Feb 12 20:32:59.156673 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 20:32:59.156715 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:32:59.156733 kernel: BIOS-provided physical RAM map: Feb 12 20:32:59.156746 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Feb 12 20:32:59.156767 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Feb 12 20:32:59.156780 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Feb 12 20:32:59.156801 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Feb 12 20:32:59.156815 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Feb 12 20:32:59.156829 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Feb 12 20:32:59.156842 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Feb 12 20:32:59.156856 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Feb 12 20:32:59.156870 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Feb 12 20:32:59.156883 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Feb 12 20:32:59.156911 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Feb 12 20:32:59.156929 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Feb 12 20:32:59.156941 kernel: NX (Execute Disable) protection: active Feb 12 20:32:59.156952 kernel: efi: EFI v2.70 by EDK II Feb 12 20:32:59.156966 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe379198 RNG=0xbfb73018 TPMEventLog=0xbe2bd018 Feb 12 20:32:59.156979 kernel: random: crng init done Feb 12 20:32:59.156991 kernel: SMBIOS 2.4 present. Feb 12 20:32:59.157196 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Feb 12 20:32:59.157214 kernel: Hypervisor detected: KVM Feb 12 20:32:59.157234 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 20:32:59.157246 kernel: kvm-clock: cpu 0, msr 1fbfaa001, primary cpu clock Feb 12 20:32:59.157385 kernel: kvm-clock: using sched offset of 12843861822 cycles Feb 12 20:32:59.157400 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 20:32:59.157415 kernel: tsc: Detected 2299.998 MHz processor Feb 12 20:32:59.157430 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 20:32:59.157444 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 20:32:59.157458 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Feb 12 20:32:59.157605 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 20:32:59.157622 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Feb 12 20:32:59.157641 kernel: Using GB pages for direct mapping Feb 12 20:32:59.157655 kernel: Secure boot disabled Feb 12 20:32:59.157670 kernel: ACPI: Early table checksum verification disabled Feb 12 20:32:59.157684 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Feb 12 20:32:59.157697 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Feb 12 20:32:59.157711 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Feb 12 20:32:59.157843 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Feb 12 20:32:59.157858 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Feb 12 20:32:59.157884 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Feb 12 20:32:59.157914 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Feb 12 20:32:59.157929 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Feb 12 20:32:59.157943 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Feb 12 20:32:59.157959 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Feb 12 20:32:59.157974 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Feb 12 20:32:59.157998 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Feb 12 20:32:59.158014 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Feb 12 20:32:59.158028 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Feb 12 20:32:59.158042 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Feb 12 20:32:59.158057 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Feb 12 20:32:59.158081 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Feb 12 20:32:59.158096 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Feb 12 20:32:59.158109 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Feb 12 20:32:59.158125 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Feb 12 20:32:59.158145 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 20:32:59.158161 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 20:32:59.158178 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 12 20:32:59.158195 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Feb 12 20:32:59.158211 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Feb 12 20:32:59.158228 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Feb 12 20:32:59.158245 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Feb 12 20:32:59.158261 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Feb 12 20:32:59.158278 kernel: Zone ranges: Feb 12 20:32:59.158298 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 20:32:59.158315 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 12 20:32:59.158331 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Feb 12 20:32:59.158347 kernel: Movable zone start for each node Feb 12 20:32:59.158364 kernel: Early memory node ranges Feb 12 20:32:59.158380 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Feb 12 20:32:59.158393 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Feb 12 20:32:59.158408 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Feb 12 20:32:59.158422 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Feb 12 20:32:59.158442 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Feb 12 20:32:59.158457 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Feb 12 20:32:59.158472 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 20:32:59.158487 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Feb 12 20:32:59.158501 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Feb 12 20:32:59.158516 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Feb 12 20:32:59.158532 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Feb 12 20:32:59.158548 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 12 20:32:59.158562 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 20:32:59.158589 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 20:32:59.158605 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 20:32:59.158618 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 20:32:59.158632 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 20:32:59.158648 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 20:32:59.158665 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 20:32:59.158680 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 20:32:59.158697 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Feb 12 20:32:59.158713 kernel: Booting paravirtualized kernel on KVM Feb 12 20:32:59.158742 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 20:32:59.158760 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 20:32:59.158776 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 20:32:59.158793 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 20:32:59.158809 kernel: pcpu-alloc: [0] 0 1 Feb 12 20:32:59.158825 kernel: kvm-guest: PV spinlocks enabled Feb 12 20:32:59.158839 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 20:32:59.158855 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Feb 12 20:32:59.158871 kernel: Policy zone: Normal Feb 12 20:32:59.158911 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:32:59.158928 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 20:32:59.158942 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 12 20:32:59.158957 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 20:32:59.158972 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 20:32:59.158988 kernel: Memory: 7536516K/7860584K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 323808K reserved, 0K cma-reserved) Feb 12 20:32:59.159003 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 20:32:59.159018 kernel: Kernel/User page tables isolation: enabled Feb 12 20:32:59.159039 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 20:32:59.159055 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 20:32:59.159079 kernel: rcu: Hierarchical RCU implementation. Feb 12 20:32:59.159097 kernel: rcu: RCU event tracing is enabled. Feb 12 20:32:59.159114 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 20:32:59.159129 kernel: Rude variant of Tasks RCU enabled. Feb 12 20:32:59.159145 kernel: Tracing variant of Tasks RCU enabled. Feb 12 20:32:59.159162 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 20:32:59.159178 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 20:32:59.159200 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 20:32:59.159251 kernel: Console: colour dummy device 80x25 Feb 12 20:32:59.159268 kernel: printk: console [ttyS0] enabled Feb 12 20:32:59.159289 kernel: ACPI: Core revision 20210730 Feb 12 20:32:59.159306 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 20:32:59.159323 kernel: x2apic enabled Feb 12 20:32:59.159340 kernel: Switched APIC routing to physical x2apic. Feb 12 20:32:59.159358 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Feb 12 20:32:59.159375 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 12 20:32:59.159394 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Feb 12 20:32:59.159414 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Feb 12 20:32:59.159431 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Feb 12 20:32:59.159461 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 20:32:59.159478 kernel: Spectre V2 : Mitigation: IBRS Feb 12 20:32:59.159495 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 20:32:59.159513 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 20:32:59.159535 kernel: RETBleed: Mitigation: IBRS Feb 12 20:32:59.159552 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 20:32:59.159570 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Feb 12 20:32:59.159587 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 20:32:59.159605 kernel: MDS: Mitigation: Clear CPU buffers Feb 12 20:32:59.159623 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 20:32:59.159651 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 20:32:59.159669 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 20:32:59.159686 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 20:32:59.159709 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 20:32:59.159727 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 12 20:32:59.159745 kernel: Freeing SMP alternatives memory: 32K Feb 12 20:32:59.159763 kernel: pid_max: default: 32768 minimum: 301 Feb 12 20:32:59.159780 kernel: LSM: Security Framework initializing Feb 12 20:32:59.159797 kernel: SELinux: Initializing. Feb 12 20:32:59.159814 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 20:32:59.159831 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 20:32:59.159847 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Feb 12 20:32:59.159869 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 12 20:32:59.159942 kernel: signal: max sigframe size: 1776 Feb 12 20:32:59.159961 kernel: rcu: Hierarchical SRCU implementation. Feb 12 20:32:59.159979 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 20:32:59.159996 kernel: smp: Bringing up secondary CPUs ... Feb 12 20:32:59.160014 kernel: x86: Booting SMP configuration: Feb 12 20:32:59.160030 kernel: .... node #0, CPUs: #1 Feb 12 20:32:59.160048 kernel: kvm-clock: cpu 1, msr 1fbfaa041, secondary cpu clock Feb 12 20:32:59.160066 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 12 20:32:59.160099 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 20:32:59.160116 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 20:32:59.160134 kernel: smpboot: Max logical packages: 1 Feb 12 20:32:59.160152 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Feb 12 20:32:59.160170 kernel: devtmpfs: initialized Feb 12 20:32:59.160187 kernel: x86/mm: Memory block size: 128MB Feb 12 20:32:59.160203 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Feb 12 20:32:59.160220 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 20:32:59.160238 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 20:32:59.160260 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 20:32:59.160277 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 20:32:59.160295 kernel: audit: initializing netlink subsys (disabled) Feb 12 20:32:59.160313 kernel: audit: type=2000 audit(1707769978.209:1): state=initialized audit_enabled=0 res=1 Feb 12 20:32:59.160331 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 20:32:59.160347 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 20:32:59.160378 kernel: cpuidle: using governor menu Feb 12 20:32:59.160396 kernel: ACPI: bus type PCI registered Feb 12 20:32:59.160413 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 20:32:59.160436 kernel: dca service started, version 1.12.1 Feb 12 20:32:59.160454 kernel: PCI: Using configuration type 1 for base access Feb 12 20:32:59.160472 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 20:32:59.160489 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 20:32:59.160507 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 20:32:59.160524 kernel: ACPI: Added _OSI(Module Device) Feb 12 20:32:59.160539 kernel: ACPI: Added _OSI(Processor Device) Feb 12 20:32:59.160555 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 20:32:59.160571 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 20:32:59.160593 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 20:32:59.160611 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 20:32:59.160628 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 20:32:59.160646 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 12 20:32:59.160664 kernel: ACPI: Interpreter enabled Feb 12 20:32:59.160682 kernel: ACPI: PM: (supports S0 S3 S5) Feb 12 20:32:59.160699 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 20:32:59.160717 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 20:32:59.160735 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 12 20:32:59.160758 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 20:32:59.161033 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 20:32:59.161208 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 20:32:59.161230 kernel: PCI host bridge to bus 0000:00 Feb 12 20:32:59.163279 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 20:32:59.163463 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 20:32:59.163640 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 20:32:59.163826 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Feb 12 20:32:59.164003 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 20:32:59.164196 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 20:32:59.164383 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Feb 12 20:32:59.164576 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 20:32:59.164753 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 12 20:32:59.164959 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Feb 12 20:32:59.165148 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Feb 12 20:32:59.165325 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Feb 12 20:32:59.165515 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 12 20:32:59.165700 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Feb 12 20:32:59.165872 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Feb 12 20:32:59.166086 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 20:32:59.166265 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 12 20:32:59.166437 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Feb 12 20:32:59.166458 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 20:32:59.166475 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 20:32:59.166496 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 20:32:59.166519 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 20:32:59.166542 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 20:32:59.166586 kernel: iommu: Default domain type: Translated Feb 12 20:32:59.166607 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 20:32:59.166621 kernel: vgaarb: loaded Feb 12 20:32:59.166639 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 20:32:59.166656 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 20:32:59.166674 kernel: PTP clock support registered Feb 12 20:32:59.166690 kernel: Registered efivars operations Feb 12 20:32:59.166708 kernel: PCI: Using ACPI for IRQ routing Feb 12 20:32:59.166725 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 20:32:59.166746 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Feb 12 20:32:59.166763 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Feb 12 20:32:59.166780 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Feb 12 20:32:59.166796 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Feb 12 20:32:59.166833 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 20:32:59.166850 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 20:32:59.166868 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 20:32:59.166897 kernel: pnp: PnP ACPI init Feb 12 20:32:59.166915 kernel: pnp: PnP ACPI: found 7 devices Feb 12 20:32:59.166937 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 20:32:59.166955 kernel: NET: Registered PF_INET protocol family Feb 12 20:32:59.166972 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 20:32:59.166989 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 12 20:32:59.167006 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 20:32:59.167024 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 20:32:59.167041 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 12 20:32:59.167058 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 12 20:32:59.167075 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 20:32:59.167097 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 20:32:59.167113 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 20:32:59.167131 kernel: NET: Registered PF_XDP protocol family Feb 12 20:32:59.167313 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 20:32:59.167466 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 20:32:59.167623 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 20:32:59.167771 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Feb 12 20:32:59.172062 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 20:32:59.172106 kernel: PCI: CLS 0 bytes, default 64 Feb 12 20:32:59.172124 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 12 20:32:59.172143 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Feb 12 20:32:59.172160 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 20:32:59.172176 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 12 20:32:59.172190 kernel: clocksource: Switched to clocksource tsc Feb 12 20:32:59.172206 kernel: Initialise system trusted keyrings Feb 12 20:32:59.172223 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 12 20:32:59.172245 kernel: Key type asymmetric registered Feb 12 20:32:59.172259 kernel: Asymmetric key parser 'x509' registered Feb 12 20:32:59.172274 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 20:32:59.172291 kernel: io scheduler mq-deadline registered Feb 12 20:32:59.172307 kernel: io scheduler kyber registered Feb 12 20:32:59.172322 kernel: io scheduler bfq registered Feb 12 20:32:59.172343 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 20:32:59.172365 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 20:32:59.172601 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Feb 12 20:32:59.172634 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 12 20:32:59.172813 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Feb 12 20:32:59.172837 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 20:32:59.175526 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Feb 12 20:32:59.175560 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 20:32:59.175588 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 20:32:59.175606 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 12 20:32:59.175622 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Feb 12 20:32:59.175639 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Feb 12 20:32:59.175830 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Feb 12 20:32:59.175856 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 20:32:59.175873 kernel: i8042: Warning: Keylock active Feb 12 20:32:59.175905 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 20:32:59.175923 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 20:32:59.176094 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 12 20:32:59.176249 kernel: rtc_cmos 00:00: registered as rtc0 Feb 12 20:32:59.176409 kernel: rtc_cmos 00:00: setting system clock to 2024-02-12T20:32:58 UTC (1707769978) Feb 12 20:32:59.176564 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 12 20:32:59.176594 kernel: intel_pstate: CPU model not supported Feb 12 20:32:59.176613 kernel: pstore: Registered efi as persistent store backend Feb 12 20:32:59.176631 kernel: NET: Registered PF_INET6 protocol family Feb 12 20:32:59.176647 kernel: Segment Routing with IPv6 Feb 12 20:32:59.176664 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 20:32:59.176681 kernel: NET: Registered PF_PACKET protocol family Feb 12 20:32:59.176698 kernel: Key type dns_resolver registered Feb 12 20:32:59.176721 kernel: IPI shorthand broadcast: enabled Feb 12 20:32:59.176739 kernel: sched_clock: Marking stable (802156370, 145525401)->(982183681, -34501910) Feb 12 20:32:59.176756 kernel: registered taskstats version 1 Feb 12 20:32:59.176773 kernel: Loading compiled-in X.509 certificates Feb 12 20:32:59.176790 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 20:32:59.176809 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 20:32:59.176826 kernel: Key type .fscrypt registered Feb 12 20:32:59.176843 kernel: Key type fscrypt-provisioning registered Feb 12 20:32:59.176861 kernel: pstore: Using crash dump compression: deflate Feb 12 20:32:59.176883 kernel: ima: Allocated hash algorithm: sha1 Feb 12 20:32:59.179299 kernel: ima: No architecture policies found Feb 12 20:32:59.179319 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 20:32:59.179336 kernel: Write protecting the kernel read-only data: 28672k Feb 12 20:32:59.179353 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 20:32:59.179370 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 20:32:59.179386 kernel: Run /init as init process Feb 12 20:32:59.179403 kernel: with arguments: Feb 12 20:32:59.179426 kernel: /init Feb 12 20:32:59.179442 kernel: with environment: Feb 12 20:32:59.179458 kernel: HOME=/ Feb 12 20:32:59.179474 kernel: TERM=linux Feb 12 20:32:59.179490 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 20:32:59.179512 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:32:59.179533 systemd[1]: Detected virtualization kvm. Feb 12 20:32:59.179551 systemd[1]: Detected architecture x86-64. Feb 12 20:32:59.179581 systemd[1]: Running in initrd. Feb 12 20:32:59.179596 systemd[1]: No hostname configured, using default hostname. Feb 12 20:32:59.179612 systemd[1]: Hostname set to . Feb 12 20:32:59.179630 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:32:59.179647 systemd[1]: Queued start job for default target initrd.target. Feb 12 20:32:59.179664 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:32:59.179681 systemd[1]: Reached target cryptsetup.target. Feb 12 20:32:59.179699 systemd[1]: Reached target paths.target. Feb 12 20:32:59.179720 systemd[1]: Reached target slices.target. Feb 12 20:32:59.179738 systemd[1]: Reached target swap.target. Feb 12 20:32:59.179755 systemd[1]: Reached target timers.target. Feb 12 20:32:59.179773 systemd[1]: Listening on iscsid.socket. Feb 12 20:32:59.179790 systemd[1]: Listening on iscsiuio.socket. Feb 12 20:32:59.179808 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 20:32:59.179825 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 20:32:59.179843 systemd[1]: Listening on systemd-journald.socket. Feb 12 20:32:59.179865 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:32:59.179882 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:32:59.179929 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:32:59.179946 systemd[1]: Reached target sockets.target. Feb 12 20:32:59.179964 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:32:59.179981 systemd[1]: Finished network-cleanup.service. Feb 12 20:32:59.179998 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 20:32:59.180015 systemd[1]: Starting systemd-journald.service... Feb 12 20:32:59.180033 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:32:59.180055 systemd[1]: Starting systemd-resolved.service... Feb 12 20:32:59.180072 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 20:32:59.180112 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:32:59.180143 systemd-journald[190]: Journal started Feb 12 20:32:59.180244 systemd-journald[190]: Runtime Journal (/run/log/journal/dbf87cb86b8992fbe5c13e23aaf248b1) is 8.0M, max 148.8M, 140.8M free. Feb 12 20:32:59.172390 systemd-modules-load[191]: Inserted module 'overlay' Feb 12 20:32:59.197043 kernel: audit: type=1130 audit(1707769979.178:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.197093 systemd[1]: Started systemd-journald.service. Feb 12 20:32:59.197123 kernel: audit: type=1130 audit(1707769979.188:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.194091 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 20:32:59.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.205506 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 20:32:59.233392 kernel: audit: type=1130 audit(1707769979.203:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.233439 kernel: audit: type=1130 audit(1707769979.212:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.233474 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 20:32:59.233496 kernel: Bridge firewalling registered Feb 12 20:32:59.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.215735 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 20:32:59.224440 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 20:32:59.233350 systemd-modules-load[191]: Inserted module 'br_netfilter' Feb 12 20:32:59.266366 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 20:32:59.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.270910 kernel: audit: type=1130 audit(1707769979.264:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.274921 kernel: SCSI subsystem initialized Feb 12 20:32:59.279185 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 20:32:59.293373 kernel: audit: type=1130 audit(1707769979.281:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.281306 systemd-resolved[192]: Positive Trust Anchors: Feb 12 20:32:59.281322 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:32:59.305485 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 20:32:59.305534 kernel: device-mapper: uevent: version 1.0.3 Feb 12 20:32:59.281391 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:32:59.317177 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 20:32:59.317261 dracut-cmdline[206]: dracut-dracut-053 Feb 12 20:32:59.317261 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:32:59.347171 kernel: audit: type=1130 audit(1707769979.320:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.347209 kernel: audit: type=1130 audit(1707769979.332:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.284692 systemd[1]: Starting dracut-cmdline.service... Feb 12 20:32:59.296527 systemd-resolved[192]: Defaulting to hostname 'linux'. Feb 12 20:32:59.299720 systemd[1]: Started systemd-resolved.service. Feb 12 20:32:59.313505 systemd-modules-load[191]: Inserted module 'dm_multipath' Feb 12 20:32:59.322535 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:32:59.334273 systemd[1]: Reached target nss-lookup.target. Feb 12 20:32:59.352335 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:32:59.381258 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:32:59.391056 kernel: audit: type=1130 audit(1707769979.383:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.417927 kernel: Loading iSCSI transport class v2.0-870. Feb 12 20:32:59.431948 kernel: iscsi: registered transport (tcp) Feb 12 20:32:59.457507 kernel: iscsi: registered transport (qla4xxx) Feb 12 20:32:59.457615 kernel: QLogic iSCSI HBA Driver Feb 12 20:32:59.503908 systemd[1]: Finished dracut-cmdline.service. Feb 12 20:32:59.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.506362 systemd[1]: Starting dracut-pre-udev.service... Feb 12 20:32:59.563999 kernel: raid6: avx2x4 gen() 22971 MB/s Feb 12 20:32:59.580932 kernel: raid6: avx2x4 xor() 6357 MB/s Feb 12 20:32:59.597926 kernel: raid6: avx2x2 gen() 24221 MB/s Feb 12 20:32:59.614933 kernel: raid6: avx2x2 xor() 18608 MB/s Feb 12 20:32:59.632929 kernel: raid6: avx2x1 gen() 21260 MB/s Feb 12 20:32:59.649934 kernel: raid6: avx2x1 xor() 16221 MB/s Feb 12 20:32:59.666956 kernel: raid6: sse2x4 gen() 10180 MB/s Feb 12 20:32:59.683938 kernel: raid6: sse2x4 xor() 6146 MB/s Feb 12 20:32:59.700934 kernel: raid6: sse2x2 gen() 11036 MB/s Feb 12 20:32:59.717936 kernel: raid6: sse2x2 xor() 7446 MB/s Feb 12 20:32:59.734931 kernel: raid6: sse2x1 gen() 9774 MB/s Feb 12 20:32:59.752947 kernel: raid6: sse2x1 xor() 5197 MB/s Feb 12 20:32:59.752996 kernel: raid6: using algorithm avx2x2 gen() 24221 MB/s Feb 12 20:32:59.753018 kernel: raid6: .... xor() 18608 MB/s, rmw enabled Feb 12 20:32:59.754610 kernel: raid6: using avx2x2 recovery algorithm Feb 12 20:32:59.769938 kernel: xor: automatically using best checksumming function avx Feb 12 20:32:59.879940 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 20:32:59.891997 systemd[1]: Finished dracut-pre-udev.service. Feb 12 20:32:59.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.895000 audit: BPF prog-id=7 op=LOAD Feb 12 20:32:59.895000 audit: BPF prog-id=8 op=LOAD Feb 12 20:32:59.898009 systemd[1]: Starting systemd-udevd.service... Feb 12 20:32:59.916345 systemd-udevd[389]: Using default interface naming scheme 'v252'. Feb 12 20:32:59.923619 systemd[1]: Started systemd-udevd.service. Feb 12 20:32:59.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.926364 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 20:32:59.946931 dracut-pre-trigger[394]: rd.md=0: removing MD RAID activation Feb 12 20:32:59.986808 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 20:32:59.