info msg="Start streaming server" Feb 9 19:37:37.658898 env[1153]: time="2024-02-09T19:37:37.657206148Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:37:37.658898 env[1153]: time="2024-02-09T19:37:37.657265290Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:37:37.658898 env[1153]: time="2024-02-09T19:37:37.657567816Z" level=info msg="containerd successfully booted in 0.295762s" Feb 9 19:37:37.656549 polkitd[1188]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 9 19:37:37.680904 polkitd[1188]: Finished loading, compiling and executing 2 rules Feb 9 19:37:37.681560 dbus-daemon[1111]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 9 19:37:37.681796 systemd[1]: Started polkit.service. Feb 9 19:37:37.686032 polkitd[1188]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 9 19:37:37.731551 systemd-hostnamed[1173]: Hostname set to (transient) Feb 9 19:37:37.734953 systemd-resolved[1079]: System hostname changed to 'ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal'. Feb 9 19:37:37.752221 tar[1146]: ./vrf Feb 9 19:37:37.950201 tar[1146]: ./bridge Feb 9 19:37:38.116283 tar[1146]: ./tuning Feb 9 19:37:38.232462 tar[1146]: ./firewall Feb 9 19:37:38.392990 tar[1146]: ./host-device Feb 9 19:37:38.523217 tar[1148]: linux-amd64/LICENSE Feb 9 19:37:38.526119 tar[1148]: linux-amd64/README.md Feb 9 19:37:38.541508 tar[1146]: ./sbr Feb 9 19:37:38.542291 systemd[1]: Finished prepare-helm.service. Feb 9 19:37:38.666516 tar[1146]: ./loopback Feb 9 19:37:38.751343 tar[1146]: ./dhcp Feb 9 19:37:39.018294 tar[1146]: ./ptp Feb 9 19:37:39.129686 tar[1146]: ./ipvlan Feb 9 19:37:39.240527 tar[1146]: ./bandwidth Feb 9 19:37:39.272405 systemd[1]: Finished prepare-critools.service. Feb 9 19:37:39.325618 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:37:39.992282 sshd_keygen[1139]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:37:40.034708 systemd[1]: Finished sshd-keygen.service. Feb 9 19:37:40.044510 systemd[1]: Starting issuegen.service... Feb 9 19:37:40.055952 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:37:40.056204 systemd[1]: Finished issuegen.service. Feb 9 19:37:40.067295 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:37:40.081975 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:37:40.093301 systemd[1]: Started getty@tty1.service. Feb 9 19:37:40.103266 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:37:40.112609 systemd[1]: Reached target getty.target. Feb 9 19:37:40.170784 locksmithd[1184]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:37:40.443857 systemd[1]: Created slice system-sshd.slice. Feb 9 19:37:40.454805 systemd[1]: Started sshd@0-10.128.0.34:22-101.35.234.86:49904.service. Feb 9 19:37:40.669010 systemd[1]: Started sshd@1-10.128.0.34:22-175.178.228.147:45470.service. Feb 9 19:37:41.862311 sshd[1225]: Invalid user pudhari from 175.178.228.147 port 45470 Feb 9 19:37:41.934631 sshd[1225]: Failed password for invalid user pudhari from 175.178.228.147 port 45470 ssh2 Feb 9 19:37:42.213025 sshd[1225]: Received disconnect from 175.178.228.147 port 45470:11: Bye Bye [preauth] Feb 9 19:37:42.213025 sshd[1225]: Disconnected from invalid user pudhari 175.178.228.147 port 45470 [preauth] Feb 9 19:37:42.214542 systemd[1]: sshd@1-10.128.0.34:22-175.178.228.147:45470.service: Deactivated successfully. Feb 9 19:37:42.599075 sshd[1223]: Invalid user ahmadbahari from 101.35.234.86 port 49904 Feb 9 19:37:42.612186 sshd[1223]: Failed password for invalid user ahmadbahari from 101.35.234.86 port 49904 ssh2 Feb 9 19:37:42.724084 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Feb 9 19:37:42.827467 sshd[1223]: Received disconnect from 101.35.234.86 port 49904:11: Bye Bye [preauth] Feb 9 19:37:42.827467 sshd[1223]: Disconnected from invalid user ahmadbahari 101.35.234.86 port 49904 [preauth] Feb 9 19:37:42.829036 systemd[1]: sshd@0-10.128.0.34:22-101.35.234.86:49904.service: Deactivated successfully. Feb 9 19:37:44.901707 kernel: loop0: detected capacity change from 0 to 2097152 Feb 9 19:37:44.930477 systemd-nspawn[1232]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Feb 9 19:37:44.930477 systemd-nspawn[1232]: Press ^] three times within 1s to kill container. Feb 9 19:37:44.947726 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:37:45.032690 systemd[1]: Started oem-gce.service. Feb 9 19:37:45.040358 systemd[1]: Reached target multi-user.target. Feb 9 19:37:45.052196 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:37:45.065354 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:37:45.065675 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:37:45.076044 systemd[1]: Startup finished in 1.054s (kernel) + 9.356s (initrd) + 15.902s (userspace) = 26.314s. Feb 9 19:37:45.144375 systemd-nspawn[1232]: + '[' -e /etc/default/instance_configs.cfg.template ']' Feb 9 19:37:45.144375 systemd-nspawn[1232]: + echo -e '[InstanceSetup]\nset_host_keys = false' Feb 9 19:37:45.144685 systemd-nspawn[1232]: + /usr/bin/google_instance_setup Feb 9 19:37:45.843157 instance-setup[1238]: INFO Running google_set_multiqueue. Feb 9 19:37:45.862390 instance-setup[1238]: INFO Set channels for eth0 to 2. Feb 9 19:37:45.866285 instance-setup[1238]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Feb 9 19:37:45.867720 instance-setup[1238]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Feb 9 19:37:45.868194 instance-setup[1238]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Feb 9 19:37:45.869696 instance-setup[1238]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Feb 9 19:37:45.870029 instance-setup[1238]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Feb 9 19:37:45.871427 instance-setup[1238]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Feb 9 19:37:45.871952 instance-setup[1238]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Feb 9 19:37:45.873582 instance-setup[1238]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Feb 9 19:37:45.885214 instance-setup[1238]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Feb 9 19:37:45.885407 instance-setup[1238]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Feb 9 19:37:45.925743 systemd-nspawn[1232]: + /usr/bin/google_metadata_script_runner --script-type startup Feb 9 19:37:46.108756 systemd[1]: Started sshd@2-10.128.0.34:22-147.75.109.163:47878.service. Feb 9 19:37:46.270742 startup-script[1269]: INFO Starting startup scripts. Feb 9 19:37:46.283590 startup-script[1269]: INFO No startup scripts found in metadata. Feb 9 19:37:46.283768 startup-script[1269]: INFO Finished running startup scripts. Feb 9 19:37:46.321683 systemd-nspawn[1232]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Feb 9 19:37:46.321683 systemd-nspawn[1232]: + daemon_pids=() Feb 9 19:37:46.322274 systemd-nspawn[1232]: + for d in accounts clock_skew network Feb 9 19:37:46.322274 systemd-nspawn[1232]: + daemon_pids+=($!) Feb 9 19:37:46.322274 systemd-nspawn[1232]: + for d in accounts clock_skew network Feb 9 19:37:46.322458 systemd-nspawn[1232]: + daemon_pids+=($!) Feb 9 19:37:46.323329 systemd-nspawn[1232]: + for d in accounts clock_skew network Feb 9 19:37:46.323329 systemd-nspawn[1232]: + /usr/bin/google_clock_skew_daemon Feb 9 19:37:46.323329 systemd-nspawn[1232]: + daemon_pids+=($!) Feb 9 19:37:46.323329 systemd-nspawn[1232]: + NOTIFY_SOCKET=/run/systemd/notify Feb 9 19:37:46.323329 systemd-nspawn[1232]: + /usr/bin/systemd-notify --ready Feb 9 19:37:46.323329 systemd-nspawn[1232]: + /usr/bin/google_accounts_daemon Feb 9 19:37:46.324342 systemd-nspawn[1232]: + /usr/bin/google_network_daemon Feb 9 19:37:46.385789 systemd-nspawn[1232]: + wait -n 36 37 38 Feb 9 19:37:46.416998 sshd[1271]: Accepted publickey for core from 147.75.109.163 port 47878 ssh2: RSA SHA256:L1fXSKhGa5ycyWvBnBg2T4RPbnzQLm0Sh6IuGoVASUA Feb 9 19:37:46.420181 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:46.439244 systemd[1]: Created slice user-500.slice. Feb 9 19:37:46.441204 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:37:46.456747 systemd-logind[1140]: New session 1 of user core. Feb 9 19:37:46.464539 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:37:46.467196 systemd[1]: Starting user@500.service... Feb 9 19:37:46.498351 (systemd)[1280]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:46.700371 systemd[1280]: Queued start job for default target default.target. Feb 9 19:37:46.701258 systemd[1280]: Reached target paths.target. Feb 9 19:37:46.701291 systemd[1280]: Reached target sockets.target. Feb 9 19:37:46.701316 systemd[1280]: Reached target timers.target. Feb 9 19:37:46.701340 systemd[1280]: Reached target basic.target. Feb 9 19:37:46.701413 systemd[1280]: Reached target default.target. Feb 9 19:37:46.701465 systemd[1280]: Startup finished in 190ms. Feb 9 19:37:46.701607 systemd[1]: Started user@500.service. Feb 9 19:37:46.703263 systemd[1]: Started session-1.scope. Feb 9 19:37:46.930713 systemd[1]: Started sshd@3-10.128.0.34:22-147.75.109.163:47894.service. Feb 9 19:37:47.191980 google-clock-skew[1276]: INFO Starting Google Clock Skew daemon. Feb 9 19:37:47.210109 google-clock-skew[1276]: INFO Clock drift token has changed: 0. Feb 9 19:37:47.216024 systemd-nspawn[1232]: hwclock: Cannot access the Hardware Clock via any known method. Feb 9 19:37:47.216420 systemd-nspawn[1232]: hwclock: Use the --verbose option to see the details of our search for an access method. Feb 9 19:37:47.217696 google-clock-skew[1276]: WARNING Failed to sync system time with hardware clock. Feb 9 19:37:47.236346 google-networking[1277]: INFO Starting Google Networking daemon. Feb 9 19:37:47.246446 sshd[1289]: Accepted publickey for core from 147.75.109.163 port 47894 ssh2: RSA SHA256:L1fXSKhGa5ycyWvBnBg2T4RPbnzQLm0Sh6IuGoVASUA Feb 9 19:37:47.247520 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:47.256553 systemd[1]: Started session-2.scope. Feb 9 19:37:47.258872 systemd-logind[1140]: New session 2 of user core. Feb 9 19:37:47.347596 groupadd[1300]: group added to /etc/group: name=google-sudoers, GID=1000 Feb 9 19:37:47.352382 groupadd[1300]: group added to /etc/gshadow: name=google-sudoers Feb 9 19:37:47.356796 groupadd[1300]: new group: name=google-sudoers, GID=1000 Feb 9 19:37:47.370441 google-accounts[1275]: INFO Starting Google Accounts daemon. Feb 9 19:37:47.395987 google-accounts[1275]: WARNING OS Login not installed. Feb 9 19:37:47.397024 google-accounts[1275]: INFO Creating a new user account for 0. Feb 9 19:37:47.402119 systemd-nspawn[1232]: useradd: invalid user name '0': use --badname to ignore Feb 9 19:37:47.403155 google-accounts[1275]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Feb 9 19:37:47.463625 sshd[1289]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:47.468260 systemd[1]: sshd@3-10.128.0.34:22-147.75.109.163:47894.service: Deactivated successfully. Feb 9 19:37:47.469311 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:37:47.470148 systemd-logind[1140]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:37:47.471433 systemd-logind[1140]: Removed session 2. Feb 9 19:37:47.509751 systemd[1]: Started sshd@4-10.128.0.34:22-147.75.109.163:47906.service. Feb 9 19:37:47.794716 sshd[1314]: Accepted publickey for core from 147.75.109.163 port 47906 ssh2: RSA SHA256:L1fXSKhGa5ycyWvBnBg2T4RPbnzQLm0Sh6IuGoVASUA Feb 9 19:37:47.796422 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:47.802587 systemd-logind[1140]: New session 3 of user core. Feb 9 19:37:47.803205 systemd[1]: Started session-3.scope. Feb 9 19:37:48.003748 sshd[1314]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:48.007890 systemd[1]: sshd@4-10.128.0.34:22-147.75.109.163:47906.service: Deactivated successfully. Feb 9 19:37:48.008946 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:37:48.009799 systemd-logind[1140]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:37:48.011221 systemd-logind[1140]: Removed session 3. Feb 9 19:37:48.049279 systemd[1]: Started sshd@5-10.128.0.34:22-147.75.109.163:47914.service. Feb 9 19:37:48.330462 sshd[1320]: Accepted publickey for core from 147.75.109.163 port 47914 ssh2: RSA SHA256:L1fXSKhGa5ycyWvBnBg2T4RPbnzQLm0Sh6IuGoVASUA Feb 9 19:37:48.332423 sshd[1320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:48.338305 systemd-logind[1140]: New session 4 of user core. Feb 9 19:37:48.339038 systemd[1]: Started session-4.scope. Feb 9 19:37:48.542549 sshd[1320]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:48.546484 systemd[1]: sshd@5-10.128.0.34:22-147.75.109.163:47914.service: Deactivated successfully. Feb 9 19:37:48.547546 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:37:48.548719 systemd-logind[1140]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:37:48.549980 systemd-logind[1140]: Removed session 4. Feb 9 19:37:48.589665 systemd[1]: Started sshd@6-10.128.0.34:22-147.75.109.163:47916.service. Feb 9 19:37:48.877855 sshd[1326]: Accepted publickey for core from 147.75.109.163 port 47916 ssh2: RSA SHA256:L1fXSKhGa5ycyWvBnBg2T4RPbnzQLm0Sh6IuGoVASUA Feb 9 19:37:48.879692 sshd[1326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:48.887048 systemd[1]: Started session-5.scope. Feb 9 19:37:48.887868 systemd-logind[1140]: New session 5 of user core. Feb 9 19:37:49.078019 sudo[1329]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:37:49.078410 sudo[1329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:37:49.086976 dbus-daemon[1111]: Ѝy\u0016oU: received setenforce notice (enforcing=921042832) Feb 9 19:37:49.089175 sudo[1329]: pam_unix(sudo:session): session closed for user root Feb 9 19:37:49.134273 sshd[1326]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:49.139027 systemd[1]: sshd@6-10.128.0.34:22-147.75.109.163:47916.service: Deactivated successfully. Feb 9 19:37:49.140164 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:37:49.141032 systemd-logind[1140]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:37:49.142352 systemd-logind[1140]: Removed session 5. Feb 9 19:37:49.178969 systemd[1]: Started sshd@7-10.128.0.34:22-147.75.109.163:47932.service. Feb 9 19:37:49.460133 sshd[1333]: Accepted publickey for core from 147.75.109.163 port 47932 ssh2: RSA SHA256:L1fXSKhGa5ycyWvBnBg2T4RPbnzQLm0Sh6IuGoVASUA Feb 9 19:37:49.462340 sshd[1333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:49.468592 systemd-logind[1140]: New session 6 of user core. Feb 9 19:37:49.469310 systemd[1]: Started session-6.scope. Feb 9 19:37:49.635722 sudo[1337]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:37:49.636340 sudo[1337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:37:49.640489 sudo[1337]: pam_unix(sudo:session): session closed for user root Feb 9 19:37:49.652634 sudo[1336]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:37:49.653025 sudo[1336]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:37:49.665911 systemd[1]: Stopping audit-rules.service... Feb 9 19:37:49.666000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:37:49.673388 kernel: kauditd_printk_skb: 132 callbacks suppressed Feb 9 19:37:49.673502 kernel: audit: type=1305 audit(1707507469.666:173): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:37:49.673544 auditctl[1340]: No rules Feb 9 19:37:49.674461 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:37:49.674721 systemd[1]: Stopped audit-rules.service. Feb 9 19:37:49.666000 audit[1340]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd269ea960 a2=420 a3=0 items=0 ppid=1 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:49.690407 systemd[1]: Starting audit-rules.service... Feb 9 19:37:49.666000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:37:49.729263 kernel: audit: type=1300 audit(1707507469.666:173): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd269ea960 a2=420 a3=0 items=0 ppid=1 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:49.729428 kernel: audit: type=1327 audit(1707507469.666:173): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:37:49.