Feb 9 09:54:04.068226 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 09:54:04.068245 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 08:56:26 -00 2024 Feb 9 09:54:04.068253 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 9 09:54:04.068260 kernel: printk: bootconsole [pl11] enabled Feb 9 09:54:04.068265 kernel: efi: EFI v2.70 by EDK II Feb 9 09:54:04.068271 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 9 09:54:04.068297 kernel: random: crng init done Feb 9 09:54:04.068303 kernel: ACPI: Early table checksum verification disabled Feb 9 09:54:04.068308 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 9 09:54:04.068313 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:04.068319 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:04.068326 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 09:54:04.068331 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:04.068336 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:04.068343 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:04.068349 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:04.068355 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:04.068362 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:04.068367 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 9 09:54:04.068373 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:54:04.068379 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 9 09:54:04.068384 kernel: NUMA: Failed to initialise from firmware Feb 9 09:54:04.068390 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 09:54:04.068396 kernel: NUMA: NODE_DATA [mem 0x1bf7f1900-0x1bf7f6fff] Feb 9 09:54:04.068401 kernel: Zone ranges: Feb 9 09:54:04.068407 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 9 09:54:04.068412 kernel: DMA32 empty Feb 9 09:54:04.068419 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 09:54:04.068425 kernel: Movable zone start for each node Feb 9 09:54:04.068430 kernel: Early memory node ranges Feb 9 09:54:04.068436 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 9 09:54:04.068442 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 9 09:54:04.068447 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 9 09:54:04.068453 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 9 09:54:04.068458 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 9 09:54:04.068464 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 9 09:54:04.068470 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 9 09:54:04.068475 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 9 09:54:04.068481 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 09:54:04.068488 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 09:54:04.068496 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 9 09:54:04.068502 kernel: psci: probing for conduit method from ACPI. Feb 9 09:54:04.068508 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 09:54:04.068515 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 09:54:04.068522 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 9 09:54:04.068527 kernel: psci: SMC Calling Convention v1.4 Feb 9 09:54:04.068533 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 9 09:54:04.068539 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 9 09:54:04.068546 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 09:54:04.068552 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 09:54:04.068558 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 09:54:04.068564 kernel: Detected PIPT I-cache on CPU0 Feb 9 09:54:04.068570 kernel: CPU features: detected: GIC system register CPU interface Feb 9 09:54:04.068576 kernel: CPU features: detected: Hardware dirty bit management Feb 9 09:54:04.068582 kernel: CPU features: detected: Spectre-BHB Feb 9 09:54:04.068588 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 09:54:04.068595 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 09:54:04.068601 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 09:54:04.068607 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 9 09:54:04.068613 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 9 09:54:04.068619 kernel: Policy zone: Normal Feb 9 09:54:04.068626 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 09:54:04.068633 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 09:54:04.068639 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 09:54:04.068645 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 09:54:04.068651 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 09:54:04.068658 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 9 09:54:04.068664 kernel: Memory: 3991932K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202228K reserved, 0K cma-reserved) Feb 9 09:54:04.068671 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 09:54:04.068677 kernel: trace event string verifier disabled Feb 9 09:54:04.068682 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 09:54:04.068689 kernel: rcu: RCU event tracing is enabled. Feb 9 09:54:04.068695 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 09:54:04.068702 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 09:54:04.068708 kernel: Tracing variant of Tasks RCU enabled. Feb 9 09:54:04.068714 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 09:54:04.068720 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 09:54:04.068727 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 09:54:04.068733 kernel: GICv3: 960 SPIs implemented Feb 9 09:54:04.068739 kernel: GICv3: 0 Extended SPIs implemented Feb 9 09:54:04.068745 kernel: GICv3: Distributor has no Range Selector support Feb 9 09:54:04.068751 kernel: Root IRQ handler: gic_handle_irq Feb 9 09:54:04.068757 kernel: GICv3: 16 PPIs implemented Feb 9 09:54:04.068763 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 9 09:54:04.068769 kernel: ITS: No ITS available, not enabling LPIs Feb 9 09:54:04.068775 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 09:54:04.068781 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 09:54:04.068788 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 09:54:04.068794 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 09:54:04.068801 kernel: Console: colour dummy device 80x25 Feb 9 09:54:04.068807 kernel: printk: console [tty1] enabled Feb 9 09:54:04.068813 kernel: ACPI: Core revision 20210730 Feb 9 09:54:04.068820 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 09:54:04.068826 kernel: pid_max: default: 32768 minimum: 301 Feb 9 09:54:04.068832 kernel: LSM: Security Framework initializing Feb 9 09:54:04.068839 kernel: SELinux: Initializing. Feb 9 09:54:04.068845 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 09:54:04.068852 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 09:54:04.068859 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 9 09:54:04.068865 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 9 09:54:04.068871 kernel: rcu: Hierarchical SRCU implementation. Feb 9 09:54:04.068878 kernel: Remapping and enabling EFI services. Feb 9 09:54:04.068884 kernel: smp: Bringing up secondary CPUs ... Feb 9 09:54:04.068890 kernel: Detected PIPT I-cache on CPU1 Feb 9 09:54:04.068897 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 9 09:54:04.068903 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 09:54:04.068909 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 09:54:04.068916 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 09:54:04.068923 kernel: SMP: Total of 2 processors activated. Feb 9 09:54:04.068929 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 09:54:04.068935 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 9 09:54:04.068942 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 09:54:04.068948 kernel: CPU features: detected: CRC32 instructions Feb 9 09:54:04.068954 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 09:54:04.068960 kernel: CPU features: detected: LSE atomic instructions Feb 9 09:54:04.068966 kernel: CPU features: detected: Privileged Access Never Feb 9 09:54:04.068974 kernel: CPU: All CPU(s) started at EL1 Feb 9 09:54:04.068980 kernel: alternatives: patching kernel code Feb 9 