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:32:59.988530 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:33:00.056222 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:33:00.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:00.132945 kernel: scsi host0: Virtio SCSI HBA Feb 12 20:33:00.141927 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Feb 12 20:33:00.159990 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 20:33:00.243499 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Feb 12 20:33:00.243866 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Feb 12 20:33:00.245911 kernel: sd 0:0:1:0: [sda] Write Protect is off Feb 12 20:33:00.246225 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Feb 12 20:33:00.249918 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 12 20:33:00.268379 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 20:33:00.268473 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 20:33:00.268500 kernel: GPT:17805311 != 25165823 Feb 12 20:33:00.268521 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 20:33:00.268540 kernel: GPT:17805311 != 25165823 Feb 12 20:33:00.268560 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 20:33:00.268590 kernel: AES CTR mode by8 optimization enabled Feb 12 20:33:00.268612 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:33:00.270911 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Feb 12 20:33:00.320918 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (425) Feb 12 20:33:00.335717 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 20:33:00.355764 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 20:33:00.362214 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:33:00.368700 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 20:33:00.368986 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 20:33:00.379425 systemd[1]: Starting disk-uuid.service... Feb 12 20:33:00.391045 disk-uuid[501]: Primary Header is updated. Feb 12 20:33:00.391045 disk-uuid[501]: Secondary Entries is updated. Feb 12 20:33:00.391045 disk-uuid[501]: Secondary Header is updated. Feb 12 20:33:00.403911 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:33:00.410909 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:33:01.437839 disk-uuid[502]: The operation has completed successfully. Feb 12 20:33:01.447080 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:33:01.508510 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 20:33:01.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:01.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:01.508677 systemd[1]: Finished disk-uuid.service. Feb 12 20:33:01.528048 systemd[1]: Starting verity-setup.service... Feb 12 20:33:01.556950 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 20:33:01.633057 systemd[1]: Found device dev-mapper-usr.device. Feb 12 20:33:01.636622 systemd[1]: Mounting sysusr-usr.mount... Feb 12 20:33:01.647673 systemd[1]: Finished verity-setup.service. Feb 12 20:33:01.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:01.741935 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 20:33:01.742436 systemd[1]: Mounted sysusr-usr.mount. Feb 12 20:33:01.749310 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 20:33:01.750514 systemd[1]: Starting ignition-setup.service... Feb 12 20:33:01.786867 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:33:01.786933 kernel: BTRFS info (device sda6): using free space tree Feb 12 20:33:01.786958 kernel: BTRFS info (device sda6): has skinny extents Feb 12 20:33:01.797936 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 20:33:01.806554 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 20:33:01.819720 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 20:33:01.839161 systemd[1]: Finished ignition-setup.service. Feb 12 20:33:01.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:01.849793 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 20:33:01.923714 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 20:33:01.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:01.937000 audit: BPF prog-id=9 op=LOAD Feb 12 20:33:01.940471 systemd[1]: Starting systemd-networkd.service... Feb 12 20:33:01.975859 systemd-networkd[677]: lo: Link UP Feb 12 20:33:01.975874 systemd-networkd[677]: lo: Gained carrier Feb 12 20:33:01.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:01.976838 systemd-networkd[677]: Enumeration completed Feb 12 20:33:01.977043 systemd[1]: Started systemd-networkd.service. Feb 12 20:33:01.977453 systemd-networkd[677]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:33:02.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:01.980174 systemd-networkd[677]: eth0: Link UP Feb 12 20:33:02.060108 iscsid[686]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:33:02.060108 iscsid[686]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 12 20:33:02.060108 iscsid[686]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 20:33:02.060108 iscsid[686]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 20:33:02.060108 iscsid[686]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 20:33:02.060108 iscsid[686]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:33:02.060108 iscsid[686]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 20:33:02.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:02.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:01.980182 systemd-networkd[677]: eth0: Gained carrier Feb 12 20:33:02.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:02.135683 ignition[601]: Ignition 2.14.0 Feb 12 20:33:01.984419 systemd[1]: Reached target network.target. Feb 12 20:33:02.135700 ignition[601]: Stage: fetch-offline Feb 12 20:33:01.993018 systemd-networkd[677]: eth0: DHCPv4 address 10.128.0.29/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 12 20:33:02.135781 ignition[601]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:33:01.998839 systemd[1]: Starting iscsiuio.service... Feb 12 20:33:02.135831 ignition[601]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:33:02.019460 systemd[1]: Started iscsiuio.service. Feb 12 20:33:02.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:02.162232 ignition[601]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:33:02.034964 systemd[1]: Starting iscsid.service... Feb 12 20:33:02.162483 ignition[601]: parsed url from cmdline: "" Feb 12 20:33:02.053401 systemd[1]: Started iscsid.service. Feb 12 20:33:02.162489 ignition[601]: no config URL provided Feb 12 20:33:02.069151 systemd[1]: Starting dracut-initqueue.service... Feb 12 20:33:02.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:02.162497 ignition[601]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:33:02.135687 systemd[1]: Finished dracut-initqueue.service. Feb 12 20:33:02.162511 ignition[601]: no config at "/usr/lib/ignition/user.ign" Feb 12 20:33:02.169555 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 20:33:02.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:02.162522 ignition[601]: failed to fetch config: resource requires networking Feb 12 20:33:02.188487 systemd[1]: Reached target remote-fs-pre.target. Feb 12 20:33:02.162844 ignition[601]: Ignition finished successfully Feb 12 20:33:02.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:02.203101 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:33:02.258560 ignition[701]: Ignition 2.14.0 Feb 12 20:33:02.216105 systemd[1]: Reached target remote-fs.target. Feb 12 20:33:02.258571 ignition[701]: Stage: fetch Feb 12 20:33:02.217586 systemd[1]: Starting dracut-pre-mount.service... Feb 12 20:33:02.258720 ignition[701]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:33:02.244694 systemd[1]: Starting ignition-fetch.service... Feb 12 20:33:02.258754 ignition[701]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:33:02.273783 systemd[1]: Finished dracut-pre-mount.service. Feb 12 20:33:02.266862 ignition[701]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:33:02.324052 unknown[701]: fetched base config from "system" Feb 12 20:33:02.267101 ignition[701]: parsed url from cmdline: "" Feb 12 20:33:02.324061 unknown[701]: fetched base config from "system" Feb 12 20:33:02.267108 ignition[701]: no config URL provided Feb 12 20:33:02.324069 unknown[701]: fetched user config from "gcp" Feb 12 20:33:02.267117 ignition[701]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:33:02.327113 systemd[1]: Finished ignition-fetch.service. Feb 12 20:33:02.267131 ignition[701]: no config at "/usr/lib/ignition/user.ign" Feb 12 20:33:02.337588 systemd[1]: Starting ignition-kargs.service... Feb 12 20:33:02.267172 ignition[701]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Feb 12 20:33:02.369467 systemd[1]: Finished ignition-kargs.service. Feb 12 20:33:02.275380 ignition[701]: GET result: OK Feb 12 20:33:02.386699 systemd[1]: Starting ignition-disks.service... Feb 12 20:33:02.275518 ignition[701]: parsing config with SHA512: 70c5bb523d926f6c603011b5e21d4ee2f240f3734c5c3287ef7fa496df68146c7ba1e562002ac452937ca2d3c99f05fe15b0087e29ea62902eb2fe6718bee670 Feb 12 20:33:02.411501 systemd[1]: Finished ignition-disks.service. Feb 12 20:33:02.324979 ignition[701]: fetch: fetch complete Feb 12 20:33:02.427358 systemd[1]: Reached target initrd-root-device.target. Feb 12 20:33:02.324986 ignition[701]: fetch: fetch passed Feb 12 20:33:02.442112 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:33:02.325049 ignition[701]: Ignition finished successfully Feb 12 20:33:02.456140 systemd[1]: Reached target local-fs.target. Feb 12 20:33:02.352496 ignition[707]: Ignition 2.14.0 Feb 12 20:33:02.456294 systemd[1]: Reached target sysinit.target. Feb 12 20:33:02.352506 ignition[707]: Stage: kargs Feb 12 20:33:02.477135 systemd[1]: Reached target basic.target. Feb 12 20:33:02.352659 ignition[707]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:33:02.478679 systemd[1]: Starting systemd-fsck-root.service... Feb 12 20:33:02.352697 ignition[707]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:33:02.360827 ignition[707]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:33:02.362935 ignition[707]: kargs: kargs passed Feb 12 20:33:02.363004 ignition[707]: Ignition finished successfully Feb 12 20:33:02.399831 ignition[713]: Ignition 2.14.0 Feb 12 20:33:02.399841 ignition[713]: Stage: disks Feb 12 20:33:02.400047 ignition[713]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:33:02.400085 ignition[713]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:33:02.408069 ignition[713]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:33:02.409733 ignition[713]: disks: disks passed Feb 12 20:33:02.409797 ignition[713]: Ignition finished successfully Feb 12 20:33:02.518632 systemd-fsck[721]: ROOT: clean, 602/1628000 files, 124050/1617920 blocks Feb 12 20:33:02.734086 systemd[1]: Finished systemd-fsck-root.service. Feb 12 20:33:02.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:02.744503 systemd[1]: Mounting sysroot.mount... Feb 12 20:33:02.773228 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 20:33:02.772410 systemd[1]: Mounted sysroot.mount. Feb 12 20:33:02.780412 systemd[1]: Reached target initrd-root-fs.target. Feb 12 20:33:02.800663 systemd[1]: Mounting sysroot-usr.mount... Feb 12 20:33:02.817599 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 20:33:02.817692 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 20:33:02.817745 systemd[1]: Reached target ignition-diskful.target. Feb 12 20:33:02.887236 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (727) Feb 12 20:33:02.887289 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:33:02.887312 kernel: BTRFS info (device sda6): using free space tree Feb 12 20:33:02.887335 kernel: BTRFS info (device sda6): has skinny extents Feb 12 20:33:02.819458 systemd[1]: Mounted sysroot-usr.mount. Feb 12 20:33:02.848924 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:33:02.920129 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 20:33:02.906904 systemd[1]: Starting initrd-setup-root.service... Feb 12 20:33:02.931241 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:33:02.951215 initrd-setup-root[750]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 20:33:02.961047 initrd-setup-root[758]: cut: /sysroot/etc/group: No such file or directory Feb 12 20:33:02.971055 initrd-setup-root[766]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 20:33:02.982073 initrd-setup-root[774]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 20:33:03.024998 systemd[1]: Finished initrd-setup-root.service. Feb 12 20:33:03.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:03.026410 systemd[1]: Starting ignition-mount.service... Feb 12 20:33:03.055314 systemd[1]: Starting sysroot-boot.service... Feb 12 20:33:03.063465 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 20:33:03.063739 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 20:33:03.080050 systemd-networkd[677]: eth0: Gained IPv6LL Feb 12 20:33:03.097057 ignition[792]: INFO : Ignition 2.14.0 Feb 12 20:33:03.097057 ignition[792]: INFO : Stage: mount Feb 12 20:33:03.097057 ignition[792]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:33:03.097057 ignition[792]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:33:03.200141 kernel: kauditd_printk_skb: 24 callbacks suppressed Feb 12 20:33:03.200220 kernel: audit: type=1130 audit(1707769983.109:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:03.200251 kernel: audit: type=1130 audit(1707769983.159:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:03.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:03.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:03.200411 ignition[792]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:33:03.200411 ignition[792]: INFO : mount: mount passed Feb 12 20:33:03.200411 ignition[792]: INFO : Ignition finished successfully Feb 12 20:33:03.277105 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (802) Feb 12 20:33:03.277163 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:33:03.277189 kernel: BTRFS info (device sda6): using free space tree Feb 12 20:33:03.277210 kernel: BTRFS info (device sda6): has skinny extents Feb 12 20:33:03.277236 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 20:33:03.103478 systemd[1]: Finished sysroot-boot.service. Feb 12 20:33:03.111723 systemd[1]: Finished ignition-mount.service. Feb 12 20:33:03.162835 systemd[1]: Starting ignition-files.service... Feb 12 20:33:03.307176 ignition[821]: INFO : Ignition 2.14.0 Feb 12 20:33:03.307176 ignition[821]: INFO : Stage: files Feb 12 20:33:03.307176 ignition[821]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:33:03.307176 ignition[821]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:33:03.212923 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:33:03.362153 ignition[821]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:33:03.362153 ignition[821]: DEBUG : files: compiled without relabeling support, skipping Feb 12 20:33:03.362153 ignition[821]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 20:33:03.362153 ignition[821]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 20:33:03.362153 ignition[821]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 20:33:03.362153 ignition[821]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 20:33:03.362153 ignition[821]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 20:33:03.362153 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 20:33:03.362153 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 12 20:33:03.274917 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:33:03.333704 unknown[821]: wrote ssh authorized keys file for user: core Feb 12 20:33:03.647933 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 20:33:03.881255 ignition[821]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 12 20:33:03.905100 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 20:33:03.905100 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 20:33:03.905100 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 20:33:03.983209 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 20:33:04.104359 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 20:33:04.132080 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (823) Feb 12 20:33:04.132126 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/hosts" Feb 12 20:33:04.132126 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(5): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:33:04.132126 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem62157394" Feb 12 20:33:04.132126 ignition[821]: CRITICAL : files: createFilesystemsFiles: createFiles: op(5): op(6): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem62157394": device or resource busy Feb 12 20:33:04.132126 ignition[821]: ERROR : files: createFilesystemsFiles: createFiles: op(5): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem62157394", trying btrfs: device or resource busy Feb 12 20:33:04.132126 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem62157394" Feb 12 20:33:04.132126 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem62157394" Feb 12 20:33:04.132126 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [started] unmounting "/mnt/oem62157394" Feb 12 20:33:04.265152 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [finished] unmounting "/mnt/oem62157394" Feb 12 20:33:04.265152 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/hosts" Feb 12 20:33:04.265152 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 20:33:04.265152 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 12 20:33:04.133016 systemd[1]: mnt-oem62157394.mount: Deactivated successfully. Feb 12 20:33:04.345911 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Feb 12 20:33:04.462631 ignition[821]: DEBUG : files: createFilesystemsFiles: createFiles: op(9): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 12 20:33:04.487108 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 20:33:04.487108 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 20:33:04.487108 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 12 20:33:04.549190 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Feb 12 20:33:04.858069 ignition[821]: DEBUG : files: createFilesystemsFiles: createFiles: op(a): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 12 20:33:04.882067 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 20:33:04.882067 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 12 20:33:04.882067 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:33:04.882067 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4155543992" Feb 12 20:33:04.882067 ignition[821]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4155543992": device or resource busy Feb 12 20:33:04.882067 ignition[821]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4155543992", trying btrfs: device or resource busy Feb 12 20:33:04.882067 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4155543992" Feb 12 20:33:04.882067 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4155543992" Feb 12 20:33:04.882067 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem4155543992" Feb 12 20:33:04.882067 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem4155543992" Feb 12 20:33:04.882067 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 12 20:33:04.882067 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:33:04.882067 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 12 20:33:04.875071 systemd[1]: mnt-oem4155543992.mount: Deactivated successfully. Feb 12 20:33:05.108177 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Feb 12 20:33:05.120074 ignition[821]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 12 20:33:05.120074 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:33:05.120074 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:33:05.120074 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 12 20:33:05.191093 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET result: OK Feb 12 20:33:05.754711 ignition[821]: DEBUG : files: createFilesystemsFiles: createFiles: op(10): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/install.sh" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(14): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(14): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(15): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(15): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:33:05.780073 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem544656113" Feb 12 20:33:06.206146 kernel: audit: type=1130 audit(1707769985.845:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.206226 kernel: audit: type=1130 audit(1707769985.924:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.206253 kernel: audit: type=1130 audit(1707769985.968:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.206276 kernel: audit: type=1131 audit(1707769985.968:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.206400 kernel: audit: type=1130 audit(1707769986.120:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.206437 kernel: audit: type=1131 audit(1707769986.120:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:05.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:05.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:05.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:05.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:05.778108 systemd[1]: mnt-oem544656113.mount: Deactivated successfully. Feb 12 20:33:06.221106 ignition[821]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem544656113": device or resource busy Feb 12 20:33:06.221106 ignition[821]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem544656113", trying btrfs: device or resource busy Feb 12 20:33:06.221106 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem544656113" Feb 12 20:33:06.221106 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem544656113" Feb 12 20:33:06.221106 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem544656113" Feb 12 20:33:06.221106 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem544656113" Feb 12 20:33:06.221106 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 12 20:33:06.221106 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 12 20:33:06.221106 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(1b): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:33:06.221106 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3752669378" Feb 12 20:33:06.221106 ignition[821]: CRITICAL : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3752669378": device or resource busy Feb 12 20:33:06.221106 ignition[821]: ERROR : files: createFilesystemsFiles: createFiles: op(1b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3752669378", trying btrfs: device or resource busy Feb 12 20:33:06.221106 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3752669378" Feb 12 20:33:06.221106 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3752669378" Feb 12 20:33:06.533276 kernel: audit: type=1130 audit(1707769986.303:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.533324 kernel: audit: type=1131 audit(1707769986.442:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:05.819842 systemd[1]: Finished ignition-files.service. Feb 12 20:33:06.563160 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [started] unmounting "/mnt/oem3752669378" Feb 12 20:33:06.563160 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [finished] unmounting "/mnt/oem3752669378" Feb 12 20:33:06.563160 ignition[821]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(1f): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(1f): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(20): [started] processing unit "oem-gce.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(20): [finished] processing unit "oem-gce.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(21): [started] processing unit "oem-gce-enable-oslogin.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(21): [finished] processing unit "oem-gce-enable-oslogin.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(22): [started] processing unit "prepare-cni-plugins.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(22): op(23): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(22): op(23): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(22): [finished] processing unit "prepare-cni-plugins.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(24): [started] processing unit "prepare-critools.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(24): op(25): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(24): op(25): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(24): [finished] processing unit "prepare-critools.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(26): [started] processing unit "prepare-helm.service" Feb 12 20:33:06.563160 ignition[821]: INFO : files: op(26): op(27): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 20:33:06.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:05.857913 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(26): op(27): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(26): [finished] processing unit "prepare-helm.service" Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(28): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(28): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(29): [started] setting preset to enabled for "oem-gce.service" Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(29): [finished] setting preset to enabled for "oem-gce.service" Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(2a): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(2a): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(2b): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(2b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(2c): [started] setting preset to enabled for "prepare-critools.service" Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(2c): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(2d): [started] setting preset to enabled for "prepare-helm.service" Feb 12 20:33:06.955133 ignition[821]: INFO : files: op(2d): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 20:33:06.955133 ignition[821]: INFO : files: createResultFile: createFiles: op(2e): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:33:06.955133 ignition[821]: INFO : files: createResultFile: createFiles: op(2e): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:33:06.955133 ignition[821]: INFO : files: files passed Feb 12 20:33:06.955133 ignition[821]: INFO : Ignition finished successfully Feb 12 20:33:06.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.263574 initrd-setup-root-after-ignition[845]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 20:33:07.271440 iscsid[686]: iscsid shutting down. Feb 12 20:33:05.882302 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 20:33:05.883803 systemd[1]: Starting ignition-quench.service... Feb 12 20:33:05.913123 systemd[1]: mnt-oem3752669378.mount: Deactivated successfully. Feb 12 20:33:07.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:05.913796 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 20:33:07.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:05.926964 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 20:33:05.927149 systemd[1]: Finished ignition-quench.service. Feb 12 20:33:07.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:05.970576 systemd[1]: Reached target ignition-complete.target. Feb 12 20:33:07.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.413363 ignition[860]: INFO : Ignition 2.14.0 Feb 12 20:33:07.413363 ignition[860]: INFO : Stage: umount Feb 12 20:33:07.413363 ignition[860]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:33:07.413363 ignition[860]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:33:07.413363 ignition[860]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:33:07.413363 ignition[860]: INFO : umount: umount passed Feb 12 20:33:07.413363 ignition[860]: INFO : Ignition finished successfully Feb 12 20:33:07.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.054485 systemd[1]: Starting initrd-parse-etc.service... Feb 12 20:33:07.538000 audit: BPF prog-id=6 op=UNLOAD Feb 12 20:33:06.105439 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 20:33:06.105582 systemd[1]: Finished initrd-parse-etc.service. Feb 12 20:33:07.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.122562 systemd[1]: Reached target initrd-fs.target. Feb 12 20:33:07.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.184332 systemd[1]: Reached target initrd.target. Feb 12 20:33:07.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.213325 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 20:33:06.214816 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 20:33:07.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.266650 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 20:33:06.307097 systemd[1]: Starting initrd-cleanup.service... Feb 12 20:33:06.368440 systemd[1]: Stopped target nss-lookup.target. Feb 12 20:33:07.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.376433 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 20:33:07.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.400489 systemd[1]: Stopped target timers.target. Feb 12 20:33:07.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.422499 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 20:33:06.422725 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 20:33:06.444760 systemd[1]: Stopped target initrd.target. Feb 12 20:33:07.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.516441 systemd[1]: Stopped target basic.target. Feb 12 20:33:07.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.556450 systemd[1]: Stopped target ignition-complete.target. Feb 12 20:33:07.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:07.