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:49.756861 kernel: audit: type=1131 audit(1707507469.671:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:49.767466 augenrules[1357]: No rules Feb 9 19:37:49.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:49.769697 sudo[1336]: pam_unix(sudo:session): session closed for user root Feb 9 19:37:49.768232 systemd[1]: Finished audit-rules.service. Feb 9 19:37:49.790689 kernel: audit: type=1130 audit(1707507469.767:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:49.790876 kernel: audit: type=1106 audit(1707507469.767:176): pid=1336 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:49.767000 audit[1336]: USER_END pid=1336 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:49.767000 audit[1336]: CRED_DISP pid=1336 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:49.819128 sshd[1333]: pam_unix(sshd:session): session closed for user core Feb 9 19:37:49.824059 systemd-logind[1140]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:37:49.826509 systemd[1]: sshd@7-10.128.0.34:22-147.75.109.163:47932.service: Deactivated successfully. Feb 9 19:37:49.827574 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:37:49.829607 systemd-logind[1140]: Removed session 6. Feb 9 19:37:49.839121 kernel: audit: type=1104 audit(1707507469.767:177): pid=1336 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:49.839272 kernel: audit: type=1106 audit(1707507469.820:178): pid=1333 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:37:49.820000 audit[1333]: USER_END pid=1333 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:37:49.863458 systemd[1]: Started sshd@8-10.128.0.34:22-147.75.109.163:47936.service. Feb 9 19:37:49.895684 kernel: audit: type=1104 audit(1707507469.820:179): pid=1333 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:37:49.820000 audit[1333]: CRED_DISP pid=1333 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:37:49.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.34:22-147.75.109.163:47932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:49.920534 kernel: audit: type=1131 audit(1707507469.825:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.34:22-147.75.109.163:47932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:49.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.34:22-147.75.109.163:47936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:50.153000 audit[1363]: USER_ACCT pid=1363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:37:50.156579 sshd[1363]: Accepted publickey for core from 147.75.109.163 port 47936 ssh2: RSA SHA256:L1fXSKhGa5ycyWvBnBg2T4RPbnzQLm0Sh6IuGoVASUA Feb 9 19:37:50.155000 audit[1363]: CRED_ACQ pid=1363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:37:50.155000 audit[1363]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf5fe1230 a2=3 a3=0 items=0 ppid=1 pid=1363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:50.155000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:37:50.158014 sshd[1363]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:37:50.164988 systemd[1]: Started session-7.scope. Feb 9 19:37:50.165872 systemd-logind[1140]: New session 7 of user core. Feb 9 19:37:50.172000 audit[1363]: USER_START pid=1363 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:37:50.174000 audit[1365]: CRED_ACQ pid=1365 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:37:50.331000 audit[1366]: USER_ACCT pid=1366 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:50.332075 sudo[1366]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:37:50.331000 audit[1366]: CRED_REFR pid=1366 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:50.332477 sudo[1366]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:37:50.334000 audit[1366]: USER_START pid=1366 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:37:50.996212 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:37:51.005757 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:37:51.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:51.006279 systemd[1]: Reached target network-online.target. Feb 9 19:37:51.008181 systemd[1]: Starting docker.service... Feb 9 19:37:51.060120 env[1382]: time="2024-02-09T19:37:51.060039104Z" level=info msg="Starting up" Feb 9 19:37:51.062398 env[1382]: time="2024-02-09T19:37:51.062345657Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:37:51.062398 env[1382]: time="2024-02-09T19:37:51.062369501Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:37:51.062398 env[1382]: time="2024-02-09T19:37:51.062397144Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:37:51.062635 env[1382]: time="2024-02-09T19:37:51.062412256Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:37:51.064858 env[1382]: time="2024-02-09T19:37:51.064799723Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:37:51.064858 env[1382]: time="2024-02-09T19:37:51.064831733Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:37:51.064858 env[1382]: time="2024-02-09T19:37:51.064853651Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:37:51.065077 env[1382]: time="2024-02-09T19:37:51.064869707Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:37:51.072570 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1388857426-merged.mount: Deactivated successfully. Feb 9 19:37:51.105527 env[1382]: time="2024-02-09T19:37:51.105452815Z" level=info msg="Loading containers: start." Feb 9 19:37:51.176000 audit[1412]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.176000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe07836950 a2=0 a3=7ffe0783693c items=0 ppid=1382 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.176000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 19:37:51.179000 audit[1414]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.179000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd2e9ef7d0 a2=0 a3=7ffd2e9ef7bc items=0 ppid=1382 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.179000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 19:37:51.182000 audit[1416]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.182000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff906b93d0 a2=0 a3=7fff906b93bc items=0 ppid=1382 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.182000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:37:51.184000 audit[1418]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.184000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff0a4bbab0 a2=0 a3=7fff0a4bba9c items=0 ppid=1382 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.184000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:37:51.188000 audit[1420]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.188000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe76787700 a2=0 a3=7ffe767876ec items=0 ppid=1382 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.188000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 19:37:51.207000 audit[1425]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.207000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd66e41970 a2=0 a3=7ffd66e4195c items=0 ppid=1382 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.207000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 19:37:51.219000 audit[1427]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.219000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffecfb7a590 a2=0 a3=7ffecfb7a57c items=0 ppid=1382 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.219000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 19:37:51.222000 audit[1429]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.222000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc341ae000 a2=0 a3=7ffc341adfec items=0 ppid=1382 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.222000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 19:37:51.226000 audit[1431]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.226000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff0ca22e50 a2=0 a3=7fff0ca22e3c items=0 ppid=1382 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.226000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:37:51.240000 audit[1435]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.240000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff7043b760 a2=0 a3=7fff7043b74c items=0 ppid=1382 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.240000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:37:51.242000 audit[1436]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.242000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffffb52620 a2=0 a3=7fffffb5260c items=0 ppid=1382 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.242000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:37:51.256684 kernel: Initializing XFRM netlink socket Feb 9 19:37:51.303573 env[1382]: time="2024-02-09T19:37:51.303514094Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 19:37:51.333000 audit[1444]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.333000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffe8f1a260 a2=0 a3=7fffe8f1a24c items=0 ppid=1382 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.333000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 19:37:51.346000 audit[1447]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.346000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc9d328bc0 a2=0 a3=7ffc9d328bac items=0 ppid=1382 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.346000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 19:37:51.351000 audit[1450]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.351000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdda723bc0 a2=0 a3=7ffdda723bac items=0 ppid=1382 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.351000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 19:37:51.355000 audit[1452]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.355000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd08bad330 a2=0 a3=7ffd08bad31c items=0 ppid=1382 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.355000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 19:37:51.358000 audit[1454]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.358000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc85f337a0 a2=0 a3=7ffc85f3378c items=0 ppid=1382 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.358000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 19:37:51.361000 audit[1456]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.361000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdf34e3790 a2=0 a3=7ffdf34e377c items=0 ppid=1382 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.361000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 19:37:51.364000 audit[1458]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.364000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcb6231af0 a2=0 a3=7ffcb6231adc items=0 ppid=1382 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.364000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 19:37:51.376000 audit[1461]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.376000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdbd2839a0 a2=0 a3=7ffdbd28398c items=0 ppid=1382 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.376000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 19:37:51.380000 audit[1463]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.380000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe87399c40 a2=0 a3=7ffe87399c2c items=0 ppid=1382 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.380000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:37:51.383000 audit[1465]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.383000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffce240caa0 a2=0 a3=7ffce240ca8c items=0 ppid=1382 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.383000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:37:51.386000 audit[1467]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.386000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe4e2a6a80 a2=0 a3=7ffe4e2a6a6c items=0 ppid=1382 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.386000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 19:37:51.387342 systemd-networkd[1028]: docker0: Link UP Feb 9 19:37:51.400000 audit[1471]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.400000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffef6a6030 a2=0 a3=7fffef6a601c items=0 ppid=1382 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.400000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:37:51.402000 audit[1472]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:37:51.402000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffffbaa3c70 a2=0 a3=7ffffbaa3c5c items=0 ppid=1382 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:51.402000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:37:51.403502 env[1382]: time="2024-02-09T19:37:51.403449811Z" level=info msg="Loading containers: done." Feb 9 19:37:51.424335 env[1382]: time="2024-02-09T19:37:51.424259557Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 19:37:51.424594 env[1382]: time="2024-02-09T19:37:51.424553896Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 19:37:51.424777 env[1382]: time="2024-02-09T19:37:51.424734364Z" level=info msg="Daemon has completed initialization" Feb 9 19:37:51.447601 systemd[1]: Started docker.service. Feb 9 19:37:51.