09:54:04.068990 kernel: devtmpfs: initialized Feb 9 09:54:04.068998 kernel: KASLR enabled Feb 9 09:54:04.069004 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 09:54:04.069011 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 09:54:04.069018 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 09:54:04.069024 kernel: SMBIOS 3.1.0 present. Feb 9 09:54:04.069031 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 09:54:04.069037 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 09:54:04.069045 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 09:54:04.069052 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 09:54:04.069059 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 09:54:04.069065 kernel: audit: initializing netlink subsys (disabled) Feb 9 09:54:04.069072 kernel: audit: type=2000 audit(0.085:1): state=initialized audit_enabled=0 res=1 Feb 9 09:54:04.069078 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 09:54:04.069085 kernel: cpuidle: using governor menu Feb 9 09:54:04.069092 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 09:54:04.069099 kernel: ASID allocator initialised with 32768 entries Feb 9 09:54:04.069105 kernel: ACPI: bus type PCI registered Feb 9 09:54:04.069112 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 09:54:04.069118 kernel: Serial: AMBA PL011 UART driver Feb 9 09:54:04.069125 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 09:54:04.069131 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 09:54:04.069138 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 09:54:04.069144 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 09:54:04.069152 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 09:54:04.069159 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 09:54:04.069165 kernel: ACPI: Added _OSI(Module Device) Feb 9 09:54:04.069171 kernel: ACPI: Added _OSI(Processor Device) Feb 9 09:54:04.069178 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 09:54:04.069184 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 09:54:04.069191 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 09:54:04.069197 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 09:54:04.069204 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 09:54:04.069211 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 09:54:04.069218 kernel: ACPI: Interpreter enabled Feb 9 09:54:04.069224 kernel: ACPI: Using GIC for interrupt routing Feb 9 09:54:04.069231 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 9 09:54:04.069237 kernel: printk: console [ttyAMA0] enabled Feb 9 09:54:04.069244 kernel: printk: bootconsole [pl11] disabled Feb 9 09:54:04.069250 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 9 09:54:04.069257 kernel: iommu: Default domain type: Translated Feb 9 09:54:04.069263 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 09:54:04.069282 kernel: vgaarb: loaded Feb 9 09:54:04.069289 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 09:54:04.069314 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 09:54:04.069320 kernel: PTP clock support registered Feb 9 09:54:04.069327 kernel: Registered efivars operations Feb 9 09:54:04.069333 kernel: No ACPI PMU IRQ for CPU0 Feb 9 09:54:04.069339 kernel: No ACPI PMU IRQ for CPU1 Feb 9 09:54:04.069346 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 09:54:04.069352 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 09:54:04.069360 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 09:54:04.069367 kernel: pnp: PnP ACPI init Feb 9 09:54:04.069373 kernel: pnp: PnP ACPI: found 0 devices Feb 9 09:54:04.069380 kernel: NET: Registered PF_INET protocol family Feb 9 09:54:04.069386 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 09:54:04.069393 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 09:54:04.069399 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 09:54:04.069406 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 09:54:04.069412 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 09:54:04.069420 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 09:54:04.069427 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 09:54:04.069433 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 09:54:04.069440 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 09:54:04.069446 kernel: PCI: CLS 0 bytes, default 64 Feb 9 09:54:04.069453 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 9 09:54:04.069459 kernel: kvm [1]: HYP mode not available Feb 9 09:54:04.069466 kernel: Initialise system trusted keyrings Feb 9 09:54:04.069472 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 09:54:04.069480 kernel: Key type asymmetric registered Feb 9 09:54:04.069487 kernel: Asymmetric key parser 'x509' registered Feb 9 09:54:04.069493 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 09:54:04.069499 kernel: io scheduler mq-deadline registered Feb 9 09:54:04.069506 kernel: io scheduler kyber registered Feb 9 09:54:04.069512 kernel: io scheduler bfq registered Feb 9 09:54:04.069519 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 09:54:04.069525 kernel: thunder_xcv, ver 1.0 Feb 9 09:54:04.069532 kernel: thunder_bgx, ver 1.0 Feb 9 09:54:04.069539 kernel: nicpf, ver 1.0 Feb 9 09:54:04.069545 kernel: nicvf, ver 1.0 Feb 9 09:54:04.069661 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 09:54:04.069720 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T09:54:03 UTC (1707472443) Feb 9 09:54:04.069729 kernel: efifb: probing for efifb Feb 9 09:54:04.069736 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 09:54:04.069743 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 09:54:04.069749 kernel: efifb: scrolling: redraw Feb 9 09:54:04.069758 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 09:54:04.069764 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 09:54:04.069771 kernel: fb0: EFI VGA frame buffer device Feb 9 09:54:04.069777 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 9 09:54:04.069784 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 09:54:04.069790 kernel: NET: Registered PF_INET6 protocol family Feb 9 09:54:04.069797 kernel: Segment Routing with IPv6 Feb 9 09:54:04.069804 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 09:54:04.069810 kernel: NET: Registered PF_PACKET protocol family Feb 9 09:54:04.069818 kernel: Key type dns_resolver registered Feb 9 09:54:04.069825 kernel: registered taskstats version 1 Feb 9 09:54:04.069831 kernel: Loading compiled-in X.509 certificates Feb 9 09:54:04.069838 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: ca91574208414224935c9cea513398977daf917d' Feb 9 09:54:04.069844 kernel: Key type .fscrypt registered Feb 9 09:54:04.069851 kernel: Key type fscrypt-provisioning registered Feb 9 09:54:04.069857 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 09:54:04.069864 kernel: ima: Allocated hash algorithm: sha1 Feb 9 09:54:04.069870 kernel: ima: No architecture policies found Feb 9 09:54:04.069878 kernel: Freeing unused kernel memory: 34688K Feb 9 09:54:04.069884 kernel: Run /init as init process Feb 9 09:54:04.069891 kernel: with arguments: Feb 9 09:54:04.069897 kernel: /init Feb 9 09:54:04.069903 kernel: with environment: Feb 9 09:54:04.069910 kernel: HOME=/ Feb 9 09:54:04.069916 kernel: TERM=linux Feb 9 09:54:04.069922 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 09:54:04.069931 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:54:04.069941 systemd[1]: Detected virtualization microsoft. Feb 9 09:54:04.069948 systemd[1]: Detected architecture arm64. Feb 9 09:54:04.069955 systemd[1]: Running in initrd. Feb 9 09:54:04.069962 systemd[1]: No hostname configured, using default hostname. Feb 9 09:54:04.069969 systemd[1]: Hostname set to . Feb 9 09:54:04.069976 systemd[1]: Initializing machine ID from random generator. Feb 9 09:54:04.069983 systemd[1]: Queued start job for default target initrd.target. Feb 9 09:54:04.069991 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:54:04.069998 systemd[1]: Reached target cryptsetup.target. Feb 9 09:54:04.070005 systemd[1]: Reached target paths.target. Feb 9 09:54:04.070012 systemd[1]: Reached target slices.target. Feb 