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:06.571459 systemd[1]: Stopped target ignition-diskful.target. Feb 12 20:33:06.607344 systemd[1]: Stopped target initrd-root-device.target. Feb 12 20:33:06.634364 systemd[1]: Stopped target remote-fs.target. Feb 12 20:33:06.655325 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 20:33:06.677523 systemd[1]: Stopped target sysinit.target. Feb 12 20:33:06.697420 systemd[1]: Stopped target local-fs.target. Feb 12 20:33:06.716413 systemd[1]: Stopped target local-fs-pre.target. Feb 12 20:33:07.856126 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). Feb 12 20:33:06.737391 systemd[1]: Stopped target swap.target. Feb 12 20:33:06.757317 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 20:33:06.757547 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 20:33:06.778791 systemd[1]: Stopped target cryptsetup.target. Feb 12 20:33:06.820362 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 20:33:06.820607 systemd[1]: Stopped dracut-initqueue.service. Feb 12 20:33:06.851676 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 20:33:06.851925 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 20:33:06.893564 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 20:33:06.893764 systemd[1]: Stopped ignition-files.service. Feb 12 20:33:06.906183 systemd[1]: Stopping ignition-mount.service... Feb 12 20:33:06.945470 systemd[1]: Stopping iscsid.service... Feb 12 20:33:06.962151 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 20:33:06.962449 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 20:33:06.981188 systemd[1]: Stopping sysroot-boot.service... Feb 12 20:33:06.996300 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 20:33:06.996621 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 20:33:07.033568 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 20:33:07.033770 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 20:33:07.050708 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 20:33:07.051613 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 20:33:07.051842 systemd[1]: Stopped iscsid.service. Feb 12 20:33:07.065066 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 20:33:07.065194 systemd[1]: Stopped ignition-mount.service. Feb 12 20:33:07.102911 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 20:33:07.103053 systemd[1]: Stopped sysroot-boot.service. Feb 12 20:33:07.122876 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 20:33:07.123098 systemd[1]: Stopped ignition-disks.service. Feb 12 20:33:07.136466 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 20:33:07.136555 systemd[1]: Stopped ignition-kargs.service. Feb 12 20:33:07.172410 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 20:33:07.172504 systemd[1]: Stopped ignition-fetch.service. Feb 12 20:33:07.204357 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 20:33:07.204447 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 20:33:07.241326 systemd[1]: Stopped target paths.target. Feb 12 20:33:07.255093 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 20:33:07.258983 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 20:33:07.271104 systemd[1]: Stopped target slices.target. Feb 12 20:33:07.290096 systemd[1]: Stopped target sockets.target. Feb 12 20:33:07.303172 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 20:33:07.303256 systemd[1]: Closed iscsid.socket. Feb 12 20:33:07.327147 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 20:33:07.327244 systemd[1]: Stopped ignition-setup.service. Feb 12 20:33:07.342262 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 20:33:07.342356 systemd[1]: Stopped initrd-setup-root.service. Feb 12 20:33:07.358445 systemd[1]: Stopping iscsiuio.service... Feb 12 20:33:07.373876 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 20:33:07.374053 systemd[1]: Stopped iscsiuio.service. Feb 12 20:33:07.389798 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 20:33:07.389958 systemd[1]: Finished initrd-cleanup.service. Feb 12 20:33:07.405682 systemd[1]: Stopped target network.target. Feb 12 20:33:07.421260 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 20:33:07.421375 systemd[1]: Closed iscsiuio.socket. Feb 12 20:33:07.428548 systemd[1]: Stopping systemd-networkd.service... Feb 12 20:33:07.431958 systemd-networkd[677]: eth0: DHCPv6 lease lost Feb 12 20:33:07.864000 audit: BPF prog-id=9 op=UNLOAD Feb 12 20:33:07.448407 systemd[1]: Stopping systemd-resolved.service... Feb 12 20:33:07.459716 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 20:33:07.459876 systemd[1]: Stopped systemd-resolved.service. Feb 12 20:33:07.502069 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 20:33:07.502216 systemd[1]: Stopped systemd-networkd.service. Feb 12 20:33:07.516839 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 20:33:07.516917 systemd[1]: Closed systemd-networkd.socket. Feb 12 20:33:07.533339 systemd[1]: Stopping network-cleanup.service... Feb 12 20:33:07.547190 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 20:33:07.547333 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 20:33:07.564377 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 20:33:07.564469 systemd[1]: Stopped systemd-sysctl.service. Feb 12 20:33:07.579425 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 20:33:07.579504 systemd[1]: Stopped systemd-modules-load.service. Feb 12 20:33:07.594460 systemd[1]: Stopping systemd-udevd.service... Feb 12 20:33:07.610074 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 20:33:07.610908 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 20:33:07.611198 systemd[1]: Stopped systemd-udevd.service. Feb 12 20:33:07.630426 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 20:33:07.630524 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 20:33:07.645246 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 20:33:07.645330 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 20:33:07.660190 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 20:33:07.660297 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 20:33:07.675286 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 20:33:07.675374 systemd[1]: Stopped dracut-cmdline.service. Feb 12 20:33:07.690209 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 20:33:07.690297 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 20:33:07.708547 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 20:33:07.731139 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 20:33:07.731263 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 20:33:07.746923 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 20:33:07.747078 systemd[1]: Stopped network-cleanup.service. Feb 12 20:33:07.761600 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 20:33:07.761732 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 20:33:07.776599 systemd[1]: Reached target initrd-switch-root.target. Feb 12 20:33:07.793669 systemd[1]: Starting initrd-switch-root.service... Feb 12 20:33:07.823354 systemd[1]: Switching root. Feb 12 20:33:07.868040 systemd-journald[190]: Journal stopped Feb 12 20:33:12.665822 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 20:33:12.668795 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 20:33:12.668835 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 20:33:12.668873 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 20:33:12.668918 kernel: SELinux: policy capability open_perms=1 Feb 12 20:33:12.668948 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 20:33:12.668970 kernel: SELinux: policy capability always_check_network=0 Feb 12 20:33:12.668992 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 20:33:12.669015 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 20:33:12.669037 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 20:33:12.669062 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 20:33:12.669083 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 20:33:12.669114 kernel: audit: type=1403 audit(1707769988.160:79): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 20:33:12.669150 systemd[1]: Successfully loaded SELinux policy in 122.354ms. Feb 12 20:33:12.669194 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.294ms. Feb 12 20:33:12.669220 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:33:12.669245 systemd[1]: Detected virtualization kvm. Feb 12 20:33:12.669268 systemd[1]: Detected architecture x86-64. Feb 12 20:33:12.669292 systemd[1]: Detected first boot. Feb 12 20:33:12.669316 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:33:12.669339 kernel: audit: type=1400 audit(1707769988.319:80): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:33:12.669362 kernel: audit: type=1400 audit(1707769988.319:81): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:33:12.669390 kernel: audit: type=1334 audit(1707769988.340:82): prog-id=10 op=LOAD Feb 12 20:33:12.669417 kernel: audit: type=1334 audit(1707769988.340:83): prog-id=10 op=UNLOAD Feb 12 20:33:12.669439 kernel: audit: type=1334 audit(1707769988.360:84): prog-id=11 op=LOAD Feb 12 20:33:12.669461 kernel: audit: type=1334 audit(1707769988.360:85): prog-id=11 op=UNLOAD Feb 12 20:33:12.669483 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 20:33:12.669506 kernel: audit: type=1400 audit(1707769988.546:86): avc: denied { associate } for pid=893 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 20:33:12.669529 kernel: audit: type=1300 audit(1707769988.546:86): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8ac a1=c0000cede0 a2=c0000d7ac0 a3=32 items=0 ppid=876 pid=893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:12.669562 kernel: audit: type=1327 audit(1707769988.546:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:33:12.669584 systemd[1]: Populated /etc with preset unit settings. Feb 12 20:33:12.669611 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:33:12.669634 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:33:12.669661 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:33:12.669684 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 20:33:12.669712 systemd[1]: Stopped initrd-switch-root.service. Feb 12 20:33:12.669736 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 20:33:12.669761 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 20:33:12.669785 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 20:33:12.669809 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 20:33:12.669834 systemd[1]: Created slice system-getty.slice. Feb 12 20:33:12.669864 systemd[1]: Created slice system-modprobe.slice. Feb 12 20:33:12.669904 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 20:33:12.669928 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 20:33:12.669952 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 20:33:12.669976 systemd[1]: Created slice user.slice. Feb 12 20:33:12.669999 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:33:12.670022 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 20:33:12.670046 systemd[1]: Set up automount boot.automount. Feb 12 20:33:12.670068 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 20:33:12.670092 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 20:33:12.670120 systemd[1]: Stopped target initrd-fs.target. Feb 12 20:33:12.670146 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 20:33:12.670170 systemd[1]: Reached target integritysetup.target. Feb 12 20:33:12.670194 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:33:12.670217 systemd[1]: Reached target remote-fs.target. Feb 12 20:33:12.670245 systemd[1]: Reached target slices.target. Feb 12 20:33:12.670267 systemd[1]: Reached target swap.target. Feb 12 20:33:12.670290 systemd[1]: Reached target torcx.target. Feb 12 20:33:12.670314 systemd[1]: Reached target veritysetup.target. Feb 12 20:33:12.670337 systemd[1]: Listening on systemd-coredump.socket. Feb 12 20:33:12.670363 systemd[1]: Listening on systemd-initctl.socket. Feb 12 20:33:12.670387 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:33:12.670411 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:33:12.670434 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:33:12.670457 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 20:33:12.670481 systemd[1]: Mounting dev-hugepages.mount... Feb 12 20:33:12.670505 systemd[1]: Mounting dev-mqueue.mount... Feb 12 20:33:12.670528 systemd[1]: Mounting media.mount... Feb 12 20:33:12.670551 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:33:12.670579 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 20:33:12.670602 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 20:33:12.670625 systemd[1]: Mounting tmp.mount... Feb 12 20:33:12.670650 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 20:33:12.670674 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 20:33:12.670697 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:33:12.670719 systemd[1]: Starting modprobe@configfs.service... Feb 12 20:33:12.670743 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 20:33:12.670765 systemd[1]: Starting modprobe@drm.service... Feb 12 20:33:12.670793 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 20:33:12.670816 systemd[1]: Starting modprobe@fuse.service... Feb 12 20:33:12.670839 systemd[1]: Starting modprobe@loop.service... Feb 12 20:33:12.670868 kernel: fuse: init (API version 7.34) Feb 12 20:33:12.670912 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 20:33:12.670936 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 20:33:12.670960 kernel: loop: module loaded Feb 12 20:33:12.670982 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 20:33:12.671004 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 20:33:12.671032 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 20:33:12.671055 systemd[1]: Stopped systemd-journald.service. Feb 12 20:33:12.671078 systemd[1]: Starting systemd-journald.service... Feb 12 20:33:12.671101 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:33:12.671130 systemd[1]: Starting systemd-network-generator.service... Feb 12 20:33:12.671170 systemd-journald[983]: Journal started Feb 12 20:33:12.671265 systemd-journald[983]: Runtime Journal (/run/log/journal/dbf87cb86b8992fbe5c13e23aaf248b1) is 8.0M, max 148.8M, 140.8M free. Feb 12 20:33:08.160000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 20:33:08.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:33:08.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:33:08.340000 audit: BPF prog-id=10 op=LOAD Feb 12 20:33:08.340000 audit: BPF prog-id=10 op=UNLOAD Feb 12 20:33:08.360000 audit: BPF prog-id=11 op=LOAD Feb 12 20:33:08.360000 audit: BPF prog-id=11 op=UNLOAD Feb 12 20:33:08.546000 audit[893]: AVC avc: denied { associate } for pid=893 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 20:33:08.546000 audit[893]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8ac a1=c0000cede0 a2=c0000d7ac0 a3=32 items=0 ppid=876 pid=893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:08.546000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:33:08.556000 audit[893]: AVC avc: denied { associate } for pid=893 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 20:33:08.556000 audit[893]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d985 a2=1ed a3=0 items=2 ppid=876 pid=893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:08.556000 audit: CWD cwd="/" Feb 12 20:33:08.556000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:08.556000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:08.556000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:33:11.845000 audit: BPF prog-id=12 op=LOAD Feb 12 20:33:11.845000 audit: BPF prog-id=3 op=UNLOAD Feb 12 20:33:11.845000 audit: BPF prog-id=13 op=LOAD Feb 12 20:33:11.845000 audit: BPF prog-id=14 op=LOAD Feb 12 20:33:11.845000 audit: BPF prog-id=4 op=UNLOAD Feb 12 20:33:11.845000 audit: BPF prog-id=5 op=UNLOAD Feb 12 20:33:11.846000 audit: BPF prog-id=15 op=LOAD Feb 12 20:33:11.846000 audit: BPF prog-id=12 op=UNLOAD Feb 12 20:33:11.847000 audit: BPF prog-id=16 op=LOAD Feb 12 20:33:11.847000 audit: BPF prog-id=17 op=LOAD Feb 12 20:33:11.847000 audit: BPF prog-id=13 op=UNLOAD Feb 12 20:33:11.847000 audit: BPF prog-id=14 op=UNLOAD Feb 12 20:33:11.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:11.862000 audit: BPF prog-id=15 op=UNLOAD Feb 12 20:33:11.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:11.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.631000 audit: BPF prog-id=18 op=LOAD Feb 12 20:33:12.631000 audit: BPF prog-id=19 op=LOAD Feb 12 20:33:12.631000 audit: BPF prog-id=20 op=LOAD Feb 12 20:33:12.631000 audit: BPF prog-id=16 op=UNLOAD Feb 12 20:33:12.632000 audit: BPF prog-id=17 op=UNLOAD Feb 12 20:33:12.661000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 20:33:12.661000 audit[983]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff0fdcf430 a2=4000 a3=7fff0fdcf4cc items=0 ppid=1 pid=983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:12.661000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 20:33:08.543390 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:33:11.845124 systemd[1]: Queued start job for default target multi-user.target. Feb 12 20:33:08.544410 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:33:11.850260 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 20:33:08.544449 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:33:08.544515 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 20:33:08.544535 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 20:33:08.544597 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 20:33:08.544624 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 20:33:08.545005 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 20:33:08.545087 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:33:08.545114 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:33:08.546341 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 20:33:08.546409 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 20:33:08.546446 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 20:33:08.546477 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 20:33:08.546510 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 20:33:08.546539 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 20:33:11.239415 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:11Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:33:11.239743 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:11Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:33:11.240419 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:11Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:33:11.240678 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:11Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:33:11.240750 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:11Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 20:33:11.240827 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-02-12T20:33:11Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 20:33:12.690942 systemd[1]: Starting systemd-remount-fs.service... Feb 12 20:33:12.705015 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:33:12.724264 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 20:33:12.724508 systemd[1]: Stopped verity-setup.service. Feb 12 20:33:12.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.744924 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:33:12.754939 systemd[1]: Started systemd-journald.service. Feb 12 20:33:12.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.764476 systemd[1]: Mounted dev-hugepages.mount. Feb 12 20:33:12.772297 systemd[1]: Mounted dev-mqueue.mount. Feb 12 20:33:12.779267 systemd[1]: Mounted media.mount. Feb 12 20:33:12.787238 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 20:33:12.796266 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 20:33:12.805228 systemd[1]: Mounted tmp.mount. Feb 12 20:33:12.812334 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 20:33:12.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.821427 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:33:12.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.830481 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 20:33:12.830717 systemd[1]: Finished modprobe@configfs.service. Feb 12 20:33:12.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.839574 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 20:33:12.839871 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 20:33:12.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.849501 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 20:33:12.849725 systemd[1]: Finished modprobe@drm.service. Feb 12 20:33:12.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.858452 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 20:33:12.858676 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 20:33:12.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.867419 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 20:33:12.867627 systemd[1]: Finished modprobe@fuse.service. Feb 12 20:33:12.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.877459 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 20:33:12.877670 systemd[1]: Finished modprobe@loop.service. Feb 12 20:33:12.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.886454 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:33:12.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.895417 systemd[1]: Finished systemd-network-generator.service. Feb 12 20:33:12.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.904430 systemd[1]: Finished systemd-remount-fs.service. Feb 12 20:33:12.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.913470 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:33:12.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.922867 systemd[1]: Reached target network-pre.target. Feb 12 20:33:12.933669 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 20:33:12.943560 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 20:33:12.952041 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 20:33:12.954712 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 20:33:12.965006 systemd[1]: Starting systemd-journal-flush.service... Feb 12 20:33:12.974049 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 20:33:12.974328 systemd-journald[983]: Time spent on flushing to /var/log/journal/dbf87cb86b8992fbe5c13e23aaf248b1 is 85.392ms for 1181 entries. Feb 12 20:33:12.974328 systemd-journald[983]: System Journal (/var/log/journal/dbf87cb86b8992fbe5c13e23aaf248b1) is 8.0M, max 584.8M, 576.8M free. Feb 12 20:33:13.091028 systemd-journald[983]: Received client request to flush runtime journal. Feb 12 20:33:13.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:13.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:13.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:12.975871 systemd[1]: Starting systemd-random-seed.service... Feb 12 20:33:12.989781 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 20:33:12.991761 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:33:13.000843 systemd[1]: Starting systemd-sysusers.service... Feb 12 20:33:13.009729 systemd[1]: Starting systemd-udev-settle.service... Feb 12 20:33:13.095508 udevadm[997]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 20:33:13.019426 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 20:33:13.028216 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 20:33:13.037438 systemd[1]: Finished systemd-random-seed.service. Feb 12 20:33:13.049686 systemd[1]: Reached target first-boot-complete.target. Feb 12 20:33:13.058701 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:33:13.076832 systemd[1]: Finished systemd-sysusers.service. Feb 12 20:33:13.092592 systemd[1]: Finished systemd-journal-flush.service. Feb 12 20:33:13.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:13.714322 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 20:33:13.750881 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 12 20:33:13.751146 kernel: audit: type=1130 audit(1707769993.721:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:13.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:13.748000 audit: BPF prog-id=21 op=LOAD Feb 12 20:33:13.752493 systemd[1]: Starting systemd-udevd.service... Feb 12 20:33:13.749000 audit: BPF prog-id=22 op=LOAD Feb 12 20:33:13.749000 audit: BPF prog-id=7 op=UNLOAD Feb 12 20:33:13.749000 audit: BPF prog-id=8 op=UNLOAD Feb 12 20:33:13.765483 kernel: audit: type=1334 audit(1707769993.748:139): prog-id=21 op=LOAD Feb 12 20:33:13.765634 kernel: audit: type=1334 audit(1707769993.749:140): prog-id=22 op=LOAD Feb 12 20:33:13.765675 kernel: audit: type=1334 audit(1707769993.749:141): prog-id=7 op=UNLOAD Feb 12 20:33:13.765712 kernel: audit: type=1334 audit(1707769993.749:142): prog-id=8 op=UNLOAD Feb 12 20:33:13.803157 systemd-udevd[1001]: Using default interface naming scheme 'v252'. Feb 12 20:33:13.848172 systemd[1]: Started systemd-udevd.service. Feb 12 20:33:13.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:13.879959 kernel: audit: type=1130 audit(1707769993.855:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:13.887358 systemd[1]: Starting systemd-networkd.service... Feb 12 20:33:13.883000 audit: BPF prog-id=23 op=LOAD Feb 12 20:33:13.896922 kernel: audit: type=1334 audit(1707769993.883:144): prog-id=23 op=LOAD Feb 12 20:33:13.904000 audit: BPF prog-id=24 op=LOAD Feb 12 20:33:13.913917 kernel: audit: type=1334 audit(1707769993.904:145): prog-id=24 op=LOAD Feb 12 20:33:13.912000 audit: BPF prog-id=25 op=LOAD Feb 12 20:33:13.915602 systemd[1]: Starting systemd-userdbd.service... Feb 12 20:33:13.923072 kernel: audit: type=1334 audit(1707769993.912:146): prog-id=25 op=LOAD Feb 12 20:33:13.912000 audit: BPF prog-id=26 op=LOAD Feb 12 20:33:13.932913 kernel: audit: type=1334 audit(1707769993.912:147): prog-id=26 op=LOAD Feb 12 20:33:13.974346 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 20:33:13.995228 systemd[1]: Started systemd-userdbd.service. Feb 12 20:33:14.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:14.080929 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 20:33:14.123959 kernel: ACPI: button: Power Button [PWRF] Feb 12 20:33:14.129723 systemd-networkd[1012]: lo: Link UP Feb 12 20:33:14.129739 systemd-networkd[1012]: lo: Gained carrier Feb 12 20:33:14.131211 systemd-networkd[1012]: Enumeration completed Feb 12 20:33:14.131413 systemd[1]: Started systemd-networkd.service. Feb 12 20:33:14.131753 systemd-networkd[1012]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:33:14.133527 systemd-networkd[1012]: eth0: Link UP Feb 12 20:33:14.133717 systemd-networkd[1012]: eth0: Gained carrier Feb 12 20:33:14.