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:51.460822 env[1382]: time="2024-02-09T19:37:51.460726287Z" level=info msg="API listen on /run/docker.sock" Feb 9 19:37:51.485622 systemd[1]: Reloading. Feb 9 19:37:51.591634 /usr/lib/systemd/system-generators/torcx-generator[1519]: time="2024-02-09T19:37:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:37:51.595768 /usr/lib/systemd/system-generators/torcx-generator[1519]: time="2024-02-09T19:37:51Z" level=info msg="torcx already run" Feb 9 19:37:51.701637 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:37:51.701806 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:37:51.726199 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:37:51.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.816000 audit: BPF prog-id=40 op=LOAD Feb 9 19:37:51.816000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit: BPF prog-id=41 op=LOAD Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.817000 audit: BPF prog-id=42 op=LOAD Feb 9 19:37:51.817000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:37:51.817000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:37:51.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.818000 audit: BPF prog-id=43 op=LOAD Feb 9 19:37:51.818000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:37:51.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit: BPF prog-id=44 op=LOAD Feb 9 19:37:51.822000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit: BPF prog-id=45 op=LOAD Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.822000 audit: BPF prog-id=46 op=LOAD Feb 9 19:37:51.822000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:37:51.822000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit: BPF prog-id=47 op=LOAD Feb 9 19:37:51.823000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit: BPF prog-id=48 op=LOAD Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.823000 audit: BPF prog-id=49 op=LOAD Feb 9 19:37:51.823000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:37:51.823000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:37:51.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.824000 audit: BPF prog-id=50 op=LOAD Feb 9 19:37:51.824000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:37:51.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.825000 audit: BPF prog-id=51 op=LOAD Feb 9 19:37:51.825000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit: BPF prog-id=52 op=LOAD Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.826000 audit: BPF prog-id=53 op=LOAD Feb 9 19:37:51.826000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:37:51.826000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:37:51.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.827000 audit: BPF prog-id=54 op=LOAD Feb 9 19:37:51.828000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit: BPF prog-id=55 op=LOAD Feb 9 19:37:51.862000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit: BPF prog-id=56 op=LOAD Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:51.862000 audit: BPF prog-id=57 op=LOAD Feb 9 19:37:51.862000 audit: BPF prog-id=36 op=UNLOAD Feb 9 19:37:51.862000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:37:51.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:37:51.878429 systemd[1]: Started kubelet.service. Feb 9 19:37:51.974240 kubelet[1561]: E0209 19:37:51.974150 1561 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:37:51.978361 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:37:51.978569 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:37:51.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:37:52.500914 env[1153]: time="2024-02-09T19:37:52.500849382Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 19:37:52.970952 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2504126961.mount: Deactivated successfully. Feb 9 19:37:55.044639 env[1153]: time="2024-02-09T19:37:55.044561218Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:55.047661 env[1153]: time="2024-02-09T19:37:55.047595339Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:55.050614 env[1153]: time="2024-02-09T19:37:55.050566043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:55.053315 env[1153]: time="2024-02-09T19:37:55.053272935Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:55.054339 env[1153]: time="2024-02-09T19:37:55.054285238Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 9 19:37:55.068846 env[1153]: time="2024-02-09T19:37:55.068799226Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 19:37:56.991067 env[1153]: time="2024-02-09T19:37:56.990990575Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:56.994420 env[1153]: time="2024-02-09T19:37:56.994356877Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:56.997246 env[1153]: time="2024-02-09T19:37:56.997194818Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:57.000103 env[1153]: time="2024-02-09T19:37:57.000056454Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:57.001178 env[1153]: time="2024-02-09T19:37:57.001119609Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 9 19:37:57.016577 env[1153]: time="2024-02-09T19:37:57.016524231Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 19:37:58.209010 env[1153]: time="2024-02-09T19:37:58.208930670Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:58.212153 env[1153]: time="2024-02-09T19:37:58.212083776Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:58.215232 env[1153]: time="2024-02-09T19:37:58.215171052Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:58.217796 env[1153]: time="2024-02-09T19:37:58.217756127Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:58.219148 env[1153]: time="2024-02-09T19:37:58.219104216Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 9 19:37:58.234158 env[1153]: time="2024-02-09T19:37:58.234111185Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 19:37:59.223073 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount541244074.mount: Deactivated successfully. Feb 9 19:37:59.802039 env[1153]: time="2024-02-09T19:37:59.801965711Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:59.805171 env[1153]: time="2024-02-09T19:37:59.805113656Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:59.807798 env[1153]: time="2024-02-09T19:37:59.807744881Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:59.810899 env[1153]: time="2024-02-09T19:37:59.810859682Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:59.811563 env[1153]: time="2024-02-09T19:37:59.811508248Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 19:37:59.827449 env[1153]: time="2024-02-09T19:37:59.827392128Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 19:38:00.212025 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount244544940.mount: Deactivated successfully. Feb 9 19:38:00.222389 env[1153]: time="2024-02-09T19:38:00.222318465Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:00.225226 env[1153]: time="2024-02-09T19:38:00.225177294Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:00.227631 env[1153]: time="2024-02-09T19:38:00.227590416Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:00.229764 env[1153]: time="2024-02-09T19:38:00.229726249Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:00.230481 env[1153]: time="2024-02-09T19:38:00.230428688Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 19:38:00.246205 env[1153]: time="2024-02-09T19:38:00.246160050Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 19:38:00.975098 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3149312583.mount: Deactivated successfully. Feb 9 19:38:02.097395 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 19:38:02.097728 systemd[1]: Stopped kubelet.service. Feb 9 19:38:02.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:02.105158 kernel: kauditd_printk_skb: 293 callbacks suppressed Feb 9 19:38:02.105290 kernel: audit: type=1130 audit(1707507482.097:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:02.129108 systemd[1]: Started kubelet.service. Feb 9 19:38:02.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:02.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:02.176037 kernel: audit: type=1131 audit(1707507482.097:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:02.176225 kernel: audit: type=1130 audit(1707507482.128:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:02.257004 kubelet[1605]: E0209 19:38:02.256939 1605 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:38:02.264493 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:38:02.264741 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:38:02.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:38:02.287708 kernel: audit: type=1131 audit(1707507482.264:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:38:05.527520 env[1153]: time="2024-02-09T19:38:05.527420741Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:05.530905 env[1153]: time="2024-02-09T19:38:05.530849955Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:05.533972 env[1153]: time="2024-02-09T19:38:05.533927150Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:05.536388 env[1153]: time="2024-02-09T19:38:05.536335901Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:05.537591 env[1153]: time="2024-02-09T19:38:05.537551639Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 9 19:38:05.551352 env[1153]: time="2024-02-09T19:38:05.551306548Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 19:38:05.939250 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount736338953.mount: Deactivated successfully. Feb 9 19:38:06.834822 env[1153]: time="2024-02-09T19:38:06.834744961Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:06.838070 env[1153]: time="2024-02-09T19:38:06.838013107Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:06.840680 env[1153]: time="2024-02-09T19:38:06.840616473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:06.843102 env[1153]: time="2024-02-09T19:38:06.843058045Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:06.843932 env[1153]: time="2024-02-09T19:38:06.843878459Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 9 19:38:07.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:07.768223 kernel: audit: type=1131 audit(1707507487.742:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:07.743440 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 9 19:38:07.784000 audit: BPF prog-id=57 op=UNLOAD Feb 9 19:38:07.800480 kernel: audit: type=1334 audit(1707507487.784:429): prog-id=57 op=UNLOAD Feb 9 19:38:07.800633 kernel: audit: type=1334 audit(1707507487.784:430): prog-id=56 op=UNLOAD Feb 9 19:38:07.784000 audit: BPF prog-id=56 op=UNLOAD Feb 9 19:38:07.784000 audit: BPF prog-id=55 op=UNLOAD Feb 9 19:38:07.808690 kernel: audit: type=1334 audit(1707507487.784:431): prog-id=55 op=UNLOAD Feb 9 19:38:10.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:10.786923 systemd[1]: Stopped kubelet.service. Feb 9 19:38:10.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:10.818881 systemd[1]: Reloading. Feb 9 19:38:10.830249 kernel: audit: type=1130 audit(1707507490.785:432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:10.830416 kernel: audit: type=1131 audit(1707507490.787:433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:10.931736 /usr/lib/systemd/system-generators/torcx-generator[1696]: time="2024-02-09T19:38:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:38:10.931812 /usr/lib/systemd/system-generators/torcx-generator[1696]: time="2024-02-09T19:38:10Z" level=info msg="torcx already run" Feb 9 19:38:11.027849 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:38:11.027877 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:38:11.051136 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:38:11.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.163902 kernel: audit: type=1400 audit(1707507491.141:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.184761 kernel: audit: type=1400 audit(1707507491.141:435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.227281 kernel: audit: type=1400 audit(1707507491.141:436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.227424 kernel: audit: type=1400 audit(1707507491.141:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.162000 audit: BPF prog-id=58 op=LOAD Feb 9 19:38:11.162000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:38:11.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit: BPF prog-id=59 op=LOAD Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit: BPF prog-id=60 op=LOAD Feb 9 19:38:11.183000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:38:11.183000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.204000 audit: BPF prog-id=61 op=LOAD Feb 9 19:38:11.204000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:38:11.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit: BPF prog-id=62 op=LOAD Feb 9 19:38:11.228000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit: BPF prog-id=63 op=LOAD Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.228000 audit: BPF prog-id=64 op=LOAD Feb 9 19:38:11.228000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:38:11.228000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit: BPF prog-id=65 op=LOAD Feb 9 19:38:11.229000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit: BPF prog-id=66 op=LOAD Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.229000 audit: BPF prog-id=67 op=LOAD Feb 9 19:38:11.229000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:38:11.229000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:38:11.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.230000 audit: BPF prog-id=68 op=LOAD Feb 9 19:38:11.230000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:38:11.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit: BPF prog-id=69 op=LOAD Feb 9 19:38:11.232000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit: BPF prog-id=70 op=LOAD Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.232000 audit: BPF prog-id=71 op=LOAD Feb 9 19:38:11.232000 audit: BPF prog-id=52 op=UNLOAD Feb 9 19:38:11.232000 audit: BPF prog-id=53 op=UNLOAD Feb 9 19:38:11.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:11.233000 audit: BPF prog-id=72 op=LOAD Feb 9 19:38:11.233000 audit: BPF prog-id=54 op=UNLOAD Feb 9 19:38:11.