9 09:54:04.070019 systemd[1]: Reached target swap.target. Feb 9 09:54:04.070026 systemd[1]: Reached target timers.target. Feb 9 09:54:04.070033 systemd[1]: Listening on iscsid.socket. Feb 9 09:54:04.070040 systemd[1]: Listening on iscsiuio.socket. Feb 9 09:54:04.070048 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 09:54:04.070055 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 09:54:04.070062 systemd[1]: Listening on systemd-journald.socket. Feb 9 09:54:04.070070 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:54:04.070077 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:54:04.070084 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:54:04.070091 systemd[1]: Reached target sockets.target. Feb 9 09:54:04.070098 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:54:04.070105 systemd[1]: Finished network-cleanup.service. Feb 9 09:54:04.070113 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 09:54:04.070120 systemd[1]: Starting systemd-journald.service... Feb 9 09:54:04.070127 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:54:04.070134 systemd[1]: Starting systemd-resolved.service... Feb 9 09:54:04.070144 systemd-journald[276]: Journal started Feb 9 09:54:04.070179 systemd-journald[276]: Runtime Journal (/run/log/journal/16955e6fa2a642b7aa7d98bb776d28c9) is 8.0M, max 78.6M, 70.6M free. Feb 9 09:54:04.066117 systemd-modules-load[277]: Inserted module 'overlay' Feb 9 09:54:04.095122 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 09:54:04.095144 kernel: Bridge firewalling registered Feb 9 09:54:04.099591 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 9 09:54:04.118748 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 09:54:04.123455 systemd-resolved[278]: Positive Trust Anchors: Feb 9 09:54:04.128710 kernel: SCSI subsystem initialized Feb 9 09:54:04.134016 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:54:04.178400 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 09:54:04.178421 kernel: device-mapper: uevent: version 1.0.3 Feb 9 09:54:04.178430 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 09:54:04.178438 systemd[1]: Started systemd-journald.service. Feb 9 09:54:04.134052 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:54:04.136207 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 9 09:54:04.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.177387 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 9 09:54:04.250051 systemd[1]: Started systemd-resolved.service. Feb 9 09:54:04.317938 kernel: audit: type=1130 audit(1707472444.223:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.317963 kernel: audit: type=1130 audit(1707472444.261:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.317973 kernel: audit: type=1130 audit(1707472444.286:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.261858 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:54:04.287005 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 09:54:04.349341 kernel: audit: type=1130 audit(1707472444.322:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.323097 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:54:04.385438 kernel: audit: type=1130 audit(1707472444.354:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.354789 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 09:54:04.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.391354 systemd[1]: Reached target nss-lookup.target. Feb 9 09:54:04.420706 kernel: audit: type=1130 audit(1707472444.390:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.421680 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 09:54:04.432936 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:54:04.448589 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 09:54:04.456290 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 09:54:04.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.488605 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:54:04.529051 kernel: audit: type=1130 audit(1707472444.472:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.529075 kernel: audit: type=1130 audit(1707472444.500:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.500628 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 09:54:04.562502 kernel: audit: type=1130 audit(1707472444.529:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.555465 systemd[1]: Starting dracut-cmdline.service... Feb 9 09:54:04.572021 dracut-cmdline[299]: dracut-dracut-053 Feb 9 09:54:04.577539 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 09:54:04.675315 kernel: Loading iSCSI transport class v2.0-870. Feb 9 09:54:04.687297 kernel: iscsi: registered transport (tcp) Feb 9 09:54:04.707488 kernel: iscsi: registered transport (qla4xxx) Feb 9 09:54:04.707505 kernel: QLogic iSCSI HBA Driver Feb 9 09:54:04.743022 systemd[1]: Finished dracut-cmdline.service. Feb 9 09:54:04.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:04.749501 systemd[1]: Starting dracut-pre-udev.service... Feb 9 09:54:04.805295 kernel: raid6: neonx8 gen() 13794 MB/s Feb 9 09:54:04.827285 kernel: raid6: neonx8 xor() 10815 MB/s Feb 9 09:54:04.848286 kernel: raid6: neonx4 gen() 13507 MB/s Feb 9 09:54:04.869286 kernel: raid6: neonx4 xor() 11276 MB/s Feb 9 09:54:04.891286 kernel: raid6: neonx2 gen() 12981 MB/s Feb 9 09:54:04.912297 kernel: raid6: neonx2 xor() 10231 MB/s Feb 9 09:54:04.933286 kernel: raid6: neonx1 gen() 10498 MB/s Feb 9 09:54:04.955285 kernel: raid6: neonx1 xor() 8789 MB/s Feb 9 09:54:04.975288 kernel: raid6: int64x8 gen() 6295 MB/s Feb 9 09:54:04.996288 kernel: raid6: int64x8 xor() 3543 MB/s Feb 9 09:54:05.018290 kernel: raid6: int64x4 gen() 7239 MB/s Feb 9 09:54:05.039285 kernel: raid6: int64x4 xor() 3848 MB/s Feb 9 09:54:05.060285 kernel: raid6: int64x2 gen() 6155 MB/s Feb 9 09:54:05.082286 kernel: raid6: int64x2 xor() 3325 MB/s Feb 9 09:54:05.103288 kernel: raid6: int64x1 gen() 5043 MB/s Feb 9 09:54:05.127620 kernel: raid6: int64x1 xor() 2646 MB/s Feb 9 09:54:05.127632 kernel: raid6: using algorithm neonx8 gen() 13794 MB/s Feb 9 09:54:05.127640 kernel: raid6: .... xor() 10815 MB/s, rmw enabled Feb 9 09:54:05.132149 kernel: raid6: using neon recovery algorithm Feb 9 09:54:05.151289 kernel: xor: measuring software checksum speed Feb 9 09:54:05.156284 kernel: 8regs : 17293 MB/sec Feb 9 09:54:05.165444 kernel: 32regs : 20744 MB/sec Feb 9 09:54:05.165454 kernel: arm64_neon : 27997 MB/sec Feb 9 09:54:05.165463 kernel: xor: using function: arm64_neon (27997 MB/sec) Feb 9 09:54:05.227292 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 09:54:05.237737 systemd[1]: Finished dracut-pre-udev.service. Feb 9 09:54:05.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:05.247000 audit: BPF prog-id=7 op=LOAD Feb 9 09:54:05.247000 audit: BPF prog-id=8 op=LOAD Feb 9 09:54:05.248088 systemd[1]: Starting systemd-udevd.service... Feb 9 09:54:05.267109 systemd-udevd[476]: Using default interface naming scheme 'v252'. Feb 9 09:54:05.274105 systemd[1]: Started systemd-udevd.service. Feb 9 09:54:05.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:05.284906 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 09:54:05.298593 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Feb 9 09:54:05.327202 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 09:54:05.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:05.333485 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:54:05.372401 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:54:05.