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:14.141146 systemd-networkd[1012]: eth0: DHCPv4 address 10.128.0.29/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 12 20:33:14.153000 audit[1015]: AVC avc: denied { confidentiality } for pid=1015 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 20:33:14.180919 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Feb 12 20:33:14.153000 audit[1015]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56463eb37280 a1=32194 a2=7f9daaa31bc5 a3=5 items=108 ppid=1001 pid=1015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:14.153000 audit: CWD cwd="/" Feb 12 20:33:14.153000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=1 name=(null) inode=13083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=2 name=(null) inode=13083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=3 name=(null) inode=13084 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=4 name=(null) inode=13083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=5 name=(null) inode=13085 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=6 name=(null) inode=13083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=7 name=(null) inode=13086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=8 name=(null) inode=13086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=9 name=(null) inode=13087 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=10 name=(null) inode=13086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=11 name=(null) inode=13088 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=12 name=(null) inode=13086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=13 name=(null) inode=13089 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=14 name=(null) inode=13086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=15 name=(null) inode=13090 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=16 name=(null) inode=13086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=17 name=(null) inode=13091 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=18 name=(null) inode=13083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=19 name=(null) inode=13092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=20 name=(null) inode=13092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=21 name=(null) inode=13093 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=22 name=(null) inode=13092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=23 name=(null) inode=13094 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=24 name=(null) inode=13092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=25 name=(null) inode=13095 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=26 name=(null) inode=13092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=27 name=(null) inode=13096 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=28 name=(null) inode=13092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=29 name=(null) inode=13097 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=30 name=(null) inode=13083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=31 name=(null) inode=13098 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=32 name=(null) inode=13098 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=33 name=(null) inode=13099 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=34 name=(null) inode=13098 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=35 name=(null) inode=13100 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=36 name=(null) inode=13098 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=37 name=(null) inode=13101 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=38 name=(null) inode=13098 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=39 name=(null) inode=13102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=40 name=(null) inode=13098 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=41 name=(null) inode=13103 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=42 name=(null) inode=13083 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=43 name=(null) inode=13104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=44 name=(null) inode=13104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=45 name=(null) inode=13105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=46 name=(null) inode=13104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=47 name=(null) inode=13106 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=48 name=(null) inode=13104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=49 name=(null) inode=13107 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=50 name=(null) inode=13104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=51 name=(null) inode=13108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=52 name=(null) inode=13104 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=53 name=(null) inode=13109 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=55 name=(null) inode=13110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=56 name=(null) inode=13110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=57 name=(null) inode=13111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=58 name=(null) inode=13110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=59 name=(null) inode=13112 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=60 name=(null) inode=13110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=61 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=62 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=63 name=(null) inode=13114 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=64 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=65 name=(null) inode=13115 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=66 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=67 name=(null) inode=13116 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=68 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=69 name=(null) inode=13117 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=70 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=71 name=(null) inode=13118 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=72 name=(null) inode=13110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=73 name=(null) inode=13119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=74 name=(null) inode=13119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=75 name=(null) inode=13120 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=76 name=(null) inode=13119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=77 name=(null) inode=13121 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=78 name=(null) inode=13119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=79 name=(null) inode=13122 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=80 name=(null) inode=13119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=81 name=(null) inode=13123 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=82 name=(null) inode=13119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=83 name=(null) inode=13124 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=84 name=(null) inode=13110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=85 name=(null) inode=13125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=86 name=(null) inode=13125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=87 name=(null) inode=13126 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.224958 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1025) Feb 12 20:33:14.153000 audit: PATH item=88 name=(null) inode=13125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=89 name=(null) inode=13127 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=90 name=(null) inode=13125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=91 name=(null) inode=13128 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=92 name=(null) inode=13125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=93 name=(null) inode=13129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=94 name=(null) inode=13125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=95 name=(null) inode=13130 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=96 name=(null) inode=13110 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=97 name=(null) inode=13131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=98 name=(null) inode=13131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=99 name=(null) inode=13132 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=100 name=(null) inode=13131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=101 name=(null) inode=13133 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=102 name=(null) inode=13131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=103 name=(null) inode=13134 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=104 name=(null) inode=13131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=105 name=(null) inode=13135 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=106 name=(null) inode=13131 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PATH item=107 name=(null) inode=13136 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:33:14.153000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 20:33:14.245995 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Feb 12 20:33:14.250916 kernel: EDAC MC: Ver: 3.0.0 Feb 12 20:33:14.271931 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Feb 12 20:33:14.277914 kernel: ACPI: button: Sleep Button [SLPF] Feb 12 20:33:14.300687 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:33:14.309970 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 20:33:14.327557 systemd[1]: Finished systemd-udev-settle.service. Feb 12 20:33:14.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:14.338126 systemd[1]: Starting lvm2-activation-early.service... Feb 12 20:33:14.367927 lvm[1036]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:33:14.396805 systemd[1]: Finished lvm2-activation-early.service. Feb 12 20:33:14.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:14.405360 systemd[1]: Reached target cryptsetup.target. Feb 12 20:33:14.415980 systemd[1]: Starting lvm2-activation.service... Feb 12 20:33:14.423075 lvm[1037]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:33:14.451728 systemd[1]: Finished lvm2-activation.service. Feb 12 20:33:14.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:14.460318 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:33:14.469100 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 20:33:14.469169 systemd[1]: Reached target local-fs.target. Feb 12 20:33:14.478087 systemd[1]: Reached target machines.target. Feb 12 20:33:14.488065 systemd[1]: Starting ldconfig.service... Feb 12 20:33:14.497008 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 20:33:14.497111 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:33:14.499048 systemd[1]: Starting systemd-boot-update.service... Feb 12 20:33:14.508153 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 20:33:14.520595 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 20:33:14.521126 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:33:14.521257 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:33:14.524231 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 20:33:14.525258 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1039 (bootctl) Feb 12 20:33:14.527841 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 20:33:14.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:14.560774 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 20:33:14.574041 systemd-tmpfiles[1043]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 20:33:14.588329 systemd-tmpfiles[1043]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 20:33:14.604566 systemd-tmpfiles[1043]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 20:33:14.688421 systemd-fsck[1047]: fsck.fat 4.2 (2021-01-31) Feb 12 20:33:14.688421 systemd-fsck[1047]: /dev/sda1: 789 files, 115339/258078 clusters Feb 12 20:33:14.694764 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 20:33:14.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:14.708537 systemd[1]: Mounting boot.mount... Feb 12 20:33:14.768218 systemd[1]: Mounted boot.mount. Feb 12 20:33:14.800515 systemd[1]: Finished systemd-boot-update.service. Feb 12 20:33:14.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:14.934373 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 20:33:14.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:14.945462 systemd[1]: Starting audit-rules.service... Feb 12 20:33:14.955975 systemd[1]: Starting clean-ca-certificates.service... Feb 12 20:33:14.968135 systemd[1]: Starting oem-gce-enable-oslogin.service... Feb 12 20:33:14.980095 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 20:33:14.989000 audit: BPF prog-id=27 op=LOAD Feb 12 20:33:14.992898 systemd[1]: Starting systemd-resolved.service... Feb 12 20:33:14.999000 audit: BPF prog-id=28 op=LOAD Feb 12 20:33:15.003834 systemd[1]: Starting systemd-timesyncd.service... Feb 12 20:33:15.013406 systemd[1]: Starting systemd-update-utmp.service... Feb 12 20:33:15.021097 systemd[1]: Finished clean-ca-certificates.service. Feb 12 20:33:15.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:15.030807 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 20:33:15.046000 audit[1071]: SYSTEM_BOOT pid=1071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 20:33:15.057084 systemd[1]: Finished systemd-update-utmp.service. Feb 12 20:33:15.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:15.123509 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Feb 12 20:33:15.123789 systemd[1]: Finished oem-gce-enable-oslogin.service. Feb 12 20:33:15.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:15.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:15.158302 systemd[1]: Started systemd-timesyncd.service. Feb 12 20:33:15.161864 systemd-timesyncd[1068]: Contacted time server 169.254.169.254:123 (169.254.169.254). Feb 12 20:33:15.161971 systemd-timesyncd[1068]: Initial clock synchronization to Mon 2024-02-12 20:33:15.507581 UTC. Feb 12 20:33:15.167470 augenrules[1081]: No rules Feb 12 20:33:15.165000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 20:33:15.165000 audit[1081]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff6b975970 a2=420 a3=0 items=0 ppid=1051 pid=1081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:15.165000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 20:33:15.168932 systemd[1]: Finished audit-rules.service. Feb 12 20:33:15.170859 systemd-resolved[1064]: Positive Trust Anchors: Feb 12 20:33:15.171300 systemd-resolved[1064]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:33:15.171436 systemd-resolved[1064]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:33:15.176694 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 20:33:15.186290 systemd[1]: Reached target time-set.target. Feb 12 20:33:15.207652 systemd-resolved[1064]: Defaulting to hostname 'linux'. Feb 12 20:33:15.210599 systemd[1]: Started systemd-resolved.service. Feb 12 20:33:15.219192 systemd[1]: Reached target network.target. Feb 12 20:33:15.228093 systemd[1]: Reached target nss-lookup.target. Feb 12 20:33:15.252955 ldconfig[1038]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 20:33:15.508480 systemd[1]: Finished ldconfig.service. Feb 12 20:33:15.518236 systemd[1]: Starting systemd-update-done.service... Feb 12 20:33:15.527453 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 20:33:15.528766 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 20:33:15.537603 systemd[1]: Finished systemd-update-done.service. Feb 12 20:33:15.546370 systemd[1]: Reached target sysinit.target. Feb 12 20:33:15.555245 systemd[1]: Started motdgen.path. Feb 12 20:33:15.562199 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 20:33:15.572437 systemd[1]: Started logrotate.timer. Feb 12 20:33:15.580357 systemd[1]: Started mdadm.timer. Feb 12 20:33:15.588136 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 20:33:15.597111 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 20:33:15.597174 systemd[1]: Reached target paths.target. Feb 12 20:33:15.604097 systemd[1]: Reached target timers.target. Feb 12 20:33:15.611648 systemd[1]: Listening on dbus.socket. Feb 12 20:33:15.620836 systemd[1]: Starting docker.socket... Feb 12 20:33:15.632504 systemd[1]: Listening on sshd.socket. Feb 12 20:33:15.640225 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:33:15.641112 systemd[1]: Listening on docker.socket. Feb 12 20:33:15.648261 systemd[1]: Reached target sockets.target. Feb 12 20:33:15.657049 systemd[1]: Reached target basic.target. Feb 12 20:33:15.664116 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:33:15.664167 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:33:15.666066 systemd[1]: Starting containerd.service... Feb 12 20:33:15.674576 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 20:33:15.687122 systemd[1]: Starting dbus.service... Feb 12 20:33:15.696819 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 20:33:15.708438 systemd[1]: Starting extend-filesystems.service... Feb 12 20:33:15.713160 jq[1094]: false Feb 12 20:33:15.716068 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 20:33:15.718316 systemd[1]: Starting motdgen.service... Feb 12 20:33:15.727172 systemd[1]: Starting oem-gce.service... Feb 12 20:33:15.736507 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 20:33:15.746001 systemd[1]: Starting prepare-critools.service... Feb 12 20:33:15.752103 systemd-networkd[1012]: eth0: Gained IPv6LL Feb 12 20:33:15.757564 systemd[1]: Starting prepare-helm.service... Feb 12 20:33:15.768273 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 20:33:15.775600 extend-filesystems[1096]: Found sda Feb 12 20:33:15.781476 extend-filesystems[1096]: Found sda1 Feb 12 20:33:15.781476 extend-filesystems[1096]: Found sda2 Feb 12 20:33:15.781476 extend-filesystems[1096]: Found sda3 Feb 12 20:33:15.781476 extend-filesystems[1096]: Found usr Feb 12 20:33:15.777255 systemd[1]: Starting sshd-keygen.service... Feb 12 20:33:15.888045 extend-filesystems[1096]: Found sda4 Feb 12 20:33:15.888045 extend-filesystems[1096]: Found sda6 Feb 12 20:33:15.888045 extend-filesystems[1096]: Found sda7 Feb 12 20:33:15.888045 extend-filesystems[1096]: Found sda9 Feb 12 20:33:15.888045 extend-filesystems[1096]: Checking size of /dev/sda9 Feb 12 20:33:15.888045 extend-filesystems[1096]: Resized partition /dev/sda9 Feb 12 20:33:15.946558 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Feb 12 20:33:15.793827 systemd[1]: Starting systemd-logind.service... Feb 12 20:33:15.948265 extend-filesystems[1129]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 20:33:15.814105 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:33:15.814235 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Feb 12 20:33:15.957770 jq[1121]: true Feb 12 20:33:15.815143 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 20:33:15.816690 systemd[1]: Starting update-engine.service... Feb 12 20:33:15.958518 tar[1125]: ./ Feb 12 20:33:15.958518 tar[1125]: ./macvlan Feb 12 20:33:15.827367 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 20:33:15.840878 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 20:33:15.841260 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 20:33:15.854049 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 20:33:15.959818 jq[1133]: true Feb 12 20:33:15.854369 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 20:33:15.960281 mkfs.ext4[1135]: mke2fs 1.46.5 (30-Dec-2021) Feb 12 20:33:15.960281 mkfs.ext4[1135]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Feb 12 20:33:15.960281 mkfs.ext4[1135]: Creating filesystem with 262144 4k blocks and 65536 inodes Feb 12 20:33:15.960281 mkfs.ext4[1135]: Filesystem UUID: 0a5dc847-20db-4632-8d5c-55ef435db7b1 Feb 12 20:33:15.960281 mkfs.ext4[1135]: Superblock backups stored on blocks: Feb 12 20:33:15.960281 mkfs.ext4[1135]: 32768, 98304, 163840, 229376 Feb 12 20:33:15.960281 mkfs.ext4[1135]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 12 20:33:15.960281 mkfs.ext4[1135]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 12 20:33:15.960281 mkfs.ext4[1135]: Creating journal (8192 blocks): done Feb 12 20:33:15.960281 mkfs.ext4[1135]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 12 20:33:15.867911 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 20:33:15.868200 systemd[1]: Finished motdgen.service. Feb 12 20:33:15.887268 systemd[1]: Created slice system-sshd.slice. Feb 12 20:33:15.975427 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Feb 12 20:33:15.983259 umount[1141]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Feb 12 20:33:16.011227 tar[1127]: crictl Feb 12 20:33:16.011652 tar[1128]: linux-amd64/helm Feb 12 20:33:16.015767 extend-filesystems[1129]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 12 20:33:16.015767 extend-filesystems[1129]: old_desc_blocks = 1, new_desc_blocks = 2 Feb 12 20:33:16.015767 extend-filesystems[1129]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Feb 12 20:33:16.017760 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 20:33:16.039582 dbus-daemon[1093]: [system] SELinux support is enabled Feb 12 20:33:16.055994 extend-filesystems[1096]: Resized filesystem in /dev/sda9 Feb 12 20:33:16.109883 kernel: loop0: detected capacity change from 0 to 2097152 Feb 12 20:33:16.018054 systemd[1]: Finished extend-filesystems.service. Feb 12 20:33:16.080924 dbus-daemon[1093]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1012 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 12 20:33:16.110327 update_engine[1119]: I0212 20:33:16.062130 1119 main.cc:92] Flatcar Update Engine starting Feb 12 20:33:16.110327 update_engine[1119]: I0212 20:33:16.090277 1119 update_check_scheduler.cc:74] Next update check in 7m42s Feb 12 20:33:16.044457 systemd[1]: Started dbus.service. Feb 12 20:33:16.096290 dbus-daemon[1093]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 20:33:16.066898 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 20:33:16.066971 systemd[1]: Reached target system-config.target. Feb 12 20:33:16.083219 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 20:33:16.083263 systemd[1]: Reached target user-config.target. Feb 12 20:33:16.095960 systemd[1]: Started update-engine.service. Feb 12 20:33:16.125676 systemd[1]: Started locksmithd.service. Feb 12 20:33:16.138124 systemd[1]: Starting systemd-hostnamed.service... Feb 12 20:33:16.166657 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 20:33:16.217462 bash[1162]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:33:16.218858 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 20:33:16.257641 tar[1125]: ./static Feb 12 20:33:16.265682 env[1134]: time="2024-02-12T20:33:16.265582480Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 20:33:16.297887 dbus-daemon[1093]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 12 20:33:16.298175 systemd[1]: Started systemd-hostnamed.service. Feb 12 20:33:16.299017 dbus-daemon[1093]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1165 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 12 20:33:16.308661 tar[1125]: ./vlan Feb 12 20:33:16.311701 systemd[1]: Starting polkit.service... Feb 12 20:33:16.369343 tar[1125]: ./portmap Feb 12 20:33:16.412036 systemd-logind[1117]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 20:33:16.412139 systemd-logind[1117]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 12 20:33:16.412179 systemd-logind[1117]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 20:33:16.420895 systemd-logind[1117]: New seat seat0. Feb 12 20:33:16.425620 tar[1125]: ./host-local Feb 12 20:33:16.438006 systemd[1]: Started systemd-logind.service. Feb 12 20:33:16.474341 tar[1125]: ./vrf Feb 12 20:33:16.525571 tar[1125]: ./bridge Feb 12 20:33:16.557175 coreos-metadata[1092]: Feb 12 20:33:16.556 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Feb 12 20:33:16.575749 coreos-metadata[1092]: Feb 12 20:33:16.575 INFO Fetch failed with 404: resource not found Feb 12 20:33:16.576125 coreos-metadata[1092]: Feb 12 20:33:16.575 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Feb 12 20:33:16.578551 polkitd[1172]: Started polkitd version 121 Feb 12 20:33:16.581764 coreos-metadata[1092]: Feb 12 20:33:16.581 INFO Fetch successful Feb 12 20:33:16.582042 coreos-metadata[1092]: Feb 12 20:33:16.581 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Feb 12 20:33:16.585301 coreos-metadata[1092]: Feb 12 20:33:16.585 INFO Fetch failed with 404: resource not found Feb 12 20:33:16.585568 coreos-metadata[1092]: Feb 12 20:33:16.585 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Feb 12 20:33:16.588302 coreos-metadata[1092]: Feb 12 20:33:16.587 INFO Fetch failed with 404: resource not found Feb 12 20:33:16.588503 tar[1125]: ./tuning Feb 12 20:33:16.588699 coreos-metadata[1092]: Feb 12 20:33:16.588 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Feb 12 20:33:16.605071 coreos-metadata[1092]: Feb 12 20:33:16.599 INFO Fetch successful Feb 12 20:33:16.634099 unknown[1092]: wrote ssh authorized keys file for user: core Feb 12 20:33:16.639229 tar[1125]: ./firewall Feb 12 20:33:16.661854 polkitd[1172]: Loading rules from directory /etc/polkit-1/rules.d Feb 12 20:33:16.675146 polkitd[1172]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 12 20:33:16.688982 polkitd[1172]: Finished loading, compiling and executing 2 rules Feb 12 20:33:16.690385 dbus-daemon[1093]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 12 20:33:16.690692 systemd[1]: Started polkit.service. Feb 12 20:33:16.696459 polkitd[1172]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 12 20:33:16.741962 update-ssh-keys[1176]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:33:16.743249 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 20:33:16.751038 tar[1125]: ./host-device Feb 12 20:33:16.765431 env[1134]: time="2024-02-12T20:33:16.765309560Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 20:33:16.765649 env[1134]: time="2024-02-12T20:33:16.765575218Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:33:16.782393 env[1134]: time="2024-02-12T20:33:16.782305664Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:33:16.782667 env[1134]: time="2024-02-12T20:33:16.782635881Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:33:16.783332 env[1134]: time="2024-02-12T20:33:16.783273124Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:33:16.791599 env[1134]: time="2024-02-12T20:33:16.791537479Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 20:33:16.791950 env[1134]: time="2024-02-12T20:33:16.791893843Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 20:33:16.792093 env[1134]: time="2024-02-12T20:33:16.792068981Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 20:33:16.792376 env[1134]: time="2024-02-12T20:33:16.792348953Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:33:16.792708 systemd-hostnamed[1165]: Hostname set to (transient) Feb 12 20:33:16.796329 systemd-resolved[1064]: System hostname changed to 'ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal'. Feb 12 20:33:16.799464 env[1134]: time="2024-02-12T20:33:16.799403150Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:33:16.799831 env[1134]: time="2024-02-12T20:33:16.799783114Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:33:16.799945 env[1134]: time="2024-02-12T20:33:16.799832104Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 20:33:16.800004 env[1134]: time="2024-02-12T20:33:16.799955337Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 20:33:16.800004 env[1134]: time="2024-02-12T20:33:16.799982397Z" level=info msg="metadata content store policy set" policy=shared Feb 12 20:33:16.806860 env[1134]: time="2024-02-12T20:33:16.806671360Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 20:33:16.806860 env[1134]: time="2024-02-12T20:33:16.806760998Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 20:33:16.806860 env[1134]: time="2024-02-12T20:33:16.806785391Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 20:33:16.807270 env[1134]: time="2024-02-12T20:33:16.807181868Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 20:33:16.807563 env[1134]: time="2024-02-12T20:33:16.807360640Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 20:33:16.807563 env[1134]: time="2024-02-12T20:33:16.807394947Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 20:33:16.807563 env[1134]: time="2024-02-12T20:33:16.807418691Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 20:33:16.807563 env[1134]: time="2024-02-12T20:33:16.807444354Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 20:33:16.807563 env[1134]: time="2024-02-12T20:33:16.807471871Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 20:33:16.807563 env[1134]: time="2024-02-12T20:33:16.807496982Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 20:33:16.807563 env[1134]: time="2024-02-12T20:33:16.807524378Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 20:33:16.808348 env[1134]: time="2024-02-12T20:33:16.807940505Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 20:33:16.808348 env[1134]: time="2024-02-12T20:33:16.808129726Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 20:33:16.808348 env[1134]: time="2024-02-12T20:33:16.808255634Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 20:33:16.809105 env[1134]: time="2024-02-12T20:33:16.809075106Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 20:33:16.809339 env[1134]: time="2024-02-12T20:33:16.809311095Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 20:33:16.809464 env[1134]: time="2024-02-12T20:33:16.809442149Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 20:33:16.809636 env[1134]: time="2024-02-12T20:33:16.809616536Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 20:33:16.809849 env[1134]: time="2024-02-12T20:33:16.809825789Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 20:33:16.810031 env[1134]: time="2024-02-12T20:33:16.810011066Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 20:33:16.810140 env[1134]: time="2024-02-12T20:33:16.810116341Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 20:33:16.810265 env[1134]: time="2024-02-12T20:33:16.810243960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 20:33:16.810394 env[1134]: time="2024-02-12T20:33:16.810375211Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 20:33:16.810486 env[1134]: time="2024-02-12T20:33:16.810468443Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 20:33:16.810595 env[1134]: time="2024-02-12T20:33:16.810573208Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 20:33:16.810721 env[1134]: time="2024-02-12T20:33:16.810700917Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 20:33:16.811050 env[1134]: time="2024-02-12T20:33:16.811024019Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 20:33:16.811175 env[1134]: time="2024-02-12T20:33:16.811154518Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 20:33:16.811288 env[1134]: time="2024-02-12T20:33:16.811264996Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 20:33:16.811401 env[1134]: time="2024-02-12T20:33:16.811379617Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 20:33:16.811516 env[1134]: time="2024-02-12T20:33:16.811491077Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 20:33:16.811623 env[1134]: time="2024-02-12T20:33:16.811603335Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 20:33:16.811743 env[1134]: time="2024-02-12T20:33:16.811719457Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 20:33:16.811892 env[1134]: time="2024-02-12T20:33:16.811870473Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 20:33:16.812473 env[1134]: time="2024-02-12T20:33:16.812377579Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 20:33:16.815996 env[1134]: time="2024-02-12T20:33:16.812730581Z" level=info msg="Connect containerd service" Feb 12 20:33:16.815996 env[1134]: time="2024-02-12T20:33:16.812803331Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 20:33:16.815996 env[1134]: time="2024-02-12T20:33:16.813984782Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:33:16.824116 env[1134]: time="2024-02-12T20:33:16.824038479Z" level=info msg="Start subscribing containerd event" Feb 12 20:33:16.824339 env[1134]: time="2024-02-12T20:33:16.824314708Z" level=info msg="Start recovering state" Feb 12 20:33:16.824593 env[1134]: time="2024-02-12T20:33:16.824555556Z" level=info msg="Start event monitor" Feb 12 20:33:16.827664 env[1134]: time="2024-02-12T20:33:16.827572473Z" level=info msg="Start snapshots syncer" Feb 12 20:33:16.827825 env[1134]: time="2024-02-12T20:33:16.827800023Z" level=info msg="Start cni network conf syncer for default" Feb 12 20:33:16.828096 env[1134]: time="2024-02-12T20:33:16.828072193Z" level=info msg="Start streaming server" Feb 12 20:33:16.828815 env[1134]: time="2024-02-12T20:33:16.828785033Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 20:33:16.831516 env[1134]: time="2024-02-12T20:33:16.831487083Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 20:33:16.831842 systemd[1]: Started containerd.service. Feb 12 20:33:16.832452 env[1134]: time="2024-02-12T20:33:16.832424664Z" level=info msg="containerd successfully booted in 0.594646s" Feb 12 20:33:16.917970 tar[1125]: ./sbr Feb 12 20:33:17.069694 tar[1125]: ./loopback Feb 12 20:33:17.201077 tar[1125]: ./dhcp Feb 12 20:33:17.559855 tar[1125]: ./ptp Feb 12 20:33:17.719007 tar[1125]: ./ipvlan Feb 12 20:33:17.830732 tar[1125]: ./bandwidth Feb 12 20:33:18.003371 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 20:33:18.224190 tar[1128]: linux-amd64/LICENSE Feb 12 20:33:18.224960 tar[1128]: linux-amd64/README.md Feb 12 20:33:18.244674 systemd[1]: Finished prepare-helm.service. Feb 12 20:33:18.355591 systemd[1]: Finished prepare-critools.service. Feb 12 20:33:18.613720 sshd_keygen[1120]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 20:33:18.657898 systemd[1]: Finished sshd-keygen.service. Feb 12 20:33:18.668669 systemd[1]: Starting issuegen.service... Feb 12 20:33:18.678742 systemd[1]: Started sshd@0-10.128.0.29:22-147.75.109.163:46826.service. Feb 12 20:33:18.691501 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 20:33:18.691791 systemd[1]: Finished issuegen.service. Feb 12 20:33:18.702051 systemd[1]: Starting systemd-user-sessions.service... Feb 12 20:33:18.727655 systemd[1]: Finished systemd-user-sessions.service. Feb 12 20:33:18.739176 systemd[1]: Started getty@tty1.service. Feb 12 20:33:18.749535 