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:11.259354 systemd[1]: Started kubelet.service. Feb 9 19:38:11.335807 kubelet[1739]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:38:11.335807 kubelet[1739]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:38:11.335807 kubelet[1739]: I0209 19:38:11.330253 1739 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:38:11.335807 kubelet[1739]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:38:11.335807 kubelet[1739]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:38:12.520128 kubelet[1739]: I0209 19:38:12.520069 1739 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:38:12.520128 kubelet[1739]: I0209 19:38:12.520106 1739 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:38:12.520772 kubelet[1739]: I0209 19:38:12.520438 1739 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:38:12.524490 kubelet[1739]: E0209 19:38:12.524462 1739 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.34:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:12.524759 kubelet[1739]: I0209 19:38:12.524735 1739 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:38:12.530614 kubelet[1739]: I0209 19:38:12.530566 1739 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:38:12.530992 kubelet[1739]: I0209 19:38:12.530959 1739 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:38:12.531118 kubelet[1739]: I0209 19:38:12.531072 1739 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:38:12.531118 kubelet[1739]: I0209 19:38:12.531109 1739 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:38:12.531343 kubelet[1739]: I0209 19:38:12.531134 1739 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:38:12.531343 kubelet[1739]: I0209 19:38:12.531282 1739 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:38:12.540642 kubelet[1739]: I0209 19:38:12.540612 1739 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:38:12.540642 kubelet[1739]: I0209 19:38:12.540667 1739 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:38:12.540868 kubelet[1739]: I0209 19:38:12.540703 1739 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:38:12.540868 kubelet[1739]: I0209 19:38:12.540726 1739 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:38:12.541790 kubelet[1739]: W0209 19:38:12.541722 1739 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.34:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:12.541985 kubelet[1739]: E0209 19:38:12.541969 1739 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.34:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:12.542274 kubelet[1739]: W0209 19:38:12.542210 1739 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.34:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:12.542434 kubelet[1739]: E0209 19:38:12.542418 1739 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.34:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:12.542999 kubelet[1739]: I0209 19:38:12.542980 1739 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:38:12.547449 kubelet[1739]: W0209 19:38:12.547423 1739 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:38:12.548828 kubelet[1739]: I0209 19:38:12.548802 1739 server.go:1186] "Started kubelet" Feb 9 19:38:12.552000 audit[1739]: AVC avc: denied { mac_admin } for pid=1739 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:12.552000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:38:12.552000 audit[1739]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fca5a0 a1=c000fe0198 a2=c000fca570 a3=25 items=0 ppid=1 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.552000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:38:12.552000 audit[1739]: AVC avc: denied { mac_admin } for pid=1739 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:12.552000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:38:12.552000 audit[1739]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cfb2e0 a1=c000fe01b0 a2=c000fca630 a3=25 items=0 ppid=1 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.552000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:38:12.554107 kubelet[1739]: I0209 19:38:12.553398 1739 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:38:12.554107 kubelet[1739]: I0209 19:38:12.553462 1739 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:38:12.554107 kubelet[1739]: I0209 19:38:12.553564 1739 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:38:12.557955 kubelet[1739]: I0209 19:38:12.557930 1739 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:38:12.559676 kubelet[1739]: E0209 19:38:12.559521 1739 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal.17b2490488afecef", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", UID:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 548766959, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 548766959, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.128.0.34:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.34:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:38:12.562730 kubelet[1739]: I0209 19:38:12.562705 1739 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:38:12.563437 kubelet[1739]: I0209 19:38:12.563413 1739 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:38:12.563000 audit[1750]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.563000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffce7bfff80 a2=0 a3=7ffce7bfff6c items=0 ppid=1739 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.563000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:38:12.565212 kubelet[1739]: I0209 19:38:12.565173 1739 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:38:12.565999 kubelet[1739]: W0209 19:38:12.565948 1739 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.34:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:12.566168 kubelet[1739]: E0209 19:38:12.566149 1739 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.34:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:12.566404 kubelet[1739]: E0209 19:38:12.566376 1739 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.128.0.34:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:12.567367 kubelet[1739]: E0209 19:38:12.567345 1739 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:38:12.567500 kubelet[1739]: E0209 19:38:12.567484 1739 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:38:12.569000 audit[1751]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.569000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4e6b34e0 a2=0 a3=7ffc4e6b34cc items=0 ppid=1739 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:38:12.573000 audit[1753]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.573000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd18953a60 a2=0 a3=7ffd18953a4c items=0 ppid=1739 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:38:12.576000 audit[1755]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.576000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffec0e09d0 a2=0 a3=7fffec0e09bc items=0 ppid=1739 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:38:12.598000 audit[1760]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.598000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc59fe5fd0 a2=0 a3=7ffc59fe5fbc items=0 ppid=1739 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:38:12.599000 audit[1761]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.599000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd165e5e10 a2=0 a3=7ffd165e5dfc items=0 ppid=1739 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:38:12.607664 kubelet[1739]: I0209 19:38:12.607628 1739 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:38:12.607919 kubelet[1739]: I0209 19:38:12.607900 1739 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:38:12.608034 kubelet[1739]: I0209 19:38:12.608021 1739 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:38:12.611000 audit[1764]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.611000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc15962cc0 a2=0 a3=7ffc15962cac items=0 ppid=1739 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.611000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:38:12.616000 audit[1767]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.616000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc68ec6240 a2=0 a3=7ffc68ec622c items=0 ppid=1739 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:38:12.618000 audit[1768]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.618000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc2881c880 a2=0 a3=7ffc2881c86c items=0 ppid=1739 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.618000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:38:12.619000 audit[1769]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.619000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7e8d32a0 a2=0 a3=7ffc7e8d328c items=0 ppid=1739 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:38:12.622000 audit[1771]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.622000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe23250d50 a2=0 a3=7ffe23250d3c items=0 ppid=1739 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:38:12.626000 audit[1774]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.626000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffda7f3ebf0 a2=0 a3=7ffda7f3ebdc items=0 ppid=1739 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:38:12.630000 audit[1776]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.630000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fff6663fcd0 a2=0 a3=7fff6663fcbc items=0 ppid=1739 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:38:12.634000 audit[1778]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.634000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffdc10ac7a0 a2=0 a3=7ffdc10ac78c items=0 ppid=1739 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:38:12.637000 audit[1780]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.637000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffc97310830 a2=0 a3=7ffc9731081c items=0 ppid=1739 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.637000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:38:12.638000 audit[1781]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.638000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc5d07e7e0 a2=0 a3=7ffc5d07e7cc items=0 ppid=1739 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:38:12.640000 audit[1783]: NETFILTER_CFG table=nat:42 family=10 entries=2 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.640000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe60c2c770 a2=0 a3=7ffe60c2c75c items=0 ppid=1739 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.640000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:38:12.640000 audit[1782]: NETFILTER_CFG table=mangle:43 family=2 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.640000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd08bfc450 a2=0 a3=10e3 items=0 ppid=1739 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.640000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:38:12.642000 audit[1785]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.642000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8749e100 a2=0 a3=7fff8749e0ec items=0 ppid=1739 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.642000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:38:12.644000 audit[1787]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:38:12.644000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd321e1f10 a2=0 a3=7ffd321e1efc items=0 ppid=1739 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.644000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:38:12.644000 audit[1786]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.644000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffca0cd3600 a2=0 a3=7ffca0cd35ec items=0 ppid=1739 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.644000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:38:12.645000 audit[1788]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.645000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffcdabe3120 a2=0 a3=7ffcdabe310c items=0 ppid=1739 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.645000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:38:12.649000 audit[1790]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.649000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc01a5f6b0 a2=0 a3=7ffc01a5f69c items=0 ppid=1739 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:38:12.652000 audit[1791]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.652000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff2a58c460 a2=0 a3=7fff2a58c44c items=0 ppid=1739 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:38:12.654000 audit[1792]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.654000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc1c3e7a0 a2=0 a3=7fffc1c3e78c items=0 ppid=1739 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:38:12.657750 kubelet[1739]: I0209 19:38:12.638379 1739 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:38:12.657000 audit[1794]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.657000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc04433fd0 a2=0 a3=7ffc04433fbc items=0 ppid=1739 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:38:12.658767 kubelet[1739]: I0209 19:38:12.657946 1739 policy_none.go:49] "None policy: Start" Feb 9 19:38:12.659389 kubelet[1739]: I0209 19:38:12.659368 1739 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:38:12.659538 kubelet[1739]: I0209 19:38:12.659523 1739 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:38:12.660000 audit[1796]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.660000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff2979a5d0 a2=0 a3=7fff2979a5bc items=0 ppid=1739 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:38:12.663000 audit[1798]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.663000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe3058a840 a2=0 a3=7ffe3058a82c items=0 ppid=1739 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:38:12.671000 audit[1800]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.671000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd920a60a0 a2=0 a3=7ffd920a608c items=0 ppid=1739 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.671000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:38:12.675835 kubelet[1739]: I0209 19:38:12.675811 1739 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:12.676532 kubelet[1739]: E0209 19:38:12.676509 1739 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.34:6443/api/v1/nodes\": dial tcp 10.128.0.34:6443: connect: connection