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:05.430291 kernel: hv_vmbus: Vmbus version:5.3 Feb 9 09:54:05.440307 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 09:54:05.463295 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 9 09:54:05.463343 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 09:54:05.464291 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 9 09:54:05.477504 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 09:54:05.477539 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 09:54:05.492050 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 09:54:05.502917 kernel: scsi host1: storvsc_host_t Feb 9 09:54:05.503152 kernel: scsi host0: storvsc_host_t Feb 9 09:54:05.519372 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 09:54:05.519431 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 09:54:05.541833 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 09:54:05.542024 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 09:54:05.551298 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 09:54:05.551456 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 09:54:05.556381 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 09:54:05.556503 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 09:54:05.568759 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 09:54:05.568904 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 09:54:05.575287 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 09:54:05.580292 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 09:54:05.590357 kernel: hv_netvsc 002248b7-1232-0022-48b7-1232002248b7 eth0: VF slot 1 added Feb 9 09:54:05.601921 kernel: hv_vmbus: registering driver hv_pci Feb 9 09:54:05.611308 kernel: hv_pci d090954b-5ba8-44cf-9fad-ca6a7519817d: PCI VMBus probing: Using version 0x10004 Feb 9 09:54:05.630703 kernel: hv_pci d090954b-5ba8-44cf-9fad-ca6a7519817d: PCI host bridge to bus 5ba8:00 Feb 9 09:54:05.630910 kernel: pci_bus 5ba8:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 9 09:54:05.631009 kernel: pci_bus 5ba8:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 09:54:05.646755 kernel: pci 5ba8:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 9 09:54:05.661306 kernel: pci 5ba8:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 09:54:05.686432 kernel: pci 5ba8:00:02.0: enabling Extended Tags Feb 9 09:54:05.713294 kernel: pci 5ba8:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 5ba8:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 9 09:54:05.713515 kernel: pci_bus 5ba8:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 09:54:05.727469 kernel: pci 5ba8:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 09:54:05.769295 kernel: mlx5_core 5ba8:00:02.0: firmware version: 16.30.1284 Feb 9 09:54:05.930298 kernel: mlx5_core 5ba8:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 9 09:54:05.991010 kernel: hv_netvsc 002248b7-1232-0022-48b7-1232002248b7 eth0: VF registering: eth1 Feb 9 09:54:05.991186 kernel: mlx5_core 5ba8:00:02.0 eth1: joined to eth0 Feb 9 09:54:06.011291 kernel: mlx5_core 5ba8:00:02.0 enP23464s1: renamed from eth1 Feb 9 09:54:06.017796 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 09:54:06.049305 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (539) Feb 9 09:54:06.062360 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:54:06.198822 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 09:54:06.209390 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 09:54:06.225186 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 09:54:06.236944 systemd[1]: Starting disk-uuid.service... Feb 9 09:54:07.269302 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 09:54:07.269549 disk-uuid[600]: The operation has completed successfully. Feb 9 09:54:07.321695 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 09:54:07.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:07.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:07.321794 systemd[1]: Finished disk-uuid.service. Feb 9 09:54:07.341685 systemd[1]: Starting verity-setup.service... Feb 9 09:54:07.383303 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 09:54:07.598688 systemd[1]: Found device dev-mapper-usr.device. Feb 9 09:54:07.605210 systemd[1]: Mounting sysusr-usr.mount... Feb 9 09:54:07.619481 systemd[1]: Finished verity-setup.service. Feb 9 09:54:07.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:07.681063 systemd[1]: Mounted sysusr-usr.mount. Feb 9 09:54:07.690684 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 09:54:07.686301 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 09:54:07.687088 systemd[1]: Starting ignition-setup.service... Feb 9 09:54:07.710438 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 09:54:07.743864 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:54:07.743924 kernel: BTRFS info (device sda6): using free space tree Feb 9 09:54:07.749557 kernel: BTRFS info (device sda6): has skinny extents Feb 9 09:54:07.786969 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 09:54:07.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:07.798000 audit: BPF prog-id=9 op=LOAD Feb 9 09:54:07.799240 systemd[1]: Starting systemd-networkd.service... Feb 9 09:54:07.823491 systemd-networkd[867]: lo: Link UP Feb 9 09:54:07.823498 systemd-networkd[867]: lo: Gained carrier Feb 9 09:54:07.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:07.826605 systemd-networkd[867]: Enumeration completed Feb 9 09:54:07.827211 systemd[1]: Started systemd-networkd.service. Feb 9 09:54:07.835508 systemd-networkd[867]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:54:07.836354 systemd[1]: Reached target network.target. Feb 9 09:54:07.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:07.853091 systemd[1]: Starting iscsiuio.service... Feb 9 09:54:07.888575 iscsid[874]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:54:07.888575 iscsid[874]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 09:54:07.888575 iscsid[874]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 09:54:07.888575 iscsid[874]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 09:54:07.888575 iscsid[874]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 09:54:07.888575 iscsid[874]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:54:07.888575 iscsid[874]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 09:54:07.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:07.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:07.864312 systemd[1]: Started iscsiuio.service. Feb 9 09:54:07.883083 systemd[1]: Starting iscsid.service... Feb 9 09:54:08.066705 kernel: mlx5_core 5ba8:00:02.0 enP23464s1: Link up Feb 9 09:54:07.894747 systemd[1]: Started iscsid.service. Feb 9 09:54:07.910634 systemd[1]: Starting dracut-initqueue.service... Feb 9 09:54:08.123900 kernel: kauditd_printk_skb: 16 callbacks suppressed Feb 9 09:54:08.123928 kernel: audit: type=1130 audit(1707472448.078:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:08.123947 kernel: hv_netvsc 002248b7-1232-0022-48b7-1232002248b7 eth0: Data path switched to VF: enP23464s1 Feb 9 09:54:08.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:07.947035 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 09:54:07.974538 systemd[1]: Finished dracut-initqueue.service. Feb 9 09:54:08.142622 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:54:07.991465 systemd[1]: Reached target remote-fs-pre.target. Feb 9 09:54:08.017376 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:54:08.036145 systemd[1]: Reached target remote-fs.target. Feb 9 09:54:08.060227 systemd[1]: Starting dracut-pre-mount.service... Feb 9 09:54:08.067144 systemd[1]: Finished dracut-pre-mount.service. Feb 9 09:54:08.125072 systemd-networkd[867]: enP23464s1: Link UP Feb 9 09:54:08.125143 systemd-networkd[867]: eth0: Link UP Feb 9 09:54:08.149204 systemd-networkd[867]: eth0: Gained carrier Feb 9 09:54:08.162109 systemd-networkd[867]: enP23464s1: Gained carrier Feb 9 09:54:08.191366 systemd-networkd[867]: eth0: DHCPv4 address 10.200.20.39/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 09:54:08.213493 systemd[1]: Finished ignition-setup.service. Feb 9 09:54:08.