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 20:33:18.758425 systemd[1]: Reached target getty.target. Feb 12 20:33:18.889688 locksmithd[1163]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 20:33:19.023363 sshd[1195]: Accepted publickey for core from 147.75.109.163 port 46826 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:33:19.026335 sshd[1195]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:33:19.045704 systemd[1]: Created slice user-500.slice. Feb 12 20:33:19.055172 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 20:33:19.067469 systemd-logind[1117]: New session 1 of user core. Feb 12 20:33:19.074602 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 20:33:19.086978 systemd[1]: Starting user@500.service... Feb 12 20:33:19.110431 (systemd)[1207]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:33:19.295201 systemd[1207]: Queued start job for default target default.target. Feb 12 20:33:19.297812 systemd[1207]: Reached target paths.target. Feb 12 20:33:19.297860 systemd[1207]: Reached target sockets.target. Feb 12 20:33:19.297883 systemd[1207]: Reached target timers.target. Feb 12 20:33:19.297905 systemd[1207]: Reached target basic.target. Feb 12 20:33:19.298019 systemd[1207]: Reached target default.target. Feb 12 20:33:19.298077 systemd[1207]: Startup finished in 175ms. Feb 12 20:33:19.298134 systemd[1]: Started user@500.service. Feb 12 20:33:19.306969 systemd[1]: Started session-1.scope. Feb 12 20:33:19.549503 systemd[1]: Started sshd@1-10.128.0.29:22-147.75.109.163:46832.service. Feb 12 20:33:19.881736 sshd[1216]: Accepted publickey for core from 147.75.109.163 port 46832 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:33:19.883372 sshd[1216]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:33:19.892758 systemd[1]: Started session-2.scope. Feb 12 20:33:19.893996 systemd-logind[1117]: New session 2 of user core. Feb 12 20:33:20.114226 sshd[1216]: pam_unix(sshd:session): session closed for user core Feb 12 20:33:20.119595 systemd[1]: sshd@1-10.128.0.29:22-147.75.109.163:46832.service: Deactivated successfully. Feb 12 20:33:20.120983 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 20:33:20.124550 systemd-logind[1117]: Session 2 logged out. Waiting for processes to exit. Feb 12 20:33:20.126763 systemd-logind[1117]: Removed session 2. Feb 12 20:33:20.161475 systemd[1]: Started sshd@2-10.128.0.29:22-147.75.109.163:46838.service. Feb 12 20:33:20.480207 sshd[1222]: Accepted publickey for core from 147.75.109.163 port 46838 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:33:20.482734 sshd[1222]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:33:20.491482 systemd[1]: Started session-3.scope. Feb 12 20:33:20.492982 systemd-logind[1117]: New session 3 of user core. Feb 12 20:33:20.710235 sshd[1222]: pam_unix(sshd:session): session closed for user core Feb 12 20:33:20.716462 systemd[1]: sshd@2-10.128.0.29:22-147.75.109.163:46838.service: Deactivated successfully. Feb 12 20:33:20.717823 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 20:33:20.720273 systemd-logind[1117]: Session 3 logged out. Waiting for processes to exit. Feb 12 20:33:20.721987 systemd-logind[1117]: Removed session 3. Feb 12 20:33:22.191506 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Feb 12 20:33:24.345956 kernel: loop0: detected capacity change from 0 to 2097152 Feb 12 20:33:24.372230 systemd-nspawn[1228]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Feb 12 20:33:24.372230 systemd-nspawn[1228]: Press ^] three times within 1s to kill container. Feb 12 20:33:24.389958 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 20:33:24.415829 systemd[1]: tmp-unifiedEkoIOF.mount: Deactivated successfully. Feb 12 20:33:24.482505 systemd[1]: Started oem-gce.service. Feb 12 20:33:24.483171 systemd[1]: Reached target multi-user.target. Feb 12 20:33:24.485540 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 20:33:24.497829 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 20:33:24.498126 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 20:33:24.504021 systemd[1]: Startup finished in 1.148s (kernel) + 9.161s (initrd) + 16.477s (userspace) = 26.787s. Feb 12 20:33:24.558591 systemd-nspawn[1228]: + '[' -e /etc/default/instance_configs.cfg.template ']' Feb 12 20:33:24.558591 systemd-nspawn[1228]: + echo -e '[InstanceSetup]\nset_host_keys = false' Feb 12 20:33:24.558921 systemd-nspawn[1228]: + /usr/bin/google_instance_setup Feb 12 20:33:25.267314 instance-setup[1234]: INFO Running google_set_multiqueue. Feb 12 20:33:25.284399 instance-setup[1234]: INFO Set channels for eth0 to 2. Feb 12 20:33:25.288387 instance-setup[1234]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Feb 12 20:33:25.289873 instance-setup[1234]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Feb 12 20:33:25.290458 instance-setup[1234]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Feb 12 20:33:25.291847 instance-setup[1234]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Feb 12 20:33:25.292267 instance-setup[1234]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Feb 12 20:33:25.293650 instance-setup[1234]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Feb 12 20:33:25.294087 instance-setup[1234]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Feb 12 20:33:25.295516 instance-setup[1234]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Feb 12 20:33:25.308094 instance-setup[1234]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Feb 12 20:33:25.308529 instance-setup[1234]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Feb 12 20:33:25.359840 systemd-nspawn[1228]: + /usr/bin/google_metadata_script_runner --script-type startup Feb 12 20:33:25.718326 startup-script[1265]: INFO Starting startup scripts. Feb 12 20:33:25.733956 startup-script[1265]: INFO No startup scripts found in metadata. Feb 12 20:33:25.734160 startup-script[1265]: INFO Finished running startup scripts. Feb 12 20:33:25.782178 systemd-nspawn[1228]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Feb 12 20:33:25.782178 systemd-nspawn[1228]: + daemon_pids=() Feb 12 20:33:25.782178 systemd-nspawn[1228]: + for d in accounts clock_skew network Feb 12 20:33:25.783022 systemd-nspawn[1228]: + daemon_pids+=($!) Feb 12 20:33:25.783022 systemd-nspawn[1228]: + for d in accounts clock_skew network Feb 12 20:33:25.783245 systemd-nspawn[1228]: + daemon_pids+=($!) Feb 12 20:33:25.783245 systemd-nspawn[1228]: + for d in accounts clock_skew network Feb 12 20:33:25.783520 systemd-nspawn[1228]: + daemon_pids+=($!) Feb 12 20:33:25.783691 systemd-nspawn[1228]: + NOTIFY_SOCKET=/run/systemd/notify Feb 12 20:33:25.783773 systemd-nspawn[1228]: + /usr/bin/systemd-notify --ready Feb 12 20:33:25.784012 systemd-nspawn[1228]: + /usr/bin/google_accounts_daemon Feb 12 20:33:25.784724 systemd-nspawn[1228]: + /usr/bin/google_network_daemon Feb 12 20:33:25.784724 systemd-nspawn[1228]: + /usr/bin/google_clock_skew_daemon Feb 12 20:33:25.854753 systemd-nspawn[1228]: + wait -n 36 37 38 Feb 12 20:33:26.460654 google-clock-skew[1269]: INFO Starting Google Clock Skew daemon. Feb 12 20:33:26.497628 google-clock-skew[1269]: INFO Clock drift token has changed: 0. Feb 12 20:33:26.510461 systemd-nspawn[1228]: hwclock: Cannot access the Hardware Clock via any known method. Feb 12 20:33:26.511354 systemd-nspawn[1228]: hwclock: Use the --verbose option to see the details of our search for an access method. Feb 12 20:33:26.514986 google-clock-skew[1269]: WARNING Failed to sync system time with hardware clock. Feb 12 20:33:26.538730 groupadd[1279]: group added to /etc/group: name=google-sudoers, GID=1000 Feb 12 20:33:26.543617 groupadd[1279]: group added to /etc/gshadow: name=google-sudoers Feb 12 20:33:26.552719 groupadd[1279]: new group: name=google-sudoers, GID=1000 Feb 12 20:33:26.569840 google-accounts[1268]: INFO Starting Google Accounts daemon. Feb 12 20:33:26.606634 google-accounts[1268]: WARNING OS Login not installed. Feb 12 20:33:26.608523 google-accounts[1268]: INFO Creating a new user account for 0. Feb 12 20:33:26.615648 systemd-nspawn[1228]: useradd: invalid user name '0': use --badname to ignore Feb 12 20:33:26.616514 google-accounts[1268]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Feb 12 20:33:26.631979 google-networking[1270]: INFO Starting Google Networking daemon. Feb 12 20:33:30.891054 systemd[1]: Started sshd@3-10.128.0.29:22-147.75.109.163:39882.service. Feb 12 20:33:31.184165 sshd[1291]: Accepted publickey for core from 147.75.109.163 port 39882 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:33:31.186627 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:33:31.194481 systemd[1]: Started session-4.scope. Feb 12 20:33:31.195413 systemd-logind[1117]: New session 4 of user core. Feb 12 20:33:31.404029 sshd[1291]: pam_unix(sshd:session): session closed for user core Feb 12 20:33:31.408549 systemd[1]: sshd@3-10.128.0.29:22-147.75.109.163:39882.service: Deactivated successfully. Feb 12 20:33:31.409709 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 20:33:31.410614 systemd-logind[1117]: Session 4 logged out. Waiting for processes to exit. Feb 12 20:33:31.411970 systemd-logind[1117]: Removed session 4. Feb 12 20:33:31.450221 systemd[1]: Started sshd@4-10.128.0.29:22-147.75.109.163:39886.service. Feb 12 20:33:31.741238 sshd[1297]: Accepted publickey for core from 147.75.109.163 port 39886 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:33:31.743399 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:33:31.749963 systemd-logind[1117]: New session 5 of user core. Feb 12 20:33:31.750834 systemd[1]: Started session-5.scope. Feb 12 20:33:31.951269 sshd[1297]: pam_unix(sshd:session): session closed for user core Feb 12 20:33:31.955853 systemd[1]: sshd@4-10.128.0.29:22-147.75.109.163:39886.service: Deactivated successfully. Feb 12 20:33:31.957130 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 20:33:31.958032 systemd-logind[1117]: Session 5 logged out. Waiting for processes to exit. Feb 12 20:33:31.959542 systemd-logind[1117]: Removed session 5. Feb 12 20:33:31.997505 systemd[1]: Started sshd@5-10.128.0.29:22-147.75.109.163:39902.service. Feb 12 20:33:32.287259 sshd[1303]: Accepted publickey for core from 147.75.109.163 port 39902 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:33:32.289060 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:33:32.296301 systemd[1]: Started session-6.scope. Feb 12 20:33:32.297189 systemd-logind[1117]: New session 6 of user core. Feb 12 20:33:32.504041 sshd[1303]: pam_unix(sshd:session): session closed for user core Feb 12 20:33:32.508869 systemd[1]: sshd@5-10.128.0.29:22-147.75.109.163:39902.service: Deactivated successfully. Feb 12 20:33:32.510055 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 20:33:32.511032 systemd-logind[1117]: Session 6 logged out. Waiting for processes to exit. Feb 12 20:33:32.512312 systemd-logind[1117]: Removed session 6. Feb 12 20:33:32.551946 systemd[1]: Started sshd@6-10.128.0.29:22-147.75.109.163:39916.service. Feb 12 20:33:32.845662 sshd[1309]: Accepted publickey for core from 147.75.109.163 port 39916 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:33:32.847768 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:33:32.854983 systemd[1]: Started session-7.scope. Feb 12 20:33:32.855821 systemd-logind[1117]: New session 7 of user core. Feb 12 20:33:33.045349 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 20:33:33.045757 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:33:33.055193 dbus-daemon[1093]: \xd0\u000d\u000e\xf4\u0002V: received setenforce notice (enforcing=-1182570000) Feb 12 20:33:33.057742 sudo[1312]: pam_unix(sudo:session): session closed for user root Feb 12 20:33:33.103101 sshd[1309]: pam_unix(sshd:session): session closed for user core Feb 12 20:33:33.108699 systemd[1]: sshd@6-10.128.0.29:22-147.75.109.163:39916.service: Deactivated successfully. Feb 12 20:33:33.110127 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 20:33:33.111321 systemd-logind[1117]: Session 7 logged out. Waiting for processes to exit. Feb 12 20:33:33.112682 systemd-logind[1117]: Removed session 7. Feb 12 20:33:33.149994 systemd[1]: Started sshd@7-10.128.0.29:22-147.75.109.163:39920.service. Feb 12 20:33:33.440689 sshd[1316]: Accepted publickey for core from 147.75.109.163 port 39920 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:33:33.443145 sshd[1316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:33:33.450256 systemd[1]: Started session-8.scope. Feb 12 20:33:33.451120 systemd-logind[1117]: New session 8 of user core. Feb 12 20:33:33.621554 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 20:33:33.621990 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:33:33.626787 sudo[1320]: pam_unix(sudo:session): session closed for user root Feb 12 20:33:33.640234 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 20:33:33.640618 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:33:33.654508 systemd[1]: Stopping audit-rules.service... Feb 12 20:33:33.655000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:33:33.662323 kernel: kauditd_printk_skb: 131 callbacks suppressed Feb 12 20:33:33.662479 kernel: audit: type=1305 audit(1707770013.655:166): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:33:33.667300 auditctl[1323]: No rules Feb 12 20:33:33.668277 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 20:33:33.668554 systemd[1]: Stopped audit-rules.service. Feb 12 20:33:33.655000 audit[1323]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe96f86a50 a2=420 a3=0 items=0 ppid=1 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:33.678445 systemd[1]: Starting audit-rules.service... Feb 12 20:33:33.655000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:33:33.717801 kernel: audit: type=1300 audit(1707770013.655:166): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe96f86a50 a2=420 a3=0 items=0 ppid=1 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:33.718281 kernel: audit: type=1327 audit(1707770013.655:166): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:33:33.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:33.742308 augenrules[1340]: No rules Feb 12 20:33:33.747427 kernel: audit: type=1131 audit(1707770013.666:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:33.746005 sudo[1319]: pam_unix(sudo:session): session closed for user root Feb 12 20:33:33.743800 systemd[1]: Finished audit-rules.service. Feb 12 20:33:33.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:33.770286 kernel: audit: type=1130 audit(1707770013.739:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:33.770446 kernel: audit: type=1106 audit(1707770013.745:169): pid=1319 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:33:33.745000 audit[1319]: USER_END pid=1319 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:33:33.745000 audit[1319]: CRED_DISP pid=1319 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:33:33.798482 sshd[1316]: pam_unix(sshd:session): session closed for user core Feb 12 20:33:33.804455 systemd-logind[1117]: Session 8 logged out. Waiting for processes to exit. Feb 12 20:33:33.807046 systemd[1]: sshd@7-10.128.0.29:22-147.75.109.163:39920.service: Deactivated successfully. Feb 12 20:33:33.808285 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 20:33:33.810445 systemd-logind[1117]: Removed session 8. Feb 12 20:33:33.818093 kernel: audit: type=1104 audit(1707770013.745:170): pid=1319 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:33:33.818288 kernel: audit: type=1106 audit(1707770013.800:171): pid=1316 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:33:33.800000 audit[1316]: USER_END pid=1316 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:33:33.838096 systemd[1]: Started sshd@8-10.128.0.29:22-147.75.109.163:39932.service. Feb 12 20:33:33.875119 kernel: audit: type=1104 audit(1707770013.800:172): pid=1316 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:33:33.800000 audit[1316]: CRED_DISP pid=1316 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:33:33.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.29:22-147.75.109.163:39920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:33.875944 kernel: audit: type=1131 audit(1707770013.805:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.29:22-147.75.109.163:39920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:33.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.29:22-147.75.109.163:39932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:34.133000 audit[1346]: USER_ACCT pid=1346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:33:34.136360 sshd[1346]: Accepted publickey for core from 147.75.109.163 port 39932 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:33:34.136000 audit[1346]: CRED_ACQ pid=1346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:33:34.136000 audit[1346]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeff18e8e0 a2=3 a3=0 items=0 ppid=1 pid=1346 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:34.136000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:33:34.137568 sshd[1346]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:33:34.144074 systemd-logind[1117]: New session 9 of user core. Feb 12 20:33:34.144927 systemd[1]: Started session-9.scope. Feb 12 20:33:34.151000 audit[1346]: USER_START pid=1346 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:33:34.154000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:33:34.313000 audit[1349]: USER_ACCT pid=1349 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:33:34.313000 audit[1349]: CRED_REFR pid=1349 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:33:34.314700 sudo[1349]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 20:33:34.315113 sudo[1349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:33:34.316000 audit[1349]: USER_START pid=1349 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:33:35.113956 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 20:33:35.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:35.123962 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 20:33:35.124570 systemd[1]: Reached target network-online.target. Feb 12 20:33:35.127122 systemd[1]: Starting docker.service... Feb 12 20:33:35.183093 env[1365]: time="2024-02-12T20:33:35.183028188Z" level=info msg="Starting up" Feb 12 20:33:35.185469 env[1365]: time="2024-02-12T20:33:35.185420729Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 20:33:35.185469 env[1365]: time="2024-02-12T20:33:35.185450339Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 20:33:35.185668 env[1365]: time="2024-02-12T20:33:35.185483611Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 20:33:35.185668 env[1365]: time="2024-02-12T20:33:35.185501499Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 20:33:35.195346 env[1365]: time="2024-02-12T20:33:35.195289379Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 20:33:35.195346 env[1365]: time="2024-02-12T20:33:35.195321380Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 20:33:35.195586 env[1365]: time="2024-02-12T20:33:35.195350889Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 20:33:35.195586 env[1365]: time="2024-02-12T20:33:35.195368369Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 20:33:35.259009 env[1365]: time="2024-02-12T20:33:35.258931004Z" level=info msg="Loading containers: start." Feb 12 20:33:35.327000 audit[1395]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.327000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd32afe790 a2=0 a3=7ffd32afe77c items=0 ppid=1365 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.327000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 20:33:35.331000 audit[1397]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.331000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffeb44ed670 a2=0 a3=7ffeb44ed65c items=0 ppid=1365 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.331000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 20:33:35.334000 audit[1399]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.334000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe07906100 a2=0 a3=7ffe079060ec items=0 ppid=1365 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.334000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 20:33:35.338000 audit[1401]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.338000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc2b09c030 a2=0 a3=7ffc2b09c01c items=0 ppid=1365 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.338000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 20:33:35.342000 audit[1403]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.342000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeb3a37ce0 a2=0 a3=7ffeb3a37ccc items=0 ppid=1365 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.342000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 20:33:35.362000 audit[1408]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.362000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc1368db40 a2=0 a3=7ffc1368db2c items=0 ppid=1365 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.362000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 20:33:35.374000 audit[1410]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.374000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff29eb73b0 a2=0 a3=7fff29eb739c items=0 ppid=1365 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.374000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 20:33:35.379000 audit[1412]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.379000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd5abddca0 a2=0 a3=7ffd5abddc8c items=0 ppid=1365 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.379000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 20:33:35.382000 audit[1414]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.382000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc3080bb80 a2=0 a3=7ffc3080bb6c items=0 ppid=1365 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.382000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:33:35.394000 audit[1418]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.394000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff9d848480 a2=0 a3=7fff9d84846c items=0 ppid=1365 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.394000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:33:35.396000 audit[1419]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.396000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff9985cea0 a2=0 a3=7fff9985ce8c items=0 ppid=1365 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.396000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:33:35.411926 kernel: Initializing XFRM netlink socket Feb 12 20:33:35.457631 env[1365]: time="2024-02-12T20:33:35.457561086Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 20:33:35.487000 audit[1427]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.487000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffddaf7c060 a2=0 a3=7ffddaf7c04c items=0 ppid=1365 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.487000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 20:33:35.502000 audit[1430]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.502000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc005c2660 a2=0 a3=7ffc005c264c items=0 ppid=1365 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.502000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 20:33:35.508000 audit[1433]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.508000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc09bd3330 a2=0 a3=7ffc09bd331c items=0 ppid=1365 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.508000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 20:33:35.512000 audit[1435]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.512000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffec17cfb00 a2=0 a3=7ffec17cfaec items=0 ppid=1365 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.512000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 20:33:35.515000 audit[1437]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.515000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffceccd1000 a2=0 a3=7ffceccd0fec items=0 ppid=1365 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.515000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 20:33:35.518000 audit[1439]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.518000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe2efbfb40 a2=0 a3=7ffe2efbfb2c items=0 ppid=1365 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.518000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 20:33:35.520000 audit[1441]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.520000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc91f11240 a2=0 a3=7ffc91f1122c items=0 ppid=1365 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.520000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 20:33:35.532000 audit[1444]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.532000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdc1268400 a2=0 a3=7ffdc12683ec items=0 ppid=1365 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.532000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 20:33:35.536000 audit[1446]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.536000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffb0c3ee60 a2=0 a3=7fffb0c3ee4c items=0 ppid=1365 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.536000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 20:33:35.539000 audit[1448]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.539000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff74a88cf0 a2=0 a3=7fff74a88cdc items=0 ppid=1365 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.539000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 20:33:35.542000 audit[1450]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.542000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc94a264e0 a2=0 a3=7ffc94a264cc items=0 ppid=1365 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.542000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 20:33:35.544352 systemd-networkd[1012]: docker0: Link UP Feb 12 20:33:35.558000 audit[1454]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.558000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda7b5e070 a2=0 a3=7ffda7b5e05c items=0 ppid=1365 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.558000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:33:35.560000 audit[1455]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:35.560000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc5aa637b0 a2=0 a3=7ffc5aa6379c items=0 ppid=1365 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:35.560000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:33:35.562144 env[1365]: time="2024-02-12T20:33:35.562082658Z" level=info msg="Loading containers: done." Feb 12 20:33:35.584145 env[1365]: time="2024-02-12T20:33:35.584066103Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 20:33:35.584468 env[1365]: time="2024-02-12T20:33:35.584436760Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 20:33:35.584646 env[1365]: time="2024-02-12T20:33:35.584609271Z" level=info msg="Daemon has completed initialization" Feb 12 20:33:35.608099 systemd[1]: Started docker.service. Feb 12 20:33:35.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:35.620822 env[1365]: time="2024-02-12T20:33:35.620717067Z" level=info msg="API listen on /run/docker.sock" Feb 12 20:33:35.647771 systemd[1]: Reloading. Feb 12 20:33:35.753718 /usr/lib/systemd/system-generators/torcx-generator[1508]: time="2024-02-12T20:33:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:33:35.753774 /usr/lib/systemd/system-generators/torcx-generator[1508]: time="2024-02-12T20:33:35Z" level=info msg="torcx already run" Feb 12 20:33:35.857842 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:33:35.857872 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:33:35.881676 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:33:35.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.973000 audit: BPF prog-id=37 op=LOAD Feb 12 20:33:35.973000 audit: BPF prog-id=28 op=UNLOAD Feb 12 20:33:35.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:35.974000 audit: BPF prog-id=38 op=LOAD Feb 12 20:33:35.974000 audit: BPF prog-id=23 op=UNLOAD Feb 12 20:33:36.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit: BPF prog-id=39 op=LOAD Feb 12 20:33:36.001000 audit: BPF prog-id=24 op=UNLOAD Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit: BPF prog-id=40 op=LOAD Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.001000 audit: BPF prog-id=41 op=LOAD Feb 12 20:33:36.001000 audit: BPF prog-id=25 op=UNLOAD Feb 12 20:33:36.001000 audit: BPF prog-id=26 op=UNLOAD Feb 12 20:33:36.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.004000 audit: BPF prog-id=42 op=LOAD Feb 12 20:33:36.004000 audit: BPF prog-id=32 op=UNLOAD Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit: BPF prog-id=43 op=LOAD Feb 12 20:33:36.005000 audit: BPF prog-id=33 op=UNLOAD Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.005000 audit: BPF prog-id=44 op=LOAD Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit: BPF prog-id=45 op=LOAD Feb 12 20:33:36.006000 audit: BPF prog-id=34 op=UNLOAD Feb 12 20:33:36.006000 audit: BPF prog-id=35 op=UNLOAD Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit: BPF prog-id=46 op=LOAD Feb 12 20:33:36.007000 audit: BPF prog-id=18 op=UNLOAD Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit: BPF prog-id=47 op=LOAD Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.007000 audit: BPF prog-id=48 op=LOAD Feb 12 20:33:36.007000 audit: BPF prog-id=19 op=UNLOAD Feb 12 20:33:36.007000 audit: BPF prog-id=20 op=UNLOAD Feb 12 20:33:36.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.009000 audit: BPF prog-id=49 op=LOAD Feb 12 20:33:36.009000 audit: BPF prog-id=27 op=UNLOAD Feb 12 20:33:36.