refused" node="ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:12.677000 audit[1803]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.677000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffe6d24fbc0 a2=0 a3=7ffe6d24fbac items=0 ppid=1739 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:38:12.679144 kubelet[1739]: I0209 19:38:12.679117 1739 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:38:12.679226 kubelet[1739]: I0209 19:38:12.679181 1739 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:38:12.679317 kubelet[1739]: I0209 19:38:12.679217 1739 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:38:12.679384 kubelet[1739]: E0209 19:38:12.679350 1739 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:38:12.680203 kubelet[1739]: W0209 19:38:12.680159 1739 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.34:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:12.680437 kubelet[1739]: E0209 19:38:12.680412 1739 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.34:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:12.681000 audit[1804]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.681000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeedaeee50 a2=0 a3=7ffeedaeee3c items=0 ppid=1739 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:38:12.683000 audit[1805]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.683000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf5fbef80 a2=0 a3=7ffcf5fbef6c items=0 ppid=1739 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:38:12.685000 audit[1806]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:38:12.685000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb74ef120 a2=0 a3=7ffdb74ef10c items=0 ppid=1739 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:38:12.767532 systemd[1]: Created slice kubepods.slice. Feb 9 19:38:12.769774 kubelet[1739]: E0209 19:38:12.769713 1739 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.128.0.34:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:12.775113 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:38:12.782978 kubelet[1739]: E0209 19:38:12.782738 1739 kubelet.go:2137] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 19:38:12.781627 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:38:12.790686 kubelet[1739]: I0209 19:38:12.790646 1739 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:38:12.791246 kubelet[1739]: I0209 19:38:12.791221 1739 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:38:12.791698 kubelet[1739]: I0209 19:38:12.791677 1739 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:38:12.790000 audit[1739]: AVC avc: denied { mac_admin } for pid=1739 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:12.802779 kernel: kauditd_printk_skb: 276 callbacks suppressed Feb 9 19:38:12.802919 kernel: audit: type=1400 audit(1707507492.790:642): avc: denied { mac_admin } for pid=1739 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:12.802978 kubelet[1739]: E0209 19:38:12.797303 1739 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" not found" Feb 9 19:38:12.790000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:38:12.818770 kernel: audit: type=1401 audit(1707507492.790:642): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:38:12.830900 kernel: audit: type=1300 audit(1707507492.790:642): arch=c000003e syscall=188 success=no exit=-22 a0=c0010a7680 a1=c0010d4228 a2=c0010a7650 a3=25 items=0 ppid=1 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.790000 audit[1739]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010a7680 a1=c0010d4228 a2=c0010a7650 a3=25 items=0 ppid=1 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:12.790000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:38:12.890669 kernel: audit: type=1327 audit(1707507492.790:642): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:38:12.891775 kubelet[1739]: I0209 19:38:12.891745 1739 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:12.892341 kubelet[1739]: E0209 19:38:12.892315 1739 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.34:6443/api/v1/nodes\": dial tcp 10.128.0.34:6443: connect: connection refused" node="ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:12.983138 kubelet[1739]: I0209 19:38:12.983011 1739 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:38:12.988930 kubelet[1739]: I0209 19:38:12.988890 1739 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:38:13.004315 kubelet[1739]: I0209 19:38:13.004257 1739 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:38:13.005677 kubelet[1739]: I0209 19:38:13.005633 1739 status_manager.go:698] "Failed to get status for pod" podUID=a90e01a52f8566540921761f3488dce5 pod="kube-system/kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" err="Get \"https://10.128.0.34:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\": dial tcp 10.128.0.34:6443: connect: connection refused" Feb 9 19:38:13.012290 kubelet[1739]: I0209 19:38:13.011232 1739 status_manager.go:698] "Failed to get status for pod" podUID=f4bc7f901bc57a99a40e52c303596d92 pod="kube-system/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" err="Get \"https://10.128.0.34:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\": dial tcp 10.128.0.34:6443: connect: connection refused" Feb 9 19:38:13.012011 systemd[1]: Created slice kubepods-burstable-poda90e01a52f8566540921761f3488dce5.slice. Feb 9 19:38:13.018476 kubelet[1739]: I0209 19:38:13.018431 1739 status_manager.go:698] "Failed to get status for pod" podUID=e9ba7c89b2f054f367108df39c4cc881 pod="kube-system/kube-scheduler-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" err="Get \"https://10.128.0.34:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\": dial tcp 10.128.0.34:6443: connect: connection refused" Feb 9 19:38:13.024012 systemd[1]: Created slice kubepods-burstable-podf4bc7f901bc57a99a40e52c303596d92.slice. Feb 9 19:38:13.033059 systemd[1]: Created slice kubepods-burstable-pode9ba7c89b2f054f367108df39c4cc881.slice. Feb 9 19:38:13.068178 kubelet[1739]: I0209 19:38:13.068131 1739 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f4bc7f901bc57a99a40e52c303596d92-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"f4bc7f901bc57a99a40e52c303596d92\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:13.068378 kubelet[1739]: I0209 19:38:13.068199 1739 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e9ba7c89b2f054f367108df39c4cc881-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"e9ba7c89b2f054f367108df39c4cc881\") " pod="kube-system/kube-scheduler-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:13.068378 kubelet[1739]: I0209 19:38:13.068238 1739 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a90e01a52f8566540921761f3488dce5-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"a90e01a52f8566540921761f3488dce5\") " pod="kube-system/kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:13.068378 kubelet[1739]: I0209 19:38:13.068275 1739 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a90e01a52f8566540921761f3488dce5-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"a90e01a52f8566540921761f3488dce5\") " pod="kube-system/kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:13.068378 kubelet[1739]: I0209 19:38:13.068313 1739 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f4bc7f901bc57a99a40e52c303596d92-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"f4bc7f901bc57a99a40e52c303596d92\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:13.068617 kubelet[1739]: I0209 19:38:13.068358 1739 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f4bc7f901bc57a99a40e52c303596d92-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"f4bc7f901bc57a99a40e52c303596d92\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:13.068617 kubelet[1739]: I0209 19:38:13.068397 1739 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a90e01a52f8566540921761f3488dce5-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"a90e01a52f8566540921761f3488dce5\") " pod="kube-system/kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:13.068617 kubelet[1739]: I0209 19:38:13.068466 1739 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f4bc7f901bc57a99a40e52c303596d92-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"f4bc7f901bc57a99a40e52c303596d92\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:13.068617 kubelet[1739]: I0209 19:38:13.068545 1739 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f4bc7f901bc57a99a40e52c303596d92-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"f4bc7f901bc57a99a40e52c303596d92\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:13.170205 kubelet[1739]: E0209 19:38:13.170152 1739 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.128.0.34:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:13.301039 kubelet[1739]: I0209 19:38:13.300899 1739 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:13.302050 kubelet[1739]: E0209 19:38:13.302003 1739 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.34:6443/api/v1/nodes\": dial tcp 10.128.0.34:6443: connect: connection refused" node="ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:13.322548 env[1153]: time="2024-02-09T19:38:13.322472581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal,Uid:a90e01a52f8566540921761f3488dce5,Namespace:kube-system,Attempt:0,}" Feb 9 19:38:13.331186 env[1153]: time="2024-02-09T19:38:13.331120822Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal,Uid:f4bc7f901bc57a99a40e52c303596d92,Namespace:kube-system,Attempt:0,}" Feb 9 19:38:13.339730 env[1153]: time="2024-02-09T19:38:13.339674236Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal,Uid:e9ba7c89b2f054f367108df39c4cc881,Namespace:kube-system,Attempt:0,}" Feb 9 19:38:13.417413 kubelet[1739]: W0209 19:38:13.417327 1739 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.34:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:13.417413 kubelet[1739]: E0209 19:38:13.417418 1739 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.34:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:13.662942 kubelet[1739]: W0209 19:38:13.662886 1739 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.34:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:13.663598 kubelet[1739]: E0209 19:38:13.663570 1739 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.34:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:13.883596 kubelet[1739]: W0209 19:38:13.883521 1739 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.34:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:13.883801 kubelet[1739]: E0209 19:38:13.883620 1739 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.34:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:13.919280 kubelet[1739]: W0209 19:38:13.919141 1739 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.34:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:13.919280 kubelet[1739]: E0209 19:38:13.919196 1739 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.34:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:13.970944 kubelet[1739]: E0209 19:38:13.970890 1739 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.128.0.34:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:14.109033 kubelet[1739]: I0209 19:38:14.108983 1739 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:14.109419 kubelet[1739]: E0209 19:38:14.109379 1739 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.34:6443/api/v1/nodes\": dial tcp 10.128.0.34:6443: connect: connection refused" node="ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:14.413737 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount394026377.mount: Deactivated successfully. Feb 9 19:38:14.424673 env[1153]: time="2024-02-09T19:38:14.424594737Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.426406 env[1153]: time="2024-02-09T19:38:14.426340841Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.430456 env[1153]: time="2024-02-09T19:38:14.430368479Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.431739 env[1153]: time="2024-02-09T19:38:14.431692300Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.433917 env[1153]: time="2024-02-09T19:38:14.433878038Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.435642 env[1153]: time="2024-02-09T19:38:14.435587225Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.437026 env[1153]: time="2024-02-09T19:38:14.436971830Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.438933 env[1153]: time="2024-02-09T19:38:14.438886493Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.439903 env[1153]: time="2024-02-09T19:38:14.439855621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.440889 env[1153]: time="2024-02-09T19:38:14.440853552Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.444525 env[1153]: time="2024-02-09T19:38:14.444489659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.447930 env[1153]: time="2024-02-09T19:38:14.447858565Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:38:14.493073 env[1153]: time="2024-02-09T19:38:14.492985585Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:38:14.493235 env[1153]: time="2024-02-09T19:38:14.493093527Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:38:14.493235 env[1153]: time="2024-02-09T19:38:14.493136280Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:38:14.493507 env[1153]: time="2024-02-09T19:38:14.493452354Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0a4ca38b64928e2daa3b46ac4f0c571c6b01be21dd3a3737a11e5d642c0faf21 pid=1815 runtime=io.containerd.runc.v2 Feb 9 19:38:14.508686 env[1153]: time="2024-02-09T19:38:14.508564785Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:38:14.508880 env[1153]: time="2024-02-09T19:38:14.508724103Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:38:14.508880 env[1153]: time="2024-02-09T19:38:14.508804055Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:38:14.511818 env[1153]: time="2024-02-09T19:38:14.511724065Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40a9db87a3b7bcea9566deb5f5814f5c8c06c180d94843d1bd52a1a2bb640cd1 pid=1834 runtime=io.containerd.runc.v2 Feb 9 19:38:14.524718 env[1153]: time="2024-02-09T19:38:14.524616651Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:38:14.524948 env[1153]: time="2024-02-09T19:38:14.524905251Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:38:14.525186 env[1153]: time="2024-02-09T19:38:14.525148742Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:38:14.525576 env[1153]: time="2024-02-09T19:38:14.525515733Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f5d4db9b059f72e363a8e8d6f7489f838516bd1487d0e70ee99cf1b403cf109a pid=1849 runtime=io.containerd.runc.v2 Feb 9 19:38:14.526436 systemd[1]: Started cri-containerd-0a4ca38b64928e2daa3b46ac4f0c571c6b01be21dd3a3737a11e5d642c0faf21.scope. Feb 9 19:38:14.550210 systemd[1]: Started cri-containerd-40a9db87a3b7bcea9566deb5f5814f5c8c06c180d94843d1bd52a1a2bb640cd1.scope. Feb 9 19:38:14.577708 systemd[1]: Started cri-containerd-f5d4db9b059f72e363a8e8d6f7489f838516bd1487d0e70ee99cf1b403cf109a.scope. Feb 9 19:38:14.594326 kubelet[1739]: E0209 19:38:14.594285 1739 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.34:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.34:6443: connect: connection refused Feb 9 19:38:14.