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:08.255424 kernel: audit: type=1130 audit(1707472448.219:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:08.249760 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 09:54:09.793377 systemd-networkd[867]: eth0: Gained IPv6LL Feb 9 09:54:10.775248 ignition[894]: Ignition 2.14.0 Feb 9 09:54:10.776694 ignition[894]: Stage: fetch-offline Feb 9 09:54:10.776769 ignition[894]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:10.776799 ignition[894]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:10.853735 ignition[894]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:10.853889 ignition[894]: parsed url from cmdline: "" Feb 9 09:54:10.853893 ignition[894]: no config URL provided Feb 9 09:54:10.853899 ignition[894]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:54:10.908463 kernel: audit: type=1130 audit(1707472450.879:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:10.869880 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 09:54:10.853906 ignition[894]: no config at "/usr/lib/ignition/user.ign" Feb 9 09:54:10.881175 systemd[1]: Starting ignition-fetch.service... Feb 9 09:54:10.853912 ignition[894]: failed to fetch config: resource requires networking Feb 9 09:54:10.854218 ignition[894]: Ignition finished successfully Feb 9 09:54:10.911956 ignition[900]: Ignition 2.14.0 Feb 9 09:54:10.911962 ignition[900]: Stage: fetch Feb 9 09:54:10.912059 ignition[900]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:10.912076 ignition[900]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:10.915650 ignition[900]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:10.915839 ignition[900]: parsed url from cmdline: "" Feb 9 09:54:10.915843 ignition[900]: no config URL provided Feb 9 09:54:10.915848 ignition[900]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:54:10.915858 ignition[900]: no config at "/usr/lib/ignition/user.ign" Feb 9 09:54:10.915886 ignition[900]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 09:54:11.069557 ignition[900]: GET result: OK Feb 9 09:54:11.069642 ignition[900]: config has been read from IMDS userdata Feb 9 09:54:11.069702 ignition[900]: parsing config with SHA512: fed5d3dc2d8bc2b8f2415d3f341f5b4cba1f32329df654a7f6d66b59706cf673232831c1c165334df69e790320ae754d6afd652226182322404746abc783ddc7 Feb 9 09:54:11.102350 unknown[900]: fetched base config from "system" Feb 9 09:54:11.102361 unknown[900]: fetched base config from "system" Feb 9 09:54:11.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:11.102975 ignition[900]: fetch: fetch complete Feb 9 09:54:11.145094 kernel: audit: type=1130 audit(1707472451.111:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:11.102366 unknown[900]: fetched user config from "azure" Feb 9 09:54:11.102980 ignition[900]: fetch: fetch passed Feb 9 09:54:11.104378 systemd[1]: Finished ignition-fetch.service. Feb 9 09:54:11.186546 kernel: audit: type=1130 audit(1707472451.159:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:11.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:11.103016 ignition[900]: Ignition finished successfully Feb 9 09:54:11.134342 systemd[1]: Starting ignition-kargs.service... Feb 9 09:54:11.143989 ignition[905]: Ignition 2.14.0 Feb 9 09:54:11.155120 systemd[1]: Finished ignition-kargs.service. Feb 9 09:54:11.242642 kernel: audit: type=1130 audit(1707472451.208:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:11.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:11.143995 ignition[905]: Stage: kargs Feb 9 09:54:11.160906 systemd[1]: Starting ignition-disks.service... Feb 9 09:54:11.144101 ignition[905]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:11.203177 systemd[1]: Finished ignition-disks.service. Feb 9 09:54:11.144118 ignition[905]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:11.208605 systemd[1]: Reached target initrd-root-device.target. Feb 9 09:54:11.146721 ignition[905]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:11.237014 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:54:11.151898 ignition[905]: kargs: kargs passed Feb 9 09:54:11.243360 systemd[1]: Reached target local-fs.target. Feb 9 09:54:11.151952 ignition[905]: Ignition finished successfully Feb 9 09:54:11.255580 systemd[1]: Reached target sysinit.target. Feb 9 09:54:11.170523 ignition[911]: Ignition 2.14.0 Feb 9 09:54:11.264557 systemd[1]: Reached target basic.target. Feb 9 09:54:11.170530 ignition[911]: Stage: disks Feb 9 09:54:11.289462 systemd[1]: Starting systemd-fsck-root.service... Feb 9 09:54:11.170633 ignition[911]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:11.170654 ignition[911]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:11.174120 ignition[911]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:11.198795 ignition[911]: disks: disks passed Feb 9 09:54:11.198866 ignition[911]: Ignition finished successfully Feb 9 09:54:11.394172 systemd-fsck[919]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 9 09:54:11.409575 systemd[1]: Finished systemd-fsck-root.service. Feb 9 09:54:11.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:11.439852 systemd[1]: Mounting sysroot.mount... Feb 9 09:54:11.449477 kernel: audit: type=1130 audit(1707472451.414:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:11.469292 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 09:54:11.469876 systemd[1]: Mounted sysroot.mount. Feb 9 09:54:11.474907 systemd[1]: Reached target initrd-root-fs.target. Feb 9 09:54:11.508780 systemd[1]: Mounting sysroot-usr.mount... Feb 9 09:54:11.514035 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 09:54:11.521781 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 09:54:11.521823 systemd[1]: Reached target ignition-diskful.target. Feb 9 09:54:11.529220 systemd[1]: Mounted sysroot-usr.mount. Feb 9 09:54:11.566359 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:54:11.576455 systemd[1]: Starting initrd-setup-root.service... Feb 9 09:54:11.611305 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (930) Feb 9 09:54:11.625863 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:54:11.626235 kernel: BTRFS info (device sda6): using free space tree Feb 9 09:54:11.626249 initrd-setup-root[935]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 09:54:11.640321 kernel: BTRFS info (device sda6): has skinny extents Feb 9 09:54:11.646294 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:54:11.685417 initrd-setup-root[961]: cut: /sysroot/etc/group: No such file or directory Feb 9 09:54:11.695698 initrd-setup-root[969]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 09:54:11.707000 initrd-setup-root[977]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 09:54:12.064604 systemd[1]: Finished initrd-setup-root.service. Feb 9 09:54:12.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:12.071441 systemd[1]: Starting ignition-mount.service... Feb 9 09:54:12.104486 kernel: audit: type=1130 audit(1707472452.069:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:12.105433 systemd[1]: Starting sysroot-boot.service... Feb 9 09:54:12.113238 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 09:54:12.113367 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 09:54:12.147286 ignition[997]: INFO : Ignition 2.14.0 Feb 9 09:54:12.147286 ignition[997]: INFO : Stage: mount Feb 9 09:54:12.178356 kernel: audit: type=1130 audit(1707472452.159:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:12.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:12.178426 ignition[997]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:12.178426 ignition[997]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:12.178426 ignition[997]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:12.178426 ignition[997]: INFO : mount: mount passed Feb 9 09:54:12.178426 ignition[997]: INFO : Ignition finished successfully Feb 9 09:54:12.234364 kernel: audit: type=1130 audit(1707472452.179:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:12.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:12.151734 systemd[1]: Finished sysroot-boot.service. Feb 9 09:54:12.159555 systemd[1]: Finished ignition-mount.service. Feb 9 09:54:12.884466 coreos-metadata[929]: Feb 09 09:54:12.884 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 09:54:12.900921 coreos-metadata[929]: Feb 09 09:54:12.900 INFO Fetch successful Feb 9 09:54:12.933545 coreos-metadata[929]: Feb 09 09:54:12.933 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 09:54:12.962848 coreos-metadata[929]: Feb 09 09:54:12.962 INFO Fetch successful Feb 9 09:54:12.994440 coreos-metadata[929]: Feb 09 09:54:12.994 INFO wrote hostname ci-3510.3.2-a-f6c11093dc to /sysroot/etc/hostname Feb 9 09:54:13.005092 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 09:54:13.