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit: BPF prog-id=50 op=LOAD Feb 12 20:33:36.012000 audit: BPF prog-id=29 op=UNLOAD Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit: BPF prog-id=51 op=LOAD Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.012000 audit: BPF prog-id=52 op=LOAD Feb 12 20:33:36.012000 audit: BPF prog-id=30 op=UNLOAD Feb 12 20:33:36.012000 audit: BPF prog-id=31 op=UNLOAD Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit: BPF prog-id=53 op=LOAD Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:36.013000 audit: BPF prog-id=54 op=LOAD Feb 12 20:33:36.013000 audit: BPF prog-id=21 op=UNLOAD Feb 12 20:33:36.013000 audit: BPF prog-id=22 op=UNLOAD Feb 12 20:33:36.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:36.030452 systemd[1]: Started kubelet.service. Feb 12 20:33:36.141167 kubelet[1545]: E0212 20:33:36.141079 1545 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 20:33:36.144855 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:33:36.145106 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:33:36.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:33:36.670917 env[1134]: time="2024-02-12T20:33:36.670826918Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 12 20:33:37.124041 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2823474176.mount: Deactivated successfully. Feb 12 20:33:39.272539 env[1134]: time="2024-02-12T20:33:39.272466398Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:39.275358 env[1134]: time="2024-02-12T20:33:39.275294523Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:39.278062 env[1134]: time="2024-02-12T20:33:39.278016393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:39.280781 env[1134]: time="2024-02-12T20:33:39.280730131Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:39.281808 env[1134]: time="2024-02-12T20:33:39.281753963Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 12 20:33:39.297567 env[1134]: time="2024-02-12T20:33:39.297515773Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 12 20:33:41.323181 env[1134]: time="2024-02-12T20:33:41.323093077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:41.326115 env[1134]: time="2024-02-12T20:33:41.326059338Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:41.328749 env[1134]: time="2024-02-12T20:33:41.328698304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:41.331179 env[1134]: time="2024-02-12T20:33:41.331137398Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:41.332211 env[1134]: time="2024-02-12T20:33:41.332155388Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 12 20:33:41.349714 env[1134]: time="2024-02-12T20:33:41.349651621Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 12 20:33:42.551108 env[1134]: time="2024-02-12T20:33:42.551006626Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:42.553992 env[1134]: time="2024-02-12T20:33:42.553940450Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:42.556422 env[1134]: time="2024-02-12T20:33:42.556375494Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:42.558761 env[1134]: time="2024-02-12T20:33:42.558718964Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:42.559742 env[1134]: time="2024-02-12T20:33:42.559688285Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 12 20:33:42.576352 env[1134]: time="2024-02-12T20:33:42.576284844Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 20:33:43.587395 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3237011318.mount: Deactivated successfully. Feb 12 20:33:44.163409 env[1134]: time="2024-02-12T20:33:44.163319780Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:44.166456 env[1134]: time="2024-02-12T20:33:44.166380741Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:44.168800 env[1134]: time="2024-02-12T20:33:44.168733968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:44.171439 env[1134]: time="2024-02-12T20:33:44.171383816Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:44.171835 env[1134]: time="2024-02-12T20:33:44.171789983Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 12 20:33:44.187622 env[1134]: time="2024-02-12T20:33:44.187571028Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 20:33:44.558547 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount852779190.mount: Deactivated successfully. Feb 12 20:33:44.569181 env[1134]: time="2024-02-12T20:33:44.569101835Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:44.571989 env[1134]: time="2024-02-12T20:33:44.571933895Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:44.574293 env[1134]: time="2024-02-12T20:33:44.574249123Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:44.576456 env[1134]: time="2024-02-12T20:33:44.576392592Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:44.577134 env[1134]: time="2024-02-12T20:33:44.577076858Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 20:33:44.599820 env[1134]: time="2024-02-12T20:33:44.599759838Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 12 20:33:45.332877 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3470949766.mount: Deactivated successfully. Feb 12 20:33:46.212579 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 20:33:46.212982 systemd[1]: Stopped kubelet.service. Feb 12 20:33:46.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:46.220800 kernel: kauditd_printk_skb: 293 callbacks suppressed Feb 12 20:33:46.220954 kernel: audit: type=1130 audit(1707770026.212:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:46.243075 systemd[1]: Started kubelet.service. Feb 12 20:33:46.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:46.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:46.289226 kernel: audit: type=1131 audit(1707770026.212:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:46.289415 kernel: audit: type=1130 audit(1707770026.242:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:46.368982 kubelet[1588]: E0212 20:33:46.368898 1588 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 20:33:46.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:33:46.375188 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:33:46.375426 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:33:46.397947 kernel: audit: type=1131 audit(1707770026.374:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:33:46.848905 kernel: audit: type=1131 audit(1707770026.823:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:46.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:46.823607 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 12 20:33:46.864000 audit: BPF prog-id=45 op=UNLOAD Feb 12 20:33:46.879828 kernel: audit: type=1334 audit(1707770026.864:422): prog-id=45 op=UNLOAD Feb 12 20:33:46.880041 kernel: audit: type=1334 audit(1707770026.864:423): prog-id=44 op=UNLOAD Feb 12 20:33:46.864000 audit: BPF prog-id=44 op=UNLOAD Feb 12 20:33:46.864000 audit: BPF prog-id=43 op=UNLOAD Feb 12 20:33:46.887932 kernel: audit: type=1334 audit(1707770026.864:424): prog-id=43 op=UNLOAD Feb 12 20:33:49.747115 env[1134]: time="2024-02-12T20:33:49.747016135Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:49.750705 env[1134]: time="2024-02-12T20:33:49.750641637Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:49.753481 env[1134]: time="2024-02-12T20:33:49.753424918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:49.755875 env[1134]: time="2024-02-12T20:33:49.755826370Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:49.756741 env[1134]: time="2024-02-12T20:33:49.756673990Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 12 20:33:49.771706 env[1134]: time="2024-02-12T20:33:49.771640611Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 12 20:33:50.214651 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3044128345.mount: Deactivated successfully. Feb 12 20:33:51.075039 env[1134]: time="2024-02-12T20:33:51.074952465Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:51.078028 env[1134]: time="2024-02-12T20:33:51.077970583Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:51.080406 env[1134]: time="2024-02-12T20:33:51.080354589Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:51.082803 env[1134]: time="2024-02-12T20:33:51.082750643Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:51.083799 env[1134]: time="2024-02-12T20:33:51.083717376Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 12 20:33:54.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:54.470617 systemd[1]: Stopped kubelet.service. Feb 12 20:33:54.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:54.507918 systemd[1]: Reloading. Feb 12 20:33:54.513985 kernel: audit: type=1130 audit(1707770034.469:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:54.514142 kernel: audit: type=1131 audit(1707770034.472:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:54.624601 /usr/lib/systemd/system-generators/torcx-generator[1679]: time="2024-02-12T20:33:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:33:54.626445 /usr/lib/systemd/system-generators/torcx-generator[1679]: time="2024-02-12T20:33:54Z" level=info msg="torcx already run" Feb 12 20:33:54.723875 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:33:54.723930 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:33:54.749274 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:33:54.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.863926 kernel: audit: type=1400 audit(1707770034.841:427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.906958 kernel: audit: type=1400 audit(1707770034.841:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.907187 kernel: audit: type=1400 audit(1707770034.841:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.928811 kernel: audit: type=1400 audit(1707770034.841:430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.971305 kernel: audit: type=1400 audit(1707770034.841:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.971539 kernel: audit: type=1400 audit(1707770034.841:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.992777 kernel: audit: type=1400 audit(1707770034.841:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.992994 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 20:33:54.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.862000 audit: BPF prog-id=55 op=LOAD Feb 12 20:33:54.862000 audit: BPF prog-id=37 op=UNLOAD Feb 12 20:33:54.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.863000 audit: BPF prog-id=56 op=LOAD Feb 12 20:33:54.863000 audit: BPF prog-id=38 op=UNLOAD Feb 12 20:33:54.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit: BPF prog-id=57 op=LOAD Feb 12 20:33:54.885000 audit: BPF prog-id=39 op=UNLOAD Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit: BPF prog-id=58 op=LOAD Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.906000 audit: BPF prog-id=59 op=LOAD Feb 12 20:33:54.906000 audit: BPF prog-id=40 op=UNLOAD Feb 12 20:33:54.906000 audit: BPF prog-id=41 op=UNLOAD Feb 12 20:33:54.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.949000 audit: BPF prog-id=60 op=LOAD Feb 12 20:33:54.949000 audit: BPF prog-id=42 op=UNLOAD Feb 12 20:33:54.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit: BPF prog-id=61 op=LOAD Feb 12 20:33:54.998000 audit: BPF prog-id=46 op=UNLOAD Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit: BPF prog-id=62 op=LOAD Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:54.998000 audit: BPF prog-id=63 op=LOAD Feb 12 20:33:54.998000 audit: BPF prog-id=47 op=UNLOAD Feb 12 20:33:54.998000 audit: BPF prog-id=48 op=UNLOAD Feb 12 20:33:55.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.000000 audit: BPF prog-id=64 op=LOAD Feb 12 20:33:55.000000 audit: BPF prog-id=49 op=UNLOAD Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.002000 audit: BPF prog-id=65 op=LOAD Feb 12 20:33:55.002000 audit: BPF prog-id=50 op=UNLOAD Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit: BPF prog-id=66 op=LOAD Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit: BPF prog-id=67 op=LOAD Feb 12 20:33:55.003000 audit: BPF prog-id=51 op=UNLOAD Feb 12 20:33:55.003000 audit: BPF prog-id=52 op=UNLOAD Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.003000 audit: BPF prog-id=68 op=LOAD Feb 12 20:33:55.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:55.004000 audit: BPF prog-id=69 op=LOAD Feb 12 20:33:55.004000 audit: BPF prog-id=53 op=UNLOAD Feb 12 20:33:55.004000 audit: BPF prog-id=54 op=UNLOAD Feb 12 20:33:55.029603 systemd[1]: Started kubelet.service. Feb 12 20:33:55.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:55.109848 kubelet[1722]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:33:55.109848 kubelet[1722]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:33:55.110511 kubelet[1722]: I0212 20:33:55.109935 1722 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:33:55.111711 kubelet[1722]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:33:55.111711 kubelet[1722]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:33:56.334121 kubelet[1722]: I0212 20:33:56.334062 1722 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 20:33:56.334121 kubelet[1722]: I0212 20:33:56.334100 1722 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:33:56.334782 kubelet[1722]: I0212 20:33:56.334525 1722 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 20:33:56.341661 kubelet[1722]: E0212 20:33:56.341621 1722 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.29:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:56.341922 kubelet[1722]: I0212 20:33:56.341817 1722 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:33:56.344756 kubelet[1722]: I0212 20:33:56.344681 1722 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:33:56.345182 kubelet[1722]: I0212 20:33:56.345149 1722 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:33:56.345387 kubelet[1722]: I0212 20:33:56.345266 1722 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:33:56.345387 kubelet[1722]: I0212 20:33:56.345310 1722 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:33:56.345387 kubelet[1722]: I0212 20:33:56.345329 1722 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 20:33:56.345696 kubelet[1722]: I0212 20:33:56.345510 1722 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:33:56.353638 kubelet[1722]: I0212 20:33:56.353599 1722 kubelet.go:398] "Attempting to sync node with API server" Feb 12 20:33:56.354625 kubelet[1722]: I0212 20:33:56.354600 1722 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:33:56.354864 kubelet[1722]: I0212 20:33:56.354838 1722 kubelet.go:297] "Adding apiserver pod source" Feb 12 20:33:56.355006 kubelet[1722]: I0212 20:33:56.354990 1722 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:33:56.355565 kubelet[1722]: W0212 20:33:56.355052 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:56.355761 kubelet[1722]: E0212 20:33:56.355742 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:56.356458 kubelet[1722]: W0212 20:33:56.356411 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:56.356649 kubelet[1722]: E0212 20:33:56.356631 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:56.356872 kubelet[1722]: I0212 20:33:56.356855 1722 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:33:56.360695 kubelet[1722]: W0212 20:33:56.360671 1722 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 20:33:56.361566 kubelet[1722]: I0212 20:33:56.361540 1722 server.go:1186] "Started kubelet" Feb 12 20:33:56.362147 kubelet[1722]: I0212 20:33:56.362125 1722 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:33:56.363227 kubelet[1722]: I0212 20:33:56.363183 1722 server.go:451] "Adding debug handlers to kubelet server" Feb 12 20:33:56.362000 audit[1722]: AVC avc: denied { mac_admin } for pid=1722 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:56.362000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:33:56.362000 audit[1722]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007daa20 a1=c0008cb068 a2=c0007da9f0 a3=25 items=0 ppid=1 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.362000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:33:56.362000 audit[1722]: AVC avc: denied { mac_admin } for pid=1722 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:56.362000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:33:56.362000 audit[1722]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008b7800 a1=c0008cb080 a2=c0007dab40 a3=25 items=0 ppid=1 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.362000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:33:56.364217 kubelet[1722]: I0212 20:33:56.363504 1722 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:33:56.364217 kubelet[1722]: I0212 20:33:56.363566 1722 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:33:56.364217 kubelet[1722]: I0212 20:33:56.363670 1722 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:33:56.369000 audit[1732]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.370949 kubelet[1722]: E0212 20:33:56.370620 1722 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal.17b337ccc7622a6b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", UID:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 361505387, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 361505387, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.128.0.29:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.29:6443: connect: connection refused'(may retry after sleeping) Feb 12 20:33:56.370949 kubelet[1722]: E0212 20:33:56.370945 1722 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:33:56.371242 kubelet[1722]: E0212 20:33:56.370975 1722 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:33:56.369000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc77ec0620 a2=0 a3=7ffc77ec060c items=0 ppid=1722 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:33:56.372028 kubelet[1722]: I0212 20:33:56.372007 1722 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 20:33:56.373262 kubelet[1722]: E0212 20:33:56.373225 1722 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.128.0.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:56.373000 audit[1733]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.373000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3f855310 a2=0 a3=7ffd3f8552fc items=0 ppid=1722 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:33:56.375153 kubelet[1722]: I0212 20:33:56.375132 1722 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 20:33:56.378000 audit[1735]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.378000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc96ac7ef0 a2=0 a3=7ffc96ac7edc items=0 ppid=1722 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.378000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:33:56.382000 audit[1737]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.382000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcaee207b0 a2=0 a3=7ffcaee2079c items=0 ppid=1722 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:33:56.393000 audit[1740]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.393000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffef634d4d0 a2=0 a3=7ffef634d4bc items=0 ppid=1722 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.393000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 20:33:56.399948 kubelet[1722]: W0212 20:33:56.399845 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:56.399948 kubelet[1722]: E0212 20:33:56.399964 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:56.401000 audit[1743]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.401000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc79c4bd70 a2=0 a3=7ffc79c4bd5c items=0 ppid=1722 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 20:33:56.414000 audit[1747]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.414000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd56b27f00 a2=0 a3=7ffd56b27eec items=0 ppid=1722 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 20:33:56.423000 audit[1751]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.423000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc41ccea70 a2=0 a3=7ffc41ccea5c items=0 ppid=1722 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 20:33:56.425000 audit[1752]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.425000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc1fa418e0 a2=0 a3=7ffc1fa418cc items=0 ppid=1722 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 20:33:56.428311 kubelet[1722]: I0212 20:33:56.428260 1722 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:33:56.428311 kubelet[1722]: I0212 20:33:56.428286 1722 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:33:56.428311 kubelet[1722]: I0212 20:33:56.428310 1722 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:33:56.429000 audit[1753]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.429000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5bd4cb80 a2=0 a3=7ffc5bd4cb6c items=0 ppid=1722 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:33:56.433000 audit[1756]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.433000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdbcff4f90 a2=0 a3=7ffdbcff4f7c items=0 ppid=1722 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 20:33:56.437000 audit[1758]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.437000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe5aa93010 a2=0 a3=7ffe5aa92ffc items=0 ppid=1722 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:33:56.441000 audit[1760]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.441000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffd16077fb0 a2=0 a3=7ffd16077f9c items=0 ppid=1722 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.441000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 20:33:56.445000 audit[1762]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.445000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffc31572570 a2=0 a3=7ffc3157255c items=0 ppid=1722 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.445000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 20:33:56.449000 audit[1764]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.449000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7fff0594bb10 a2=0 a3=7fff0594bafc items=0 ppid=1722 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 20:33:56.450805 kubelet[1722]: I0212 20:33:56.450757 1722 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:33:56.451000 audit[1765]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.451000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcf2004170 a2=0 a3=7ffcf200415c items=0 ppid=1722 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:33:56.452000 audit[1766]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.452000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd000bcf60 a2=0 a3=7ffd000bcf4c items=0 ppid=1722 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:33:56.453000 audit[1767]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.453000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe862688e0 a2=0 a3=7ffe862688cc items=0 ppid=1722 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 20:33:56.455000 audit[1769]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.455000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe7900ee0 a2=0 a3=7fffe7900ecc items=0 ppid=1722 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.455000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:33:56.456000 audit[1770]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.456000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd7dffd410 a2=0 a3=7ffd7dffd3fc items=0 ppid=1722 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 20:33:56.457000 audit[1771]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:33:56.457000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec60eb230 a2=0 a3=7ffec60eb21c items=0 ppid=1722 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:33:56.458000 audit[1772]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.458000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff69316200 a2=0 a3=7fff693161ec items=0 ppid=1722 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:33:56.461000 audit[1774]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.461000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff147dcf50 a2=0 a3=7fff147dcf3c items=0 ppid=1722 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 20:33:56.463000 audit[1775]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.463000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd9e352750 a2=0 a3=7ffd9e35273c items=0 ppid=1722 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.463000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 20:33:56.465000 audit[1776]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.465000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd08431b0 a2=0 a3=7fffd084319c items=0 ppid=1722 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.465000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:33:56.468000 audit[1778]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.468000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff2880f6b0 a2=0 a3=7fff2880f69c items=0 ppid=1722 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.468000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 20:33:56.471000 audit[1780]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.471000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcc264e9b0 a2=0 a3=7ffcc264e99c items=0 ppid=1722 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.471000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:33:56.474000 audit[1782]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.474000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fff118c4190 a2=0 a3=7fff118c417c items=0 ppid=1722 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 20:33:56.478503 kubelet[1722]: I0212 20:33:56.478457 1722 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:56.478995 kubelet[1722]: E0212 20:33:56.478946 1722 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.29:6443/api/v1/nodes\": dial tcp 10.128.0.29:6443: connect: connection refused" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:56.479000 audit[1784]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.479000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffcea8b6220 a2=0 a3=7ffcea8b620c items=0 ppid=1722 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.479000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 20:33:56.484000 audit[1786]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.484000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffcc8393f00 a2=0 a3=7ffcc8393eec items=0 ppid=1722 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 20:33:56.486000 audit[1787]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.486000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed9d358d0 a2=0 a3=7ffed9d358bc items=0 ppid=1722 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.486000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:33:56.488000 audit[1788]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.488000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfcf412b0 a2=0 a3=7ffcfcf4129c items=0 ppid=1722 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.488000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:33:56.488000 audit[1789]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:33:56.488000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef4db45b0 a2=0 a3=7ffef4db459c items=0 ppid=1722 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.488000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:33:56.520955 kubelet[1722]: I0212 20:33:56.485732 1722 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:33:56.520955 kubelet[1722]: I0212 20:33:56.485761 1722 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 20:33:56.520955 kubelet[1722]: I0212 20:33:56.485789 1722 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 20:33:56.520955 kubelet[1722]: E0212 20:33:56.485861 1722 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 20:33:56.520955 kubelet[1722]: W0212 20:33:56.487212 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:56.520955 kubelet[1722]: E0212 20:33:56.487304 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:56.524423 kubelet[1722]: I0212 20:33:56.524349 1722 policy_none.go:49] "None policy: Start" Feb 12 20:33:56.525560 kubelet[1722]: I0212 20:33:56.525516 1722 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:33:56.525560 kubelet[1722]: I0212 20:33:56.525561 1722 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:33:56.575095 kubelet[1722]: E0212 20:33:56.575000 1722 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.128.0.