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.623772 kernel: audit: type=1400 audit(1707507494.602:643): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.666490 kernel: audit: type=1400 audit(1707507494.602:644): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.666692 kernel: audit: type=1400 audit(1707507494.602:645): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.703090 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:38:14.703257 kernel: audit: type=1400 audit(1707507494.602:646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.703308 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:38:14.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.665000 audit: BPF prog-id=73 op=LOAD Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1815 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061346361333862363439323865326461613362343661633466306335 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1815 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061346361333862363439323865326461613362343661633466306335 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit: BPF prog-id=74 op=LOAD Feb 9 19:38:14.667000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028c5e0 items=0 ppid=1815 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061346361333862363439323865326461613362343661633466306335 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit: BPF prog-id=75 op=LOAD Feb 9 19:38:14.667000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028c628 items=0 ppid=1815 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061346361333862363439323865326461613362343661633466306335 Feb 9 19:38:14.667000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:38:14.667000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.667000 audit: BPF prog-id=76 op=LOAD Feb 9 19:38:14.667000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028ca38 items=0 ppid=1815 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061346361333862363439323865326461613362343661633466306335 Feb 9 19:38:14.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.703000 audit: BPF prog-id=77 op=LOAD Feb 9 19:38:14.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.708000 audit: BPF prog-id=81 op=LOAD Feb 9 19:38:14.710000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.710000 audit[1875]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1849 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643464623962303539663732653336336138653864366637343839 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1849 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643464623962303539663732653336336138653864366637343839 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit: BPF prog-id=82 op=LOAD Feb 9 19:38:14.711000 audit[1875]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000255a0 items=0 ppid=1849 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643464623962303539663732653336336138653864366637343839 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.711000 audit: BPF prog-id=83 op=LOAD Feb 9 19:38:14.711000 audit[1875]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000255e8 items=0 ppid=1849 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643464623962303539663732653336336138653864366637343839 Feb 9 19:38:14.713000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:38:14.713000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:38:14.713000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.713000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.713000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.713000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.713000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.713000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.713000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.713000 audit[1875]: AVC avc: denied { perfmon } for pid=1875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.713000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.713000 audit[1875]: AVC avc: denied { bpf } for pid=1875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.713000 audit: BPF prog-id=84 op=LOAD Feb 9 19:38:14.713000 audit[1875]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000259f8 items=0 ppid=1849 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635643464623962303539663732653336336138653864366637343839 Feb 9 19:38:14.772253 env[1153]: time="2024-02-09T19:38:14.772189838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal,Uid:a90e01a52f8566540921761f3488dce5,Namespace:kube-system,Attempt:0,} returns sandbox id \"40a9db87a3b7bcea9566deb5f5814f5c8c06c180d94843d1bd52a1a2bb640cd1\"" Feb 9 19:38:14.775953 kubelet[1739]: E0209 19:38:14.775922 1739 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-21291" Feb 9 19:38:14.779941 env[1153]: time="2024-02-09T19:38:14.779883327Z" level=info msg="CreateContainer within sandbox \"40a9db87a3b7bcea9566deb5f5814f5c8c06c180d94843d1bd52a1a2bb640cd1\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 19:38:14.808524 env[1153]: time="2024-02-09T19:38:14.808451061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal,Uid:f4bc7f901bc57a99a40e52c303596d92,Namespace:kube-system,Attempt:0,} returns sandbox id \"0a4ca38b64928e2daa3b46ac4f0c571c6b01be21dd3a3737a11e5d642c0faf21\"" Feb 9 19:38:14.811689 kubelet[1739]: E0209 19:38:14.811278 1739 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flat" Feb 9 19:38:14.812179 env[1153]: time="2024-02-09T19:38:14.812127400Z" level=info msg="CreateContainer within sandbox \"40a9db87a3b7bcea9566deb5f5814f5c8c06c180d94843d1bd52a1a2bb640cd1\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"e5aca87aeff009e56d795b932ff94f5ddcde06e727651c08d3deaa163c3f10c9\"" Feb 9 19:38:14.813341 env[1153]: time="2024-02-09T19:38:14.813305327Z" level=info msg="StartContainer for \"e5aca87aeff009e56d795b932ff94f5ddcde06e727651c08d3deaa163c3f10c9\"" Feb 9 19:38:14.819278 env[1153]: time="2024-02-09T19:38:14.819213113Z" level=info msg="CreateContainer within sandbox \"0a4ca38b64928e2daa3b46ac4f0c571c6b01be21dd3a3737a11e5d642c0faf21\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 19:38:14.823331 env[1153]: time="2024-02-09T19:38:14.823285462Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal,Uid:e9ba7c89b2f054f367108df39c4cc881,Namespace:kube-system,Attempt:0,} returns sandbox id \"f5d4db9b059f72e363a8e8d6f7489f838516bd1487d0e70ee99cf1b403cf109a\"" Feb 9 19:38:14.827404 kubelet[1739]: E0209 19:38:14.827362 1739 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-21291" Feb 9 19:38:14.829964 env[1153]: time="2024-02-09T19:38:14.829911844Z" level=info msg="CreateContainer within sandbox \"f5d4db9b059f72e363a8e8d6f7489f838516bd1487d0e70ee99cf1b403cf109a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 19:38:14.848273 systemd[1]: Started cri-containerd-e5aca87aeff009e56d795b932ff94f5ddcde06e727651c08d3deaa163c3f10c9.scope. Feb 9 19:38:14.852189 env[1153]: time="2024-02-09T19:38:14.852131716Z" level=info msg="CreateContainer within sandbox \"0a4ca38b64928e2daa3b46ac4f0c571c6b01be21dd3a3737a11e5d642c0faf21\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"7d42388929bc88919884ba6a4607a7bd618e064c6fc4431d4a1ac01e564ea3da\"" Feb 9 19:38:14.859231 env[1153]: time="2024-02-09T19:38:14.857752864Z" level=info msg="StartContainer for \"7d42388929bc88919884ba6a4607a7bd618e064c6fc4431d4a1ac01e564ea3da\"" Feb 9 19:38:14.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.877000 audit: BPF prog-id=85 op=LOAD Feb 9 19:38:14.879000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.879000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1834 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535616361383761656666303039653536643739356239333266663934 Feb 9 19:38:14.880000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.880000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1834 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535616361383761656666303039653536643739356239333266663934 Feb 9 19:38:14.880000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.880000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.880000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.880000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.880000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.880000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.880000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.880000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.880000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.880000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.880000 audit: BPF prog-id=86 op=LOAD Feb 9 19:38:14.880000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003a89c0 items=0 ppid=1834 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535616361383761656666303039653536643739356239333266663934 Feb 9 19:38:14.881000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.881000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.881000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.881000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.881000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.881000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.881000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.881000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.881000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.881000 audit: BPF prog-id=87 op=LOAD Feb 9 19:38:14.881000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003a8a08 items=0 ppid=1834 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535616361383761656666303039653536643739356239333266663934 Feb 9 19:38:14.882000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:38:14.883000 audit: BPF prog-id=86 op=UNLOAD Feb 9 19:38:14.883000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.883000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.883000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.883000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.883000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.883000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.883000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.883000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.883000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.883000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.883000 audit: BPF prog-id=88 op=LOAD Feb 9 19:38:14.883000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003a8e18 items=0 ppid=1834 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535616361383761656666303039653536643739356239333266663934 Feb 9 19:38:14.885322 env[1153]: time="2024-02-09T19:38:14.885274380Z" level=info msg="CreateContainer within sandbox \"f5d4db9b059f72e363a8e8d6f7489f838516bd1487d0e70ee99cf1b403cf109a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"3b4caca0c05c9e3baa10fa4ec69b6c81ddd932c871cbfdae680a8224b889dacb\"" Feb 9 19:38:14.887075 env[1153]: time="2024-02-09T19:38:14.887032646Z" level=info msg="StartContainer for \"3b4caca0c05c9e3baa10fa4ec69b6c81ddd932c871cbfdae680a8224b889dacb\"" Feb 9 19:38:14.902728 systemd[1]: Started cri-containerd-7d42388929bc88919884ba6a4607a7bd618e064c6fc4431d4a1ac01e564ea3da.scope. Feb 9 19:38:14.927075 systemd[1]: Started cri-containerd-3b4caca0c05c9e3baa10fa4ec69b6c81ddd932c871cbfdae680a8224b889dacb.scope. Feb 9 19:38:14.968849 env[1153]: time="2024-02-09T19:38:14.968787553Z" level=info msg="StartContainer for \"e5aca87aeff009e56d795b932ff94f5ddcde06e727651c08d3deaa163c3f10c9\" returns successfully" Feb 9 19:38:14.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.989000 audit: BPF prog-id=89 op=LOAD Feb 9 19:38:14.989000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.989000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1815 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764343233383839323962633838393139383834626136613436303761 Feb 9 19:38:14.989000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.989000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1815 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764343233383839323962633838393139383834626136613436303761 Feb 9 19:38:14.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.991000 audit: BPF prog-id=90 op=LOAD Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit: BPF prog-id=91 op=LOAD Feb 9 19:38:14.992000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000300df0 items=0 ppid=1815 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764343233383839323962633838393139383834626136613436303761 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit: BPF prog-id=92 op=LOAD Feb 9 19:38:14.992000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000300e38 items=0 ppid=1815 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764343233383839323962633838393139383834626136613436303761 Feb 9 19:38:14.992000 audit: BPF prog-id=92 op=UNLOAD Feb 9 19:38:14.992000 audit: BPF prog-id=91 op=UNLOAD Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.992000 audit: BPF prog-id=93 op=LOAD Feb 9 19:38:14.992000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000301248 items=0 ppid=1815 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764343233383839323962633838393139383834626136613436303761 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1849 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346361636130633035633965336261613130666134656336396236 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1849 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346361636130633035633965336261613130666134656336396236 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit: BPF prog-id=94 op=LOAD Feb 9 19:38:14.997000 audit[1983]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002201e0 items=0 ppid=1849 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346361636130633035633965336261613130666134656336396236 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit: BPF prog-id=95 op=LOAD Feb 9 19:38:14.997000 audit[1983]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000220228 items=0 ppid=1849 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346361636130633035633965336261613130666134656336396236 Feb 9 19:38:14.997000 audit: BPF prog-id=95 op=UNLOAD Feb 9 19:38:14.997000 audit: BPF prog-id=94 op=UNLOAD Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:14.997000 audit: BPF prog-id=96 op=LOAD Feb 9 19:38:14.997000 audit[1983]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000220638 items=0 ppid=1849 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:14.