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:13.012472 systemd[1]: Starting ignition-files.service... Feb 9 09:54:13.030170 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:54:13.062177 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1008) Feb 9 09:54:13.062217 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:54:13.062236 kernel: BTRFS info (device sda6): using free space tree Feb 9 09:54:13.072237 kernel: BTRFS info (device sda6): has skinny extents Feb 9 09:54:13.077193 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:54:13.094765 ignition[1027]: INFO : Ignition 2.14.0 Feb 9 09:54:13.099716 ignition[1027]: INFO : Stage: files Feb 9 09:54:13.099716 ignition[1027]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:13.099716 ignition[1027]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:13.126473 ignition[1027]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:13.126473 ignition[1027]: DEBUG : files: compiled without relabeling support, skipping Feb 9 09:54:13.141623 ignition[1027]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 09:54:13.141623 ignition[1027]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 09:54:13.212804 ignition[1027]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 09:54:13.221870 ignition[1027]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 09:54:13.221870 ignition[1027]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 09:54:13.221820 unknown[1027]: wrote ssh authorized keys file for user: core Feb 9 09:54:13.245217 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 09:54:13.245217 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 9 09:54:13.694787 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 09:54:13.850610 ignition[1027]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 9 09:54:13.867880 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 09:54:13.867880 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 09:54:13.867880 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 09:54:14.173492 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 09:54:14.395113 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 09:54:14.407378 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 09:54:14.407378 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 9 09:54:14.760494 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 09:54:14.962389 ignition[1027]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 9 09:54:14.982307 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 09:54:14.982307 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 09:54:14.982307 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubectl: attempt #1 Feb 9 09:54:15.171728 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 09:54:15.460016 ignition[1027]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 3672fda0beebbbd636a2088f427463cbad32683ea4fbb1df61650552e63846b6a47db803ccb70c3db0a8f24746a23a5632bdc15a3fb78f4f7d833e7f86763c2a Feb 9 09:54:15.476998 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 09:54:15.476998 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:54:15.476998 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 9 09:54:15.516788 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 09:54:15.812243 ignition[1027]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 9 09:54:15.830602 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:54:15.830602 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:54:15.830602 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 9 09:54:15.887700 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 09:54:16.591476 ignition[1027]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 09:54:16.608606 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 09:54:16.826087 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1029) Feb 9 09:54:16.826111 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 09:54:16.826121 kernel: audit: type=1130 audit(1707472456.689:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:16.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:16.643174 systemd[1]: mnt-oem3120619123.mount: Deactivated successfully. Feb 9 09:54:16.833285 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3120619123" Feb 9 09:54:16.833285 ignition[1027]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3120619123": device or resource busy Feb 9 09:54:16.833285 ignition[1027]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3120619123", trying btrfs: device or resource busy Feb 9 09:54:16.833285 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3120619123" Feb 9 09:54:16.833285 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3120619123" Feb 9 09:54:16.833285 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem3120619123" Feb 9 09:54:16.833285 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem3120619123" Feb 9 09:54:16.833285 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 09:54:16.833285 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 09:54:16.833285 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 09:54:16.833285 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3003250314" Feb 9 09:54:16.833285 ignition[1027]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3003250314": device or resource busy Feb 9 09:54:16.833285 ignition[1027]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3003250314", trying btrfs: device or resource busy Feb 9 09:54:16.833285 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3003250314" Feb 9 09:54:17.063515 kernel: audit: type=1130 audit(1707472456.901:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.063551 kernel: audit: type=1131 audit(1707472456.927:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.063562 kernel: audit: type=1130 audit(1707472457.032:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:16.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:16.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:16.674788 systemd[1]: Finished ignition-files.service. Feb 9 09:54:17.070961 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3003250314" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem3003250314" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem3003250314" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(1b): [started] processing unit "prepare-cni-plugins.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(1b): [finished] processing unit "prepare-cni-plugins.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(1d): [started] processing unit "prepare-critools.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:54:17.070961 ignition[1027]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:54:17.353339 kernel: audit: type=1130 audit(1707472457.154:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.353367 kernel: audit: type=1131 audit(1707472457.179:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.353377 kernel: audit: type=1130 audit(1707472457.295:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:16.732167 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 09:54:17.362875 ignition[1027]: INFO : files: op(1d): [finished] processing unit "prepare-critools.service" Feb 9 09:54:17.362875 ignition[1027]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-critools.service" Feb 9 09:54:17.362875 ignition[1027]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 09:54:17.362875 ignition[1027]: INFO : files: op(20): [started] setting preset to enabled for "waagent.service" Feb 9 09:54:17.362875 ignition[1027]: INFO : files: op(20): [finished] setting preset to enabled for "waagent.service" Feb 9 09:54:17.362875 ignition[1027]: INFO : files: op(21): [started] setting preset to enabled for "nvidia.service" Feb 9 09:54:17.362875 ignition[1027]: INFO : files: op(21): [finished] setting preset to enabled for "nvidia.service" Feb 9 09:54:17.362875 ignition[1027]: INFO : files: op(22): [started] setting preset to enabled for "prepare-helm.service" Feb 9 09:54:17.362875 ignition[1027]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 09:54:17.362875 ignition[1027]: INFO : files: op(23): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:54:17.362875 ignition[1027]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:54:17.362875 ignition[1027]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:54:17.362875 ignition[1027]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:54:17.362875 ignition[1027]: INFO : files: files passed Feb 9 09:54:17.362875 ignition[1027]: INFO : Ignition finished successfully Feb 9 09:54:17.611998 kernel: audit: type=1131 audit(1707472457.392:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.612027 kernel: audit: type=1131 audit(1707472457.585:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.612111 initrd-setup-root-after-ignition[1052]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 09:54:16.737944 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 09:54:17.676571 kernel: audit: type=1131 audit(1707472457.634:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:16.751034 systemd[1]: Starting ignition-quench.service... Feb 9 09:54:17.