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:56.623724 kubelet[1722]: E0212 20:33:56.586275 1722 kubelet.go:2137] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 12 20:33:56.659542 systemd[1]: Created slice kubepods.slice. Feb 12 20:33:56.667376 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 20:33:56.671547 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 20:33:56.680274 kubelet[1722]: I0212 20:33:56.680235 1722 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:33:56.679000 audit[1722]: AVC avc: denied { mac_admin } for pid=1722 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:56.679000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:33:56.679000 audit[1722]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011a2c30 a1=c0011934b8 a2=c0011a2c00 a3=25 items=0 ppid=1 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:56.679000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:33:56.680833 kubelet[1722]: I0212 20:33:56.680367 1722 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:33:56.680833 kubelet[1722]: I0212 20:33:56.680635 1722 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:33:56.690414 kubelet[1722]: E0212 20:33:56.690380 1722 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" not found" Feb 12 20:33:56.692435 kubelet[1722]: I0212 20:33:56.692404 1722 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:56.693873 kubelet[1722]: E0212 20:33:56.693829 1722 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.29:6443/api/v1/nodes\": dial tcp 10.128.0.29:6443: connect: connection refused" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:56.786626 kubelet[1722]: I0212 20:33:56.786553 1722 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:33:56.794849 kubelet[1722]: I0212 20:33:56.794747 1722 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:33:56.801129 kubelet[1722]: I0212 20:33:56.801083 1722 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:33:56.802044 kubelet[1722]: I0212 20:33:56.802013 1722 status_manager.go:698] "Failed to get status for pod" podUID=f334eb734a780037807f245a867bc4fd pod="kube-system/kube-scheduler-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" err="Get \"https://10.128.0.29:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\": dial tcp 10.128.0.29:6443: connect: connection refused" Feb 12 20:33:56.808756 systemd[1]: Created slice kubepods-burstable-podf334eb734a780037807f245a867bc4fd.slice. Feb 12 20:33:56.811277 kubelet[1722]: I0212 20:33:56.811040 1722 status_manager.go:698] "Failed to get status for pod" podUID=3eb2ade3c24b788e5a5f919efb1e662f pod="kube-system/kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" err="Get \"https://10.128.0.29:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\": dial tcp 10.128.0.29:6443: connect: connection refused" Feb 12 20:33:56.819309 systemd[1]: Created slice kubepods-burstable-pod3eb2ade3c24b788e5a5f919efb1e662f.slice. Feb 12 20:33:56.829653 kubelet[1722]: I0212 20:33:56.829612 1722 status_manager.go:698] "Failed to get status for pod" podUID=226535942f677a9865d4a3f7b723d7a5 pod="kube-system/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" err="Get \"https://10.128.0.29:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\": dial tcp 10.128.0.29:6443: connect: connection refused" Feb 12 20:33:56.838506 systemd[1]: Created slice kubepods-burstable-pod226535942f677a9865d4a3f7b723d7a5.slice. Feb 12 20:33:56.880523 kubelet[1722]: I0212 20:33:56.879481 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/226535942f677a9865d4a3f7b723d7a5-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"226535942f677a9865d4a3f7b723d7a5\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:56.880523 kubelet[1722]: I0212 20:33:56.879680 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/226535942f677a9865d4a3f7b723d7a5-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"226535942f677a9865d4a3f7b723d7a5\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:56.880523 kubelet[1722]: I0212 20:33:56.879765 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/226535942f677a9865d4a3f7b723d7a5-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"226535942f677a9865d4a3f7b723d7a5\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:56.880523 kubelet[1722]: I0212 20:33:56.879881 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/226535942f677a9865d4a3f7b723d7a5-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"226535942f677a9865d4a3f7b723d7a5\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:56.880973 kubelet[1722]: I0212 20:33:56.879976 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f334eb734a780037807f245a867bc4fd-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"f334eb734a780037807f245a867bc4fd\") " pod="kube-system/kube-scheduler-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:56.880973 kubelet[1722]: I0212 20:33:56.880109 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3eb2ade3c24b788e5a5f919efb1e662f-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"3eb2ade3c24b788e5a5f919efb1e662f\") " pod="kube-system/kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:56.880973 kubelet[1722]: I0212 20:33:56.880200 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3eb2ade3c24b788e5a5f919efb1e662f-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"3eb2ade3c24b788e5a5f919efb1e662f\") " pod="kube-system/kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:56.880973 kubelet[1722]: I0212 20:33:56.880300 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3eb2ade3c24b788e5a5f919efb1e662f-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"3eb2ade3c24b788e5a5f919efb1e662f\") " pod="kube-system/kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:56.881226 kubelet[1722]: I0212 20:33:56.880365 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/226535942f677a9865d4a3f7b723d7a5-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"226535942f677a9865d4a3f7b723d7a5\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:56.976259 kubelet[1722]: E0212 20:33:56.976189 1722 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.128.0.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:57.099704 kubelet[1722]: I0212 20:33:57.099662 1722 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:57.100192 kubelet[1722]: E0212 20:33:57.100153 1722 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.29:6443/api/v1/nodes\": dial tcp 10.128.0.29:6443: connect: connection refused" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:57.116554 env[1134]: time="2024-02-12T20:33:57.116481222Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal,Uid:f334eb734a780037807f245a867bc4fd,Namespace:kube-system,Attempt:0,}" Feb 12 20:33:57.124440 env[1134]: time="2024-02-12T20:33:57.124365864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal,Uid:3eb2ade3c24b788e5a5f919efb1e662f,Namespace:kube-system,Attempt:0,}" Feb 12 20:33:57.143229 env[1134]: time="2024-02-12T20:33:57.142998087Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal,Uid:226535942f677a9865d4a3f7b723d7a5,Namespace:kube-system,Attempt:0,}" Feb 12 20:33:57.252481 kubelet[1722]: W0212 20:33:57.252302 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:57.252481 kubelet[1722]: E0212 20:33:57.252476 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.29:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:57.447017 kubelet[1722]: W0212 20:33:57.446785 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:57.447017 kubelet[1722]: E0212 20:33:57.446880 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.29:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:57.603290 kubelet[1722]: W0212 20:33:57.603191 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:57.603290 kubelet[1722]: E0212 20:33:57.603286 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.29:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:57.776959 kubelet[1722]: E0212 20:33:57.776842 1722 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.128.0.29:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:57.891611 kubelet[1722]: W0212 20:33:57.891518 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:57.891611 kubelet[1722]: E0212 20:33:57.891608 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.29:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:57.909505 kubelet[1722]: I0212 20:33:57.909455 1722 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:57.910141 kubelet[1722]: E0212 20:33:57.910108 1722 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.29:6443/api/v1/nodes\": dial tcp 10.128.0.29:6443: connect: connection refused" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:33:58.370448 kubelet[1722]: E0212 20:33:58.370391 1722 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.29:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.29:6443: connect: connection refused Feb 12 20:33:58.390609 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount78119780.mount: Deactivated successfully. Feb 12 20:33:58.402642 env[1134]: time="2024-02-12T20:33:58.402570197Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:58.405246 env[1134]: time="2024-02-12T20:33:58.405190984Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:58.406582 env[1134]: time="2024-02-12T20:33:58.406522019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:58.409523 env[1134]: time="2024-02-12T20:33:58.409469469Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:58.411638 env[1134]: time="2024-02-12T20:33:58.411559370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:58.412802 env[1134]: time="2024-02-12T20:33:58.412748976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:58.413942 env[1134]: time="2024-02-12T20:33:58.413881977Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:58.415929 env[1134]: time="2024-02-12T20:33:58.415861058Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:58.416930 env[1134]: time="2024-02-12T20:33:58.416872108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:58.419110 env[1134]: time="2024-02-12T20:33:58.419071089Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:58.420099 env[1134]: time="2024-02-12T20:33:58.420049916Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:58.421003 env[1134]: time="2024-02-12T20:33:58.420966968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:33:58.482416 env[1134]: time="2024-02-12T20:33:58.482313271Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:33:58.482787 env[1134]: time="2024-02-12T20:33:58.482726428Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:33:58.483148 env[1134]: time="2024-02-12T20:33:58.483045752Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:33:58.483728 env[1134]: time="2024-02-12T20:33:58.483678409Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe962c3604504298af3d7a5405836f4972dfb1428c25bb939a983a29f339fc4c pid=1797 runtime=io.containerd.runc.v2 Feb 12 20:33:58.484030 env[1134]: time="2024-02-12T20:33:58.483940864Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:33:58.484144 env[1134]: time="2024-02-12T20:33:58.484038592Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:33:58.484144 env[1134]: time="2024-02-12T20:33:58.484080571Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:33:58.484323 env[1134]: time="2024-02-12T20:33:58.484272565Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8683ccf3261acd2070bbe09a16e38473eb42ea28df714a51c83a01dd127e862d pid=1810 runtime=io.containerd.runc.v2 Feb 12 20:33:58.504981 env[1134]: time="2024-02-12T20:33:58.504827784Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:33:58.505366 env[1134]: time="2024-02-12T20:33:58.505296430Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:33:58.505564 env[1134]: time="2024-02-12T20:33:58.505514286Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:33:58.506018 env[1134]: time="2024-02-12T20:33:58.505954444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/deec9a0804aed226ece68bc0ce57b011c147fce1a62c269412a6f2445ff6fed1 pid=1830 runtime=io.containerd.runc.v2 Feb 12 20:33:58.524075 systemd[1]: Started cri-containerd-fe962c3604504298af3d7a5405836f4972dfb1428c25bb939a983a29f339fc4c.scope. Feb 12 20:33:58.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.559000 audit: BPF prog-id=70 op=LOAD Feb 12 20:33:58.562000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.562000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1797 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665393632633336303435303432393861663364376135343035383336 Feb 12 20:33:58.562000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.562000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1797 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665393632633336303435303432393861663364376135343035383336 Feb 12 20:33:58.563000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.563000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.563000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.563000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.563000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.563000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.563000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.563000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.563000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.563000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.563000 audit: BPF prog-id=71 op=LOAD Feb 12 20:33:58.563000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000356c80 items=0 ppid=1797 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665393632633336303435303432393861663364376135343035383336 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit: BPF prog-id=72 op=LOAD Feb 12 20:33:58.566000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000356cc8 items=0 ppid=1797 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665393632633336303435303432393861663364376135343035383336 Feb 12 20:33:58.566000 audit: BPF prog-id=72 op=UNLOAD Feb 12 20:33:58.566000 audit: BPF prog-id=71 op=UNLOAD Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.566000 audit: BPF prog-id=73 op=LOAD Feb 12 20:33:58.566000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003570d8 items=0 ppid=1797 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665393632633336303435303432393861663364376135343035383336 Feb 12 20:33:58.571219 systemd[1]: Started cri-containerd-8683ccf3261acd2070bbe09a16e38473eb42ea28df714a51c83a01dd127e862d.scope. Feb 12 20:33:58.592053 systemd[1]: Started cri-containerd-deec9a0804aed226ece68bc0ce57b011c147fce1a62c269412a6f2445ff6fed1.scope. Feb 12 20:33:58.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.622000 audit: BPF prog-id=74 op=LOAD Feb 12 20:33:58.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1810 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383363636633323631616364323037306262653039613136653338 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1810 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383363636633323631616364323037306262653039613136653338 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit: BPF prog-id=75 op=LOAD Feb 12 20:33:58.630000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000972e0 items=0 ppid=1810 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383363636633323631616364323037306262653039613136653338 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.630000 audit: BPF prog-id=76 op=LOAD Feb 12 20:33:58.630000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000097328 items=0 ppid=1810 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383363636633323631616364323037306262653039613136653338 Feb 12 20:33:58.631000 audit: BPF prog-id=76 op=UNLOAD Feb 12 20:33:58.631000 audit: BPF prog-id=75 op=UNLOAD Feb 12 20:33:58.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.631000 audit: BPF prog-id=77 op=LOAD Feb 12 20:33:58.631000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.631000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.631000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.631000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.631000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.631000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.631000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.631000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.631000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.631000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.631000 audit: BPF prog-id=78 op=LOAD Feb 12 20:33:58.631000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000097738 items=0 ppid=1810 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836383363636633323631616364323037306262653039613136653338 Feb 12 20:33:58.636000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.636000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1830 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656339613038303461656432323665636536386263306365353762 Feb 12 20:33:58.638000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.638000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1830 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656339613038303461656432323665636536386263306365353762 Feb 12 20:33:58.638000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.638000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.638000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.638000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.638000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.638000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.638000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.638000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.638000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.638000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.638000 audit: BPF prog-id=79 op=LOAD Feb 12 20:33:58.638000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000219520 items=0 ppid=1830 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656339613038303461656432323665636536386263306365353762 Feb 12 20:33:58.640000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.640000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.640000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.640000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.640000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.640000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.640000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.640000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.640000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.640000 audit: BPF prog-id=80 op=LOAD Feb 12 20:33:58.640000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000219568 items=0 ppid=1830 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656339613038303461656432323665636536386263306365353762 Feb 12 20:33:58.642000 audit: BPF prog-id=80 op=UNLOAD Feb 12 20:33:58.642000 audit: BPF prog-id=79 op=UNLOAD Feb 12 20:33:58.642000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.642000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.642000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.642000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.642000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.642000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.642000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.642000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.642000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.642000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.642000 audit: BPF prog-id=81 op=LOAD Feb 12 20:33:58.642000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000219978 items=0 ppid=1830 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465656339613038303461656432323665636536386263306365353762 Feb 12 20:33:58.706434 env[1134]: time="2024-02-12T20:33:58.704731435Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal,Uid:f334eb734a780037807f245a867bc4fd,Namespace:kube-system,Attempt:0,} returns sandbox id \"8683ccf3261acd2070bbe09a16e38473eb42ea28df714a51c83a01dd127e862d\"" Feb 12 20:33:58.714237 kubelet[1722]: E0212 20:33:58.714196 1722 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-21291" Feb 12 20:33:58.715872 env[1134]: time="2024-02-12T20:33:58.715817723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal,Uid:3eb2ade3c24b788e5a5f919efb1e662f,Namespace:kube-system,Attempt:0,} returns sandbox id \"fe962c3604504298af3d7a5405836f4972dfb1428c25bb939a983a29f339fc4c\"" Feb 12 20:33:58.718237 kubelet[1722]: E0212 20:33:58.718210 1722 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-21291" Feb 12 20:33:58.718363 env[1134]: time="2024-02-12T20:33:58.718252810Z" level=info msg="CreateContainer within sandbox \"8683ccf3261acd2070bbe09a16e38473eb42ea28df714a51c83a01dd127e862d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 20:33:58.720799 env[1134]: time="2024-02-12T20:33:58.720753265Z" level=info msg="CreateContainer within sandbox \"fe962c3604504298af3d7a5405836f4972dfb1428c25bb939a983a29f339fc4c\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 20:33:58.736476 env[1134]: time="2024-02-12T20:33:58.735961622Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal,Uid:226535942f677a9865d4a3f7b723d7a5,Namespace:kube-system,Attempt:0,} returns sandbox id \"deec9a0804aed226ece68bc0ce57b011c147fce1a62c269412a6f2445ff6fed1\"" Feb 12 20:33:58.738132 kubelet[1722]: E0212 20:33:58.738087 1722 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flat" Feb 12 20:33:58.740221 env[1134]: time="2024-02-12T20:33:58.740155589Z" level=info msg="CreateContainer within sandbox \"deec9a0804aed226ece68bc0ce57b011c147fce1a62c269412a6f2445ff6fed1\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 20:33:58.756241 env[1134]: time="2024-02-12T20:33:58.756159342Z" level=info msg="CreateContainer within sandbox \"8683ccf3261acd2070bbe09a16e38473eb42ea28df714a51c83a01dd127e862d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"331fd87c32e4f65eec4ea814121208cbf0da49378b76d775f8025575c91e5ef1\"" Feb 12 20:33:58.757522 env[1134]: time="2024-02-12T20:33:58.757454622Z" level=info msg="StartContainer for \"331fd87c32e4f65eec4ea814121208cbf0da49378b76d775f8025575c91e5ef1\"" Feb 12 20:33:58.763555 env[1134]: time="2024-02-12T20:33:58.763492200Z" level=info msg="CreateContainer within sandbox \"fe962c3604504298af3d7a5405836f4972dfb1428c25bb939a983a29f339fc4c\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"5fdc69294ce497470c17e78041bd4b5b657a52f67b145d317f8dd85bbeb752df\"" Feb 12 20:33:58.764235 env[1134]: time="2024-02-12T20:33:58.764178507Z" level=info msg="StartContainer for \"5fdc69294ce497470c17e78041bd4b5b657a52f67b145d317f8dd85bbeb752df\"" Feb 12 20:33:58.773679 env[1134]: time="2024-02-12T20:33:58.773606746Z" level=info msg="CreateContainer within sandbox \"deec9a0804aed226ece68bc0ce57b011c147fce1a62c269412a6f2445ff6fed1\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ca19f58d48598d72676e1c97969f3a4890a61beb5f17d5d62f830ba5effcacc9\"" Feb 12 20:33:58.774398 env[1134]: time="2024-02-12T20:33:58.774350044Z" level=info msg="StartContainer for \"ca19f58d48598d72676e1c97969f3a4890a61beb5f17d5d62f830ba5effcacc9\"" Feb 12 20:33:58.799858 systemd[1]: Started cri-containerd-331fd87c32e4f65eec4ea814121208cbf0da49378b76d775f8025575c91e5ef1.scope. Feb 12 20:33:58.828726 systemd[1]: Started cri-containerd-5fdc69294ce497470c17e78041bd4b5b657a52f67b145d317f8dd85bbeb752df.scope. Feb 12 20:33:58.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.836000 audit: BPF prog-id=82 op=LOAD Feb 12 20:33:58.837000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.837000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1810 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316664383763333265346636356565633465613831343132313230 Feb 12 20:33:58.838000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.838000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1810 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316664383763333265346636356565633465613831343132313230 Feb 12 20:33:58.839000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.839000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.839000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.839000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.839000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.839000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.839000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.839000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.839000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.839000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.839000 audit: BPF prog-id=83 op=LOAD Feb 12 20:33:58.839000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000313280 items=0 ppid=1810 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316664383763333265346636356565633465613831343132313230 Feb 12 20:33:58.840000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.840000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.840000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.840000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.840000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.840000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.840000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.840000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.840000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.840000 audit: BPF prog-id=84 op=LOAD Feb 12 20:33:58.840000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003132c8 items=0 ppid=1810 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316664383763333265346636356565633465613831343132313230 Feb 12 20:33:58.841000 audit: BPF prog-id=84 op=UNLOAD Feb 12 20:33:58.841000 audit: BPF prog-id=83 op=UNLOAD Feb 12 20:33:58.841000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.841000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.841000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.841000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.841000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.841000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.841000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.841000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.841000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.841000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.841000 audit: BPF prog-id=85 op=LOAD Feb 12 20:33:58.841000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003136d8 items=0 ppid=1810 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316664383763333265346636356565633465613831343132313230 Feb 12 20:33:58.868810 systemd[1]: Started cri-containerd-ca19f58d48598d72676e1c97969f3a4890a61beb5f17d5d62f830ba5effcacc9.scope. Feb 12 20:33:58.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.876000 audit: BPF prog-id=86 op=LOAD Feb 12 20:33:58.877000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.877000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=1797 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566646336393239346365343937343730633137653738303431626434 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=1797 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566646336393239346365343937343730633137653738303431626434 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit: BPF prog-id=87 op=LOAD Feb 12 20:33:58.878000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c00027f250 items=0 ppid=1797 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566646336393239346365343937343730633137653738303431626434 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit: BPF prog-id=88 op=LOAD Feb 12 20:33:58.878000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c00027f298 items=0 ppid=1797 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566646336393239346365343937343730633137653738303431626434 Feb 12 20:33:58.878000 audit: BPF prog-id=88 op=UNLOAD Feb 12 20:33:58.878000 audit: BPF prog-id=87 op=UNLOAD Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.878000 audit: BPF prog-id=89 op=LOAD Feb 12 20:33:58.878000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c00027f6a8 items=0 ppid=1797 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566646336393239346365343937343730633137653738303431626434 Feb 12 20:33:58.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.918000 audit: BPF prog-id=90 op=LOAD Feb 12 20:33:58.920000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.920000 audit[1951]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1830 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361313966353864343835393864373236373665316339373936396633 Feb 12 20:33:58.921000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.921000 audit[1951]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1830 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361313966353864343835393864373236373665316339373936396633 Feb 12 20:33:58.922000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.922000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.922000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.922000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.922000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.922000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.922000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.922000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.922000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.922000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.922000 audit: BPF prog-id=91 op=LOAD Feb 12 20:33:58.922000 audit[1951]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039c930 items=0 ppid=1830 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361313966353864343835393864373236373665316339373936396633 Feb 12 20:33:58.926000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.926000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.926000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.926000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.926000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.926000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.926000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.926000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.926000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.926000 audit: BPF prog-id=92 op=LOAD Feb 12 20:33:58.926000 audit[1951]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039c978 items=0 ppid=1830 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361313966353864343835393864373236373665316339373936396633 Feb 12 20:33:58.927000 audit: BPF prog-id=92 op=UNLOAD Feb 12 20:33:58.927000 audit: BPF prog-id=91 op=UNLOAD Feb 12 20:33:58.927000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.927000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.927000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.927000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.927000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.927000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.927000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.927000 audit[1951]: AVC avc: denied { perfmon } for pid=1951 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.927000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.927000 audit[1951]: AVC avc: denied { bpf } for pid=1951 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:33:58.927000 audit: BPF prog-id=93 op=LOAD Feb 12 20:33:58.927000 audit[1951]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039cd88 items=0 ppid=1830 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:33:58.