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346361636130633035633965336261613130666134656336396236 Feb 9 19:38:15.068000 env[1153]: time="2024-02-09T19:38:15.067936600Z" level=info msg="StartContainer for \"7d42388929bc88919884ba6a4607a7bd618e064c6fc4431d4a1ac01e564ea3da\" returns successfully" Feb 9 19:38:15.102631 env[1153]: time="2024-02-09T19:38:15.102567981Z" level=info msg="StartContainer for \"3b4caca0c05c9e3baa10fa4ec69b6c81ddd932c871cbfdae680a8224b889dacb\" returns successfully" Feb 9 19:38:15.736468 kubelet[1739]: I0209 19:38:15.736430 1739 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:18.237483 kernel: kauditd_printk_skb: 420 callbacks suppressed Feb 9 19:38:18.237717 kernel: audit: type=1400 audit(1707507498.203:733): avc: denied { watch } for pid=1994 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:18.203000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:18.228000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:18.299750 kernel: audit: type=1400 audit(1707507498.228:734): avc: denied { watch } for pid=1994 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:18.299889 kernel: audit: type=1300 audit(1707507498.203:733): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000268960 a2=fc6 a3=0 items=0 ppid=1815 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 key=(null) Feb 9 19:38:18.203000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000268960 a2=fc6 a3=0 items=0 ppid=1815 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 key=(null) Feb 9 19:38:18.328934 kernel: audit: type=1327 audit(1707507498.203:733): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:18.203000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:18.228000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d66740 a2=fc6 a3=0 items=0 ppid=1815 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 key=(null) Feb 9 19:38:18.363753 kernel: audit: type=1300 audit(1707507498.228:734): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d66740 a2=fc6 a3=0 items=0 ppid=1815 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 key=(null) Feb 9 19:38:18.228000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:18.395694 kernel: audit: type=1327 audit(1707507498.228:734): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:18.639000 audit[1955]: AVC avc: denied { watch } for pid=1955 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:18.669681 kernel: audit: type=1400 audit(1707507498.639:735): avc: denied { watch } for pid=1955 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:18.659000 audit[1955]: AVC avc: denied { watch } for pid=1955 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:18.702679 kernel: audit: type=1400 audit(1707507498.659:736): avc: denied { watch } for pid=1955 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:18.659000 audit[1955]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c0041aaf60 a2=fc6 a3=0 items=0 ppid=1834 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 key=(null) Feb 9 19:38:18.659000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:38:18.769699 kernel: audit: type=1300 audit(1707507498.659:736): arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c0041aaf60 a2=fc6 a3=0 items=0 ppid=1834 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 key=(null) Feb 9 19:38:18.769836 kernel: audit: type=1327 audit(1707507498.659:736): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:38:18.639000 audit[1955]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c002a0e000 a2=fc6 a3=0 items=0 ppid=1834 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 key=(null) Feb 9 19:38:18.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:38:18.670000 audit[1955]: AVC avc: denied { watch } for pid=1955 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:18.670000 audit[1955]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c002a0ea20 a2=fc6 a3=0 items=0 ppid=1834 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 key=(null) Feb 9 19:38:18.670000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:38:18.677000 audit[1955]: AVC avc: denied { watch } for pid=1955 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:18.677000 audit[1955]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=53 a1=c003b12db0 a2=fc6 a3=0 items=0 ppid=1834 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 key=(null) Feb 9 19:38:18.677000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:38:18.701000 audit[1955]: AVC avc: denied { watch } for pid=1955 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:18.701000 audit[1955]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=54 a1=c000e74000 a2=fc6 a3=0 items=0 ppid=1834 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 key=(null) Feb 9 19:38:18.701000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:38:18.703000 audit[1955]: AVC avc: denied { watch } for pid=1955 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:18.703000 audit[1955]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=54 a1=c003895aa0 a2=fc6 a3=0 items=0 ppid=1834 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c559,c1003 key=(null) Feb 9 19:38:18.703000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:38:19.010003 kubelet[1739]: I0209 19:38:19.009873 1739 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:19.127844 kubelet[1739]: E0209 19:38:19.127788 1739 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: namespaces "kube-node-lease" not found Feb 9 19:38:19.544863 kubelet[1739]: I0209 19:38:19.544818 1739 apiserver.go:52] "Watching apiserver" Feb 9 19:38:19.564767 kubelet[1739]: I0209 19:38:19.564727 1739 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:38:19.642006 kubelet[1739]: I0209 19:38:19.641967 1739 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:38:19.977197 kubelet[1739]: E0209 19:38:19.977069 1739 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal.17b2490488afecef", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", UID:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 548766959, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 548766959, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:38:20.031582 kubelet[1739]: E0209 19:38:20.031421 1739 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal.17b2490489cd48a9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", UID:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 567468201, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 567468201, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:38:20.086459 kubelet[1739]: E0209 19:38:20.086282 1739 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal.17b249048c263737", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", UID:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 606850871, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 606850871, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:38:20.141542 kubelet[1739]: E0209 19:38:20.141363 1739 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal.17b249048c265382", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", UID:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 606858114, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 606858114, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:38:20.196480 kubelet[1739]: E0209 19:38:20.196332 1739 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal.17b249048c2662db", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", UID:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 606862043, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 606862043, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:38:20.254970 kubelet[1739]: E0209 19:38:20.254734 1739 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal.17b249048c263737", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", UID:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 606850871, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 38, 12, 675753745, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:38:21.394876 systemd[1]: Reloading. Feb 9 19:38:21.530077 /usr/lib/systemd/system-generators/torcx-generator[2066]: time="2024-02-09T19:38:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:38:21.530126 /usr/lib/systemd/system-generators/torcx-generator[2066]: time="2024-02-09T19:38:21Z" level=info msg="torcx already run" Feb 9 19:38:21.683689 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:38:21.683719 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:38:21.723895 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:38:21.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.846000 audit: BPF prog-id=97 op=LOAD Feb 9 19:38:21.846000 audit: BPF prog-id=58 op=UNLOAD Feb 9 19:38:21.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.847000 audit: BPF prog-id=98 op=LOAD Feb 9 19:38:21.848000 audit: BPF prog-id=77 op=UNLOAD Feb 9 19:38:21.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.850000 audit: BPF prog-id=99 op=LOAD Feb 9 19:38:21.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.850000 audit: BPF prog-id=100 op=LOAD Feb 9 19:38:21.851000 audit: BPF prog-id=59 op=UNLOAD Feb 9 19:38:21.851000 audit: BPF prog-id=60 op=UNLOAD Feb 9 19:38:21.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.852000 audit: BPF prog-id=101 op=LOAD Feb 9 19:38:21.852000 audit: BPF prog-id=61 op=UNLOAD Feb 9 19:38:21.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.853000 audit: BPF prog-id=102 op=LOAD Feb 9 19:38:21.853000 audit: BPF prog-id=73 op=UNLOAD Feb 9 19:38:21.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.854000 audit: BPF prog-id=103 op=LOAD Feb 9 19:38:21.854000 audit: BPF prog-id=81 op=UNLOAD Feb 9 19:38:21.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.855000 audit: BPF prog-id=104 op=LOAD Feb 9 19:38:21.855000 audit: BPF prog-id=85 op=UNLOAD Feb 9 19:38:21.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit: BPF prog-id=105 op=LOAD Feb 9 19:38:21.858000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit: BPF prog-id=106 op=LOAD Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.858000 audit: BPF prog-id=107 op=LOAD Feb 9 19:38:21.858000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:38:21.858000 audit: BPF prog-id=64 op=UNLOAD Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit: BPF prog-id=108 op=LOAD Feb 9 19:38:21.859000 audit: BPF prog-id=65 op=UNLOAD Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit: BPF prog-id=109 op=LOAD Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.859000 audit: BPF prog-id=110 op=LOAD Feb 9 19:38:21.859000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:38:21.859000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:38:21.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.860000 audit: BPF prog-id=111 op=LOAD Feb 9 19:38:21.860000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:38:21.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.861000 audit: BPF prog-id=112 op=LOAD Feb 9 19:38:21.861000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit: BPF prog-id=113 op=LOAD Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.862000 audit: BPF prog-id=114 op=LOAD Feb 9 19:38:21.862000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:38:21.862000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:38:21.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.863000 audit: BPF prog-id=115 op=LOAD Feb 9 19:38:21.863000 audit: BPF prog-id=89 op=UNLOAD Feb 9 19:38:21.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.864000 audit: BPF prog-id=116 op=LOAD Feb 9 19:38:21.864000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:38:21.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:21.868000 audit: BPF prog-id=117 op=LOAD Feb 9 19:38:21.868000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:38:21.895074 kubelet[1739]: I0209 19:38:21.894044 1739 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:38:21.894226 systemd[1]: Stopping kubelet.service... Feb 9 19:38:21.919211 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 19:38:21.919495 systemd[1]: Stopped kubelet.service. Feb 9 19:38:21.919590 systemd[1]: kubelet.service: Consumed 1.770s CPU time. Feb 9 19:38:21.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:21.