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:16.895932 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 09:54:17.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:16.896026 systemd[1]: Finished ignition-quench.service. Feb 9 09:54:17.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.014411 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 09:54:17.724142 iscsid[874]: iscsid shutting down. Feb 9 09:54:17.067017 systemd[1]: Reached target ignition-complete.target. Feb 9 09:54:17.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.088993 systemd[1]: Starting initrd-parse-etc.service... Feb 9 09:54:17.754725 ignition[1065]: INFO : Ignition 2.14.0 Feb 9 09:54:17.754725 ignition[1065]: INFO : Stage: umount Feb 9 09:54:17.754725 ignition[1065]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:54:17.754725 ignition[1065]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:54:17.754725 ignition[1065]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:54:17.754725 ignition[1065]: INFO : umount: umount passed Feb 9 09:54:17.754725 ignition[1065]: INFO : Ignition finished successfully Feb 9 09:54:17.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.142674 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 09:54:17.142811 systemd[1]: Finished initrd-parse-etc.service. Feb 9 09:54:17.180427 systemd[1]: Reached target initrd-fs.target. Feb 9 09:54:17.191683 systemd[1]: Reached target initrd.target. Feb 9 09:54:17.218567 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 09:54:17.219549 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 09:54:17.283819 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 09:54:17.296850 systemd[1]: Starting initrd-cleanup.service... Feb 9 09:54:17.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.348707 systemd[1]: Stopped target nss-lookup.target. Feb 9 09:54:17.357814 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 09:54:17.367831 systemd[1]: Stopped target timers.target. Feb 9 09:54:17.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.379583 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 09:54:17.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.379656 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 09:54:17.392726 systemd[1]: Stopped target initrd.target. Feb 9 09:54:17.422954 systemd[1]: Stopped target basic.target. Feb 9 09:54:18.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.435494 systemd[1]: Stopped target ignition-complete.target. Feb 9 09:54:17.449562 systemd[1]: Stopped target ignition-diskful.target. Feb 9 09:54:17.464326 systemd[1]: Stopped target initrd-root-device.target. Feb 9 09:54:17.480269 systemd[1]: Stopped target remote-fs.target. Feb 9 09:54:18.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.496928 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 09:54:17.514105 systemd[1]: Stopped target sysinit.target. Feb 9 09:54:18.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.528496 systemd[1]: Stopped target local-fs.target. Feb 9 09:54:18.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.543780 systemd[1]: Stopped target local-fs-pre.target. Feb 9 09:54:18.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.560151 systemd[1]: Stopped target swap.target. Feb 9 09:54:17.574163 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 09:54:18.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.574231 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 09:54:18.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.585839 systemd[1]: Stopped target cryptsetup.target. Feb 9 09:54:18.155000 audit: BPF prog-id=6 op=UNLOAD Feb 9 09:54:17.617542 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 09:54:18.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.617603 systemd[1]: Stopped dracut-initqueue.service. Feb 9 09:54:18.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.634517 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 09:54:18.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.634561 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 09:54:17.677203 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 09:54:18.253380 kernel: hv_netvsc 002248b7-1232-0022-48b7-1232002248b7 eth0: Data path switched from VF: enP23464s1 Feb 9 09:54:18.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.677257 systemd[1]: Stopped ignition-files.service. Feb 9 09:54:18.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.695144 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 09:54:18.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.695198 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 09:54:18.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:18.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.708748 systemd[1]: Stopping ignition-mount.service... Feb 9 09:54:17.720164 systemd[1]: Stopping iscsid.service... Feb 9 09:54:17.725464 systemd[1]: Stopping sysroot-boot.service... Feb 9 09:54:17.733931 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 09:54:17.733996 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 09:54:17.740569 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 09:54:17.740620 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 09:54:17.761806 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 09:54:17.761921 systemd[1]: Stopped iscsid.service. Feb 9 09:54:17.771774 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 09:54:17.771863 systemd[1]: Finished initrd-cleanup.service. Feb 9 09:54:17.782482 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 09:54:17.782564 systemd[1]: Stopped ignition-mount.service. Feb 9 09:54:17.796407 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 09:54:17.796463 systemd[1]: Stopped ignition-disks.service. Feb 9 09:54:17.818208 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 09:54:17.818258 systemd[1]: Stopped ignition-kargs.service. Feb 9 09:54:17.833193 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 09:54:17.833246 systemd[1]: Stopped ignition-fetch.service. Feb 9 09:54:18.