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361313966353864343835393864373236373665316339373936396633 Feb 12 20:33:58.972235 env[1134]: time="2024-02-12T20:33:58.972159863Z" level=info msg="StartContainer for \"331fd87c32e4f65eec4ea814121208cbf0da49378b76d775f8025575c91e5ef1\" returns successfully" Feb 12 20:33:58.993930 env[1134]: time="2024-02-12T20:33:58.992395624Z" level=info msg="StartContainer for \"5fdc69294ce497470c17e78041bd4b5b657a52f67b145d317f8dd85bbeb752df\" returns successfully" Feb 12 20:33:59.005238 env[1134]: time="2024-02-12T20:33:59.005168787Z" level=info msg="StartContainer for \"ca19f58d48598d72676e1c97969f3a4890a61beb5f17d5d62f830ba5effcacc9\" returns successfully" Feb 12 20:33:59.514973 kubelet[1722]: I0212 20:33:59.514933 1722 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:01.719764 update_engine[1119]: I0212 20:34:01.718999 1119 update_attempter.cc:509] Updating boot flags... Feb 12 20:34:02.303000 kernel: kauditd_printk_skb: 620 callbacks suppressed Feb 12 20:34:02.303276 kernel: audit: type=1400 audit(1707770042.273:743): avc: denied { watch } for pid=1984 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6524 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:02.273000 audit[1984]: AVC avc: denied { watch } for pid=1984 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6524 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:02.273000 audit[1984]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004942d0 a2=fc6 a3=0 items=0 ppid=1830 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 key=(null) Feb 12 20:34:02.344246 kernel: audit: type=1300 audit(1707770042.273:743): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004942d0 a2=fc6 a3=0 items=0 ppid=1830 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 key=(null) Feb 12 20:34:02.273000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:02.399205 kernel: audit: type=1327 audit(1707770042.273:743): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:02.399449 kernel: audit: type=1400 audit(1707770042.305:744): avc: denied { watch } for pid=1984 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:02.305000 audit[1984]: AVC avc: denied { watch } for pid=1984 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:02.305000 audit[1984]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0000e0b20 a2=fc6 a3=0 items=0 ppid=1830 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 key=(null) Feb 12 20:34:02.434387 kernel: audit: type=1300 audit(1707770042.305:744): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0000e0b20 a2=fc6 a3=0 items=0 ppid=1830 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 key=(null) Feb 12 20:34:02.305000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:02.465927 kernel: audit: type=1327 audit(1707770042.305:744): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:03.416000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6524 scontext=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:03.446134 kernel: audit: type=1400 audit(1707770043.416:745): avc: denied { watch } for pid=1975 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6524 scontext=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:03.416000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c006e60000 a2=fc6 a3=0 items=0 ppid=1797 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 key=(null) Feb 12 20:34:03.485917 kernel: audit: type=1300 audit(1707770043.416:745): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c006e60000 a2=fc6 a3=0 items=0 ppid=1797 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 key=(null) Feb 12 20:34:03.416000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:34:03.523996 kernel: audit: type=1327 audit(1707770043.416:745): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:34:03.416000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:03.558086 kernel: audit: type=1400 audit(1707770043.416:746): avc: denied { watch } for pid=1975 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:03.416000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0026de0c0 a2=fc6 a3=0 items=0 ppid=1797 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 key=(null) Feb 12 20:34:03.416000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:34:03.417000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6520 scontext=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:03.417000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c006e60120 a2=fc6 a3=0 items=0 ppid=1797 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 key=(null) Feb 12 20:34:03.417000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:34:03.486000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6526 scontext=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:03.486000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=56 a1=c00b8f3020 a2=fc6 a3=0 items=0 ppid=1797 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 key=(null) Feb 12 20:34:03.486000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:34:03.529000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:03.529000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c002b04ba0 a2=fc6 a3=0 items=0 ppid=1797 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 key=(null) Feb 12 20:34:03.529000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:34:03.532000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6524 scontext=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:03.532000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00ba0d560 a2=fc6 a3=0 items=0 ppid=1797 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c488,c678 key=(null) Feb 12 20:34:03.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:34:03.862378 kubelet[1722]: E0212 20:34:03.862310 1722 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" not found" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:03.910915 kubelet[1722]: I0212 20:34:03.910841 1722 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:03.939960 kubelet[1722]: E0212 20:34:03.939804 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal.17b337ccc7622a6b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", UID:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 361505387, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 361505387, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:34:04.070574 kubelet[1722]: E0212 20:34:04.070382 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal.17b337ccc7f271ed", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", UID:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 370960877, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 370960877, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:34:04.147902 kubelet[1722]: E0212 20:34:04.147618 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal.17b337cccb5112b4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", UID:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 427494068, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 427494068, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:34:04.226034 kubelet[1722]: E0212 20:34:04.225837 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal.17b337cccb51335c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", UID:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 427502428, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 427502428, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:34:04.286472 kubelet[1722]: E0212 20:34:04.286245 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal.17b337cccb514256", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", UID:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 427506262, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 427506262, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:34:04.345376 kubelet[1722]: E0212 20:34:04.345188 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal.17b337cccb5112b4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", UID:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 427494068, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 478411735, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:34:04.374952 kubelet[1722]: I0212 20:34:04.374863 1722 apiserver.go:52] "Watching apiserver" Feb 12 20:34:04.405689 kubelet[1722]: E0212 20:34:04.405363 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal.17b337cccb51335c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", UID:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 427502428, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 478418484, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:34:04.467778 kubelet[1722]: E0212 20:34:04.467583 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal.17b337cccb514256", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", UID:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 427506262, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 478421754, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:34:04.476501 kubelet[1722]: I0212 20:34:04.476418 1722 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 20:34:04.490396 kubelet[1722]: I0212 20:34:04.490336 1722 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:34:04.525206 kubelet[1722]: E0212 20:34:04.525002 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal.17b337ccdb01ccc4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", UID:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 690734276, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 690734276, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:34:04.599100 kubelet[1722]: E0212 20:34:04.598870 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal.17b337cccb5112b4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", UID:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 427494068, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 692353029, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:34:04.995332 kubelet[1722]: E0212 20:34:04.995164 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal.17b337cccb51335c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", UID:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 427502428, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 33, 56, 692360972, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:34:06.166558 systemd[1]: Reloading. Feb 12 20:34:06.302757 /usr/lib/systemd/system-generators/torcx-generator[2070]: time="2024-02-12T20:34:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:34:06.304421 /usr/lib/systemd/system-generators/torcx-generator[2070]: time="2024-02-12T20:34:06Z" level=info msg="torcx already run" Feb 12 20:34:06.410924 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:34:06.411246 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:34:06.436637 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:34:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.547000 audit: BPF prog-id=94 op=LOAD Feb 12 20:34:06.547000 audit: BPF prog-id=82 op=UNLOAD Feb 12 20:34:06.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.550000 audit: BPF prog-id=95 op=LOAD Feb 12 20:34:06.550000 audit: BPF prog-id=55 op=UNLOAD Feb 12 20:34:06.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.551000 audit: BPF prog-id=96 op=LOAD Feb 12 20:34:06.551000 audit: BPF prog-id=56 op=UNLOAD Feb 12 20:34:06.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.553000 audit: BPF prog-id=97 op=LOAD Feb 12 20:34:06.553000 audit: BPF prog-id=86 op=UNLOAD Feb 12 20:34:06.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.555000 audit: BPF prog-id=98 op=LOAD Feb 12 20:34:06.555000 audit: BPF prog-id=90 op=UNLOAD Feb 12 20:34:06.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.556000 audit: BPF prog-id=99 op=LOAD Feb 12 20:34:06.556000 audit: BPF prog-id=77 op=UNLOAD Feb 12 20:34:06.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.560000 audit: BPF prog-id=100 op=LOAD Feb 12 20:34:06.560000 audit: BPF prog-id=74 op=UNLOAD Feb 12 20:34:06.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.562000 audit: BPF prog-id=101 op=LOAD Feb 12 20:34:06.562000 audit: BPF prog-id=57 op=UNLOAD Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit: BPF prog-id=102 op=LOAD Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit: BPF prog-id=103 op=LOAD Feb 12 20:34:06.563000 audit: BPF prog-id=58 op=UNLOAD Feb 12 20:34:06.563000 audit: BPF prog-id=59 op=UNLOAD Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.563000 audit: BPF prog-id=104 op=LOAD Feb 12 20:34:06.564000 audit: BPF prog-id=70 op=UNLOAD Feb 12 20:34:06.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.566000 audit: BPF prog-id=105 op=LOAD Feb 12 20:34:06.566000 audit: BPF prog-id=60 op=UNLOAD Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit: BPF prog-id=106 op=LOAD Feb 12 20:34:06.568000 audit: BPF prog-id=61 op=UNLOAD Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit: BPF prog-id=107 op=LOAD Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.568000 audit: BPF prog-id=108 op=LOAD Feb 12 20:34:06.568000 audit: BPF prog-id=62 op=UNLOAD Feb 12 20:34:06.568000 audit: BPF prog-id=63 op=UNLOAD Feb 12 20:34:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.570000 audit: BPF prog-id=109 op=LOAD Feb 12 20:34:06.570000 audit: BPF prog-id=64 op=UNLOAD Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit: BPF prog-id=110 op=LOAD Feb 12 20:34:06.572000 audit: BPF prog-id=65 op=UNLOAD Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit: BPF prog-id=111 op=LOAD Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit: BPF prog-id=112 op=LOAD Feb 12 20:34:06.573000 audit: BPF prog-id=66 op=UNLOAD Feb 12 20:34:06.573000 audit: BPF prog-id=67 op=UNLOAD Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.574000 audit: BPF prog-id=113 op=LOAD Feb 12 20:34:06.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.574000 audit: BPF prog-id=114 op=LOAD Feb 12 20:34:06.574000 audit: BPF prog-id=68 op=UNLOAD Feb 12 20:34:06.574000 audit: BPF prog-id=69 op=UNLOAD Feb 12 20:34:06.599512 systemd[1]: Stopping kubelet.service... Feb 12 20:34:06.620667 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 20:34:06.621013 systemd[1]: Stopped kubelet.service. Feb 12 20:34:06.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:06.621132 systemd[1]: kubelet.service: Consumed 1.899s CPU time. Feb 12 20:34:06.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:06.624326 systemd[1]: Started kubelet.service. Feb 12 20:34:06.756404 kubelet[2113]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:34:06.756404 kubelet[2113]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:34:06.757228 kubelet[2113]: I0212 20:34:06.756498 2113 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:34:06.759316 kubelet[2113]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:34:06.759316 kubelet[2113]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:34:06.767057 kubelet[2113]: I0212 20:34:06.767003 2113 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 20:34:06.767057 kubelet[2113]: I0212 20:34:06.767057 2113 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:34:06.767420 kubelet[2113]: I0212 20:34:06.767379 2113 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 20:34:06.770154 kubelet[2113]: I0212 20:34:06.770124 2113 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 20:34:06.776079 kubelet[2113]: I0212 20:34:06.776044 2113 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:34:06.779480 kubelet[2113]: I0212 20:34:06.779442 2113 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:34:06.779797 kubelet[2113]: I0212 20:34:06.779752 2113 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:34:06.779954 kubelet[2113]: I0212 20:34:06.779868 2113 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:34:06.779954 kubelet[2113]: I0212 20:34:06.779941 2113 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:34:06.780161 kubelet[2113]: I0212 20:34:06.779962 2113 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 20:34:06.780161 kubelet[2113]: I0212 20:34:06.780022 2113 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:34:06.785123 kubelet[2113]: I0212 20:34:06.785080 2113 kubelet.go:398] "Attempting to sync node with API server" Feb 12 20:34:06.785123 kubelet[2113]: I0212 20:34:06.785112 2113 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:34:06.785379 kubelet[2113]: I0212 20:34:06.785142 2113 kubelet.go:297] "Adding apiserver pod source" Feb 12 20:34:06.785379 kubelet[2113]: I0212 20:34:06.785167 2113 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:34:06.786509 kubelet[2113]: I0212 20:34:06.786487 2113 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:34:06.817000 audit[2113]: AVC avc: denied { mac_admin } for pid=2113 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.817000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:34:06.817000 audit[2113]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008f3ec0 a1=c000fbc168 a2=c0008f3e90 a3=25 items=0 ppid=1 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:06.817000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:34:06.817000 audit[2113]: AVC avc: denied { mac_admin } for pid=2113 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:06.817000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:34:06.817000 audit[2113]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fa21e0 a1=c000fbc180 a2=c0008f3f50 a3=25 items=0 ppid=1 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:06.817000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:34:06.819768 kubelet[2113]: I0212 20:34:06.815225 2113 server.go:1186] "Started kubelet" Feb 12 20:34:06.819768 kubelet[2113]: I0212 20:34:06.818114 2113 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:34:06.819768 kubelet[2113]: I0212 20:34:06.818181 2113 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:34:06.819768 kubelet[2113]: I0212 20:34:06.818233 2113 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:34:06.831849 kubelet[2113]: I0212 20:34:06.823397 2113 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:34:06.847253 kubelet[2113]: I0212 20:34:06.844247 2113 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 20:34:06.847253 kubelet[2113]: I0212 20:34:06.844447 2113 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 20:34:06.847253 kubelet[2113]: I0212 20:34:06.844808 2113 server.go:451] "Adding debug handlers to kubelet server" Feb 12 20:34:06.850660 kubelet[2113]: E0212 20:34:06.850630 2113 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:34:06.850949 kubelet[2113]: E0212 20:34:06.850875 2113 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:34:06.883039 kubelet[2113]: I0212 20:34:06.882994 2113 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:34:06.919260 kubelet[2113]: I0212 20:34:06.919218 2113 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:34:06.919533 kubelet[2113]: I0212 20:34:06.919513 2113 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 20:34:06.919691 kubelet[2113]: I0212 20:34:06.919677 2113 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 20:34:06.919857 kubelet[2113]: E0212 20:34:06.919842 2113 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 20:34:06.963284 kubelet[2113]: I0212 20:34:06.963249 2113 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:07.007418 kubelet[2113]: I0212 20:34:07.007257 2113 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:07.007921 kubelet[2113]: I0212 20:34:07.007871 2113 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:07.028214 kubelet[2113]: E0212 20:34:07.028171 2113 kubelet.go:2137] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 12 20:34:07.073744 kubelet[2113]: I0212 20:34:07.073704 2113 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:34:07.074096 kubelet[2113]: I0212 20:34:07.074078 2113 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:34:07.074231 kubelet[2113]: I0212 20:34:07.074217 2113 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:34:07.074541 kubelet[2113]: I0212 20:34:07.074522 2113 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 20:34:07.074693 kubelet[2113]: I0212 20:34:07.074679 2113 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 20:34:07.074796 kubelet[2113]: I0212 20:34:07.074783 2113 policy_none.go:49] "None policy: Start" Feb 12 20:34:07.075869 kubelet[2113]: I0212 20:34:07.075847 2113 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:34:07.076223 kubelet[2113]: I0212 20:34:07.076207 2113 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:34:07.076546 kubelet[2113]: I0212 20:34:07.076529 2113 state_mem.go:75] "Updated machine memory state" Feb 12 20:34:07.084745 kubelet[2113]: I0212 20:34:07.084722 2113 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:34:07.084000 audit[2113]: AVC avc: denied { mac_admin } for pid=2113 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:07.084000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:34:07.084000 audit[2113]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0014dec60 a1=c000fbd158 a2=c0014dec30 a3=25 items=0 ppid=1 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:07.084000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:34:07.088120 kubelet[2113]: I0212 20:34:07.088093 2113 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:34:07.089061 kubelet[2113]: I0212 20:34:07.089041 2113 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:34:07.229721 kubelet[2113]: I0212 20:34:07.229662 2113 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:34:07.230161 kubelet[2113]: I0212 20:34:07.230140 2113 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:34:07.230349 kubelet[2113]: I0212 20:34:07.230334 2113 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:34:07.270594 kubelet[2113]: I0212 20:34:07.270426 2113 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3eb2ade3c24b788e5a5f919efb1e662f-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"3eb2ade3c24b788e5a5f919efb1e662f\") " pod="kube-system/kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:07.270940 kubelet[2113]: I0212 20:34:07.270918 2113 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3eb2ade3c24b788e5a5f919efb1e662f-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"3eb2ade3c24b788e5a5f919efb1e662f\") " pod="kube-system/kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:07.271168 kubelet[2113]: I0212 20:34:07.271142 2113 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/226535942f677a9865d4a3f7b723d7a5-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"226535942f677a9865d4a3f7b723d7a5\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:07.271511 kubelet[2113]: I0212 20:34:07.271488 2113 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f334eb734a780037807f245a867bc4fd-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"f334eb734a780037807f245a867bc4fd\") " pod="kube-system/kube-scheduler-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:07.271794 kubelet[2113]: I0212 20:34:07.271778 2113 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/226535942f677a9865d4a3f7b723d7a5-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"226535942f677a9865d4a3f7b723d7a5\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:07.272087 kubelet[2113]: I0212 20:34:07.272060 2113 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/226535942f677a9865d4a3f7b723d7a5-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"226535942f677a9865d4a3f7b723d7a5\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:07.272334 kubelet[2113]: I0212 20:34:07.272313 2113 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/226535942f677a9865d4a3f7b723d7a5-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"226535942f677a9865d4a3f7b723d7a5\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:07.272573 kubelet[2113]: I0212 20:34:07.272559 2113 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/226535942f677a9865d4a3f7b723d7a5-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"226535942f677a9865d4a3f7b723d7a5\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:07.272790 kubelet[2113]: I0212 20:34:07.272776 2113 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3eb2ade3c24b788e5a5f919efb1e662f-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" (UID: \"3eb2ade3c24b788e5a5f919efb1e662f\") " pod="kube-system/kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:07.802125 kubelet[2113]: I0212 20:34:07.802067 2113 apiserver.go:52] "Watching apiserver" Feb 12 20:34:07.845708 kubelet[2113]: I0212 20:34:07.845632 2113 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 20:34:07.877491 kubelet[2113]: I0212 20:34:07.877431 2113 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:34:08.281282 kubelet[2113]: E0212 20:34:08.281225 2113 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:08.444673 kubelet[2113]: E0212 20:34:08.444620 2113 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:08.645940 kubelet[2113]: E0212 20:34:08.645715 2113 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" Feb 12 20:34:08.783000 audit[1984]: AVC avc: denied { watch } for pid=1984 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6551 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 20:34:08.817534 kernel: kauditd_printk_skb: 272 callbacks suppressed Feb 12 20:34:08.817785 kernel: audit: type=1400 audit(1707770048.783:1000): avc: denied { watch } for pid=1984 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6551 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 20:34:08.783000 audit[1984]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00034d400 a2=fc6 a3=0 items=0 ppid=1830 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 key=(null) Feb 12 20:34:08.874934 kernel: audit: type=1300 audit(1707770048.783:1000): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00034d400 a2=fc6 a3=0 items=0 ppid=1830 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 key=(null) Feb 12 20:34:08.783000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:08.925921 kernel: audit: type=1327 audit(1707770048.783:1000): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:09.215363 kubelet[2113]: I0212 20:34:09.215304 2113 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" podStartSLOduration=2.215135376 pod.CreationTimestamp="2024-02-12 20:34:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:34:09.027816997 +0000 UTC m=+2.391946899" watchObservedRunningTime="2024-02-12 20:34:09.215135376 +0000 UTC m=+2.579265282" Feb 12 20:34:09.630258 kubelet[2113]: I0212 20:34:09.630091 2113 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" podStartSLOduration=2.630009903 pod.CreationTimestamp="2024-02-12 20:34:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:34:09.215798594 +0000 UTC m=+2.579928499" watchObservedRunningTime="2024-02-12 20:34:09.630009903 +0000 UTC m=+2.994139816" Feb 12 20:34:10.007192 sudo[1349]: pam_unix(sudo:session): session closed for user root Feb 12 20:34:10.006000 audit[1349]: USER_END pid=1349 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:10.034930 kernel: audit: type=1106 audit(1707770050.006:1001): pid=1349 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:10.006000 audit[1349]: CRED_DISP pid=1349 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:10.059929 kernel: audit: type=1104 audit(1707770050.006:1002): pid=1349 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:10.080430 sshd[1346]: pam_unix(sshd:session): session closed for user core Feb 12 20:34:10.081000 audit[1346]: USER_END pid=1346 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:10.115932 kernel: audit: type=1106 audit(1707770050.081:1003): pid=1346 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:10.119044 systemd[1]: sshd@8-10.128.0.29:22-147.75.109.163:39932.service: Deactivated successfully. Feb 12 20:34:10.120432 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 20:34:10.120706 systemd[1]: session-9.scope: Consumed 4.987s CPU time. Feb 12 20:34:10.123208 systemd-logind[1117]: Session 9 logged out. Waiting for processes to exit. Feb 12 20:34:10.125721 systemd-logind[1117]: Removed session 9. Feb 12 20:34:10.081000 audit[1346]: CRED_DISP pid=1346 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:10.153964 kernel: audit: type=1104 audit(1707770050.081:1004): pid=1346 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:10.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.29:22-147.75.109.163:39932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:10.183922 kernel: audit: type=1131 audit(1707770050.118:1005): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.29:22-147.75.109.163:39932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:10.838325 kubelet[2113]: I0212 20:34:10.838268 2113 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-2-a5dd6232feacf56eba7c.c.flatcar-212911.internal" podStartSLOduration=3.838211903 pod.CreationTimestamp="2024-02-12 20:34:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:34:09.630388239 +0000 UTC m=+2.994518145" watchObservedRunningTime="2024-02-12 20:34:10.838211903 +0000 UTC m=+4.202341813" Feb 12 20:34:10.998000 audit[1984]: AVC avc: denied { watch } for pid=1984 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:10.998000 audit[1984]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f2a6c0 a2=fc6 a3=0 items=0 ppid=1830 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 key=(null) Feb 12 20:34:11.061114 kernel: audit: type=1400 audit(1707770050.998:1006): avc: denied { watch } for pid=1984 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:11.061340 kernel: audit: type=1300 audit(1707770050.998:1006): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f2a6c0 a2=fc6 a3=0 items=0 ppid=1830 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 key=(null) Feb 12 20:34:10.998000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:11.005000 audit[1984]: AVC avc: denied { watch } for pid=1984 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:11.005000 audit[1984]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f2a800 a2=fc6 a3=0 items=0 ppid=1830 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 key=(null) Feb 12 20:34:11.005000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:11.005000 audit[1984]: AVC avc: denied { watch } for pid=1984 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:11.005000 audit[1984]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f2a940 a2=fc6 a3=0 items=0 ppid=1830 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 key=(null) Feb 12 20:34:11.005000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:11.005000 audit[1984]: AVC avc: denied { watch } for pid=1984 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6518 scontext=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:11.005000 audit[1984]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011ae360 a2=fc6 a3=0 items=0 ppid=1830 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c330,c745 key=(null) Feb 12 20:34:11.005000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269