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:21.922402 systemd[1]: Started kubelet.service. Feb 9 19:38:22.051514 kubelet[2110]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:38:22.051514 kubelet[2110]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:38:22.052141 kubelet[2110]: I0209 19:38:22.051640 2110 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:38:22.053842 kubelet[2110]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:38:22.053842 kubelet[2110]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:38:22.060344 kubelet[2110]: I0209 19:38:22.060303 2110 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:38:22.060344 kubelet[2110]: I0209 19:38:22.060344 2110 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:38:22.060729 kubelet[2110]: I0209 19:38:22.060706 2110 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:38:22.063226 kubelet[2110]: I0209 19:38:22.063188 2110 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 19:38:22.068392 kubelet[2110]: I0209 19:38:22.068351 2110 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:38:22.070540 kubelet[2110]: I0209 19:38:22.070489 2110 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:38:22.070868 kubelet[2110]: I0209 19:38:22.070839 2110 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:38:22.070976 kubelet[2110]: I0209 19:38:22.070953 2110 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:38:22.071124 kubelet[2110]: I0209 19:38:22.070994 2110 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:38:22.071124 kubelet[2110]: I0209 19:38:22.071015 2110 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:38:22.071124 kubelet[2110]: I0209 19:38:22.071085 2110 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:38:22.082068 kubelet[2110]: I0209 19:38:22.082009 2110 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:38:22.082068 kubelet[2110]: I0209 19:38:22.082082 2110 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:38:22.082371 kubelet[2110]: I0209 19:38:22.082137 2110 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:38:22.082371 kubelet[2110]: I0209 19:38:22.082159 2110 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:38:22.089509 kubelet[2110]: I0209 19:38:22.089457 2110 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:38:22.124009 kubelet[2110]: I0209 19:38:22.123971 2110 server.go:1186] "Started kubelet" Feb 9 19:38:22.125979 kubelet[2110]: I0209 19:38:22.125945 2110 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:38:22.127232 kubelet[2110]: I0209 19:38:22.127204 2110 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:38:22.129000 audit[2110]: AVC avc: denied { mac_admin } for pid=2110 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:22.129000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:38:22.129000 audit[2110]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aafc80 a1=c000bfec48 a2=c000aafc20 a3=25 items=0 ppid=1 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:22.129000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:38:22.131136 kubelet[2110]: I0209 19:38:22.131117 2110 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:38:22.130000 audit[2110]: AVC avc: denied { mac_admin } for pid=2110 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:22.130000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:38:22.130000 audit[2110]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f79300 a1=c000bfec60 a2=c000aafda0 a3=25 items=0 ppid=1 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:22.130000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:38:22.131634 kubelet[2110]: I0209 19:38:22.131618 2110 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:38:22.131755 kubelet[2110]: I0209 19:38:22.131742 2110 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:38:22.139894 kubelet[2110]: I0209 19:38:22.139859 2110 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:38:22.142354 kubelet[2110]: I0209 19:38:22.142325 2110 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:38:22.180205 kubelet[2110]: I0209 19:38:22.180170 2110 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:38:22.218691 kubelet[2110]: E0209 19:38:22.215106 2110 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:38:22.218691 kubelet[2110]: E0209 19:38:22.215141 2110 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:38:22.220777 kubelet[2110]: I0209 19:38:22.220748 2110 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:38:22.220944 kubelet[2110]: I0209 19:38:22.220930 2110 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:38:22.221044 kubelet[2110]: I0209 19:38:22.221033 2110 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:38:22.221187 kubelet[2110]: E0209 19:38:22.221174 2110 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:38:22.256530 kubelet[2110]: I0209 19:38:22.256486 2110 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:22.306219 kubelet[2110]: I0209 19:38:22.306093 2110 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:22.310748 kubelet[2110]: I0209 19:38:22.310708 2110 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:22.321774 kubelet[2110]: E0209 19:38:22.321737 2110 kubelet.go:2137] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 19:38:22.362089 kubelet[2110]: I0209 19:38:22.362056 2110 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:38:22.362339 kubelet[2110]: I0209 19:38:22.362323 2110 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:38:22.362451 kubelet[2110]: I0209 19:38:22.362438 2110 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:38:22.362779 kubelet[2110]: I0209 19:38:22.362759 2110 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 19:38:22.362917 kubelet[2110]: I0209 19:38:22.362904 2110 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 19:38:22.363019 kubelet[2110]: I0209 19:38:22.363007 2110 policy_none.go:49] "None policy: Start" Feb 9 19:38:22.366168 kubelet[2110]: I0209 19:38:22.366141 2110 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:38:22.366334 kubelet[2110]: I0209 19:38:22.366319 2110 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:38:22.366694 kubelet[2110]: I0209 19:38:22.366644 2110 state_mem.go:75] "Updated machine memory state" Feb 9 19:38:22.376153 kubelet[2110]: I0209 19:38:22.376129 2110 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:38:22.376000 audit[2110]: AVC avc: denied { mac_admin } for pid=2110 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:38:22.376000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:38:22.376000 audit[2110]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00098c8d0 a1=c000b7a378 a2=c00098c8a0 a3=25 items=0 ppid=1 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:38:22.376000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:38:22.378190 kubelet[2110]: I0209 19:38:22.378167 2110 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:38:22.382730 kubelet[2110]: I0209 19:38:22.382705 2110 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:38:22.522946 kubelet[2110]: I0209 19:38:22.522893 2110 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:38:22.523306 kubelet[2110]: I0209 19:38:22.523276 2110 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:38:22.524501 kubelet[2110]: I0209 19:38:22.524478 2110 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:38:22.546736 kubelet[2110]: I0209 19:38:22.546675 2110 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f4bc7f901bc57a99a40e52c303596d92-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"f4bc7f901bc57a99a40e52c303596d92\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:22.546956 kubelet[2110]: I0209 19:38:22.546783 2110 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e9ba7c89b2f054f367108df39c4cc881-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"e9ba7c89b2f054f367108df39c4cc881\") " pod="kube-system/kube-scheduler-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:22.546956 kubelet[2110]: I0209 19:38:22.546837 2110 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a90e01a52f8566540921761f3488dce5-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"a90e01a52f8566540921761f3488dce5\") " pod="kube-system/kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:22.546956 kubelet[2110]: I0209 19:38:22.546876 2110 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f4bc7f901bc57a99a40e52c303596d92-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"f4bc7f901bc57a99a40e52c303596d92\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:22.546956 kubelet[2110]: I0209 19:38:22.546931 2110 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f4bc7f901bc57a99a40e52c303596d92-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"f4bc7f901bc57a99a40e52c303596d92\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:22.547182 kubelet[2110]: I0209 19:38:22.546968 2110 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a90e01a52f8566540921761f3488dce5-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"a90e01a52f8566540921761f3488dce5\") " pod="kube-system/kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:22.547182 kubelet[2110]: I0209 19:38:22.547045 2110 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a90e01a52f8566540921761f3488dce5-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"a90e01a52f8566540921761f3488dce5\") " pod="kube-system/kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:22.547182 kubelet[2110]: I0209 19:38:22.547115 2110 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f4bc7f901bc57a99a40e52c303596d92-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"f4bc7f901bc57a99a40e52c303596d92\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:22.547182 kubelet[2110]: I0209 19:38:22.547180 2110 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f4bc7f901bc57a99a40e52c303596d92-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" (UID: \"f4bc7f901bc57a99a40e52c303596d92\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:22.762788 update_engine[1142]: I0209 19:38:22.762729 1142 update_attempter.cc:509] Updating boot flags... Feb 9 19:38:23.101909 kubelet[2110]: I0209 19:38:23.098946 2110 apiserver.go:52] "Watching apiserver" Feb 9 19:38:23.142946 kubelet[2110]: I0209 19:38:23.142834 2110 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:38:23.153726 kubelet[2110]: I0209 19:38:23.150748 2110 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:38:23.298262 kubelet[2110]: E0209 19:38:23.298207 2110 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:23.499041 kubelet[2110]: E0209 19:38:23.498896 2110 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:23.902703 kubelet[2110]: E0209 19:38:23.902663 2110 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" Feb 9 19:38:24.497788 kubelet[2110]: I0209 19:38:24.497742 2110 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" podStartSLOduration=2.497672624 pod.CreationTimestamp="2024-02-09 19:38:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:38:24.284033995 +0000 UTC m=+2.349426896" watchObservedRunningTime="2024-02-09 19:38:24.497672624 +0000 UTC m=+2.563065516" Feb 9 19:38:24.498435 kubelet[2110]: I0209 19:38:24.497905 2110 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" podStartSLOduration=2.497867295 pod.CreationTimestamp="2024-02-09 19:38:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:38:24.496666616 +0000 UTC m=+2.562059510" watchObservedRunningTime="2024-02-09 19:38:24.497867295 +0000 UTC m=+2.563260191" Feb 9 19:38:24.942000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:24.948405 kernel: kauditd_printk_skb: 272 callbacks suppressed Feb 9 19:38:24.948581 kernel: audit: type=1400 audit(1707507504.942:990): avc: denied { watch } for pid=1994 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:25.008818 kernel: audit: type=1300 audit(1707507504.942:990): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00134e980 a2=fc6 a3=0 items=0 ppid=1815 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 key=(null) Feb 9 19:38:24.942000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00134e980 a2=fc6 a3=0 items=0 ppid=1815 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 key=(null) Feb 9 19:38:24.942000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:25.040692 kernel: audit: type=1327 audit(1707507504.942:990): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:24.982000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:25.066829 kernel: audit: type=1400 audit(1707507504.982:991): avc: denied { watch } for pid=1994 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:24.982000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013aea20 a2=fc6 a3=0 items=0 ppid=1815 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 key=(null) Feb 9 19:38:25.101686 kernel: audit: type=1300 audit(1707507504.982:991): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013aea20 a2=fc6 a3=0 items=0 ppid=1815 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 key=(null) Feb 9 19:38:24.982000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:25.146028 kernel: audit: type=1327 audit(1707507504.982:991): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:25.146235 kernel: audit: type=1400 audit(1707507504.996:992): avc: denied { watch } for pid=1994 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:24.996000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:24.996000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00134eac0 a2=fc6 a3=0 items=0 ppid=1815 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 key=(null) Feb 9 19:38:25.206936 kernel: audit: type=1300 audit(1707507504.996:992): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00134eac0 a2=fc6 a3=0 items=0 ppid=1815 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 key=(null) Feb 9 19:38:25.207220 kernel: audit: type=1327 audit(1707507504.996:992): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:24.996000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:24.997000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:25.261780 kernel: audit: type=1400 audit(1707507504.997:993): avc: denied { watch } for pid=1994 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:38:24.997000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00134eb00 a2=fc6 a3=0 items=0 ppid=1815 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 key=(null) Feb 9 19:38:24.997000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:25.258000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:38:25.258000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00136c480 a2=fc6 a3=0 items=0 ppid=1815 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c15,c573 key=(null) Feb 9 19:38:25.258000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:38:25.393610 kubelet[2110]: I0209 19:38:25.393568 2110 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-2-4a6f161316511ff20655.c.flatcar-212911.internal" podStartSLOduration=3.393511401 pod.CreationTimestamp="2024-02-09 19:38:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:38:24.909011983 +0000 UTC m=+2.974404889" watchObservedRunningTime="2024-02-09 19:38:25.393511401 +0000 UTC m=+3.458904292" Feb 9 19:38:25.483621 sudo[1366]: pam_unix(sudo:session): session closed for user root Feb 9 19:38:25.483000 audit[1366]: USER_END pid=1366 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:38:25.483000 audit[1366]: CRED_DISP pid=1366 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:38:25.527177 sshd[1363]: pam_unix(sshd:session): session closed for user core Feb 9 19:38:25.528000 audit[1363]: USER_END pid=1363 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:38:25.529000 audit[1363]: CRED_DISP pid=1363 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:38:25.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.34:22-147.75.109.163:47936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:38:25.532507 systemd[1]: sshd@8-10.128.0.34:22-147.75.109.163:47936.service: Deactivated successfully. Feb 9 19:38:25.533751 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:38:25.533992 systemd[1]: session-7.scope: Consumed 5.315s CPU time. Feb 9 19:38:25.536286 systemd-logind[1140]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:38:25.537836 systemd-logind[1140]: Removed session 7.