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:17.846346 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 09:54:17.846392 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 09:54:17.854013 systemd[1]: Stopped target paths.target. Feb 9 09:54:17.867231 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 09:54:17.886309 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 09:54:17.893746 systemd[1]: Stopped target slices.target. Feb 9 09:54:17.904840 systemd[1]: Stopped target sockets.target. Feb 9 09:54:17.919618 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 09:54:17.919672 systemd[1]: Closed iscsid.socket. Feb 9 09:54:17.930061 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 09:54:17.930114 systemd[1]: Stopped ignition-setup.service. Feb 9 09:54:17.940292 systemd[1]: Stopping iscsiuio.service... Feb 9 09:54:17.956076 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 09:54:17.956581 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 09:54:17.956684 systemd[1]: Stopped iscsiuio.service. Feb 9 09:54:17.966420 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 09:54:17.966516 systemd[1]: Stopped sysroot-boot.service. Feb 9 09:54:17.977355 systemd[1]: Stopped target network.target. Feb 9 09:54:17.989753 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 09:54:17.989789 systemd[1]: Closed iscsiuio.socket. Feb 9 09:54:18.001535 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 09:54:18.001601 systemd[1]: Stopped initrd-setup-root.service. Feb 9 09:54:18.014472 systemd[1]: Stopping systemd-networkd.service... Feb 9 09:54:18.025930 systemd[1]: Stopping systemd-resolved.service... Feb 9 09:54:18.032335 systemd-networkd[867]: eth0: DHCPv6 lease lost Feb 9 09:54:18.467000 audit: BPF prog-id=9 op=UNLOAD Feb 9 09:54:18.045554 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 09:54:18.045662 systemd[1]: Stopped systemd-networkd.service. Feb 9 09:54:18.468289 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 9 09:54:18.057805 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 09:54:18.057842 systemd[1]: Closed systemd-networkd.socket. Feb 9 09:54:18.068841 systemd[1]: Stopping network-cleanup.service... Feb 9 09:54:18.078487 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 09:54:18.078550 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 09:54:18.085813 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 09:54:18.085913 systemd[1]: Stopped systemd-sysctl.service. Feb 9 09:54:18.103570 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 09:54:18.103632 systemd[1]: Stopped systemd-modules-load.service. Feb 9 09:54:18.110082 systemd[1]: Stopping systemd-udevd.service... Feb 9 09:54:18.122179 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 09:54:18.122751 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 09:54:18.122865 systemd[1]: Stopped systemd-resolved.service. Feb 9 09:54:18.138260 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 09:54:18.138407 systemd[1]: Stopped systemd-udevd.service. Feb 9 09:54:18.151227 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 09:54:18.151298 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 09:54:18.162264 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 09:54:18.162335 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 09:54:18.169124 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 09:54:18.169182 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 09:54:18.181342 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 09:54:18.181397 systemd[1]: Stopped dracut-cmdline.service. Feb 9 09:54:18.193743 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 09:54:18.193787 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 09:54:18.206472 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 09:54:18.220234 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 09:54:18.220393 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 09:54:18.252940 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 09:54:18.252996 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 09:54:18.259858 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 09:54:18.259901 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 09:54:18.271896 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 09:54:18.272400 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 09:54:18.272492 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 09:54:18.382842 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 09:54:18.382944 systemd[1]: Stopped network-cleanup.service. Feb 9 09:54:18.392980 systemd[1]: Reached target initrd-switch-root.target. Feb 9 09:54:18.403604 systemd[1]: Starting initrd-switch-root.service... Feb 9 09:54:18.423736 systemd[1]: Switching root. Feb 9 09:54:18.469253 systemd-journald[276]: Journal stopped Feb 9 09:54:29.173070 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 09:54:29.173091 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 09:54:29.173101 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 09:54:29.173110 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 09:54:29.173118 kernel: SELinux: policy capability open_perms=1 Feb 9 09:54:29.173126 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 09:54:29.173135 kernel: SELinux: policy capability always_check_network=0 Feb 9 09:54:29.173143 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 09:54:29.173151 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 09:54:29.173159 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 09:54:29.173168 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 09:54:29.173178 systemd[1]: Successfully loaded SELinux policy in 251.705ms. Feb 9 09:54:29.173188 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.567ms. Feb 9 09:54:29.173200 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:54:29.173211 systemd[1]: Detected virtualization microsoft. Feb 9 09:54:29.173220 systemd[1]: Detected architecture arm64. Feb 9 09:54:29.173229 systemd[1]: Detected first boot. Feb 9 09:54:29.173238 systemd[1]: Hostname set to . Feb 9 09:54:29.173247 systemd[1]: Initializing machine ID from random generator. Feb 9 09:54:29.173255 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 09:54:29.173263 kernel: kauditd_printk_skb: 41 callbacks suppressed Feb 9 09:54:29.173286 kernel: audit: type=1400 audit(1707472462.130:89): avc: denied { associate } for pid=1099 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 09:54:29.173299 kernel: audit: type=1300 audit(1707472462.130:89): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458a2 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1082 pid=1099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:29.173309 kernel: audit: type=1327 audit(1707472462.130:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:54:29.173318 kernel: audit: type=1400 audit(1707472462.145:90): avc: denied { associate } for pid=1099 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 09:54:29.173327 kernel: audit: type=1300 audit(1707472462.145:90): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145979 a2=1ed a3=0 items=2 ppid=1082 pid=1099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:29.173336 kernel: audit: type=1307 audit(1707472462.145:90): cwd="/" Feb 9 09:54:29.173346 kernel: audit: type=1302 audit(1707472462.145:90): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:29.173355 kernel: audit: type=1302 audit(1707472462.145:90): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:29.173365 kernel: audit: type=1327 audit(1707472462.145:90): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:54:29.173374 systemd[1]: Populated /etc with preset unit settings. Feb 9 09:54:29.173383 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:54:29.173392 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:54:29.173403 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:54:29.173414 kernel: audit: type=1334 audit(1707472468.450:91): prog-id=12 op=LOAD Feb 9 09:54:29.173423 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 09:54:29.173431 kernel: audit: type=1334 audit(1707472468.450:92): prog-id=3 op=UNLOAD Feb 9 09:54:29.173440 systemd[1]: Stopped initrd-switch-root.service. Feb 9 09:54:29.173449 kernel: audit: type=1334 audit(1707472468.450:93): prog-id=13 op=LOAD Feb 9 09:54:29.173457 kernel: audit: type=1334 audit(1707472468.450:94): prog-id=14 op=LOAD Feb 9 09:54:29.173468 kernel: audit: type=1334 audit(1707472468.450:95): prog-id=4 op=UNLOAD Feb 9 09:54:29.173478 kernel: audit: type=1334 audit(1707472468.450:96): prog-id=5 op=UNLOAD Feb 9 09:54:29.173487 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 09:54:29.173496 kernel: audit: type=1334 audit(1707472468.450:97): prog-id=15 op=LOAD Feb 9 09:54:29.173505 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 09:54:29.173514 kernel: audit: type=1334 audit(1707472468.450:98): prog-id=12 op=UNLOAD Feb 9 09:54:29.173523 kernel: audit: type=1334 audit(1707472468.450:99): prog-id=16 op=LOAD Feb 9 09:54:29.173531 kernel: audit: type=1334 audit(1707472468.450:100): prog-id=17 op=LOAD Feb 9 09:54:29.173540 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 09:54:29.173551 systemd[1]: Created slice system-getty.slice. Feb 9 09:54:29.173560 systemd[1]: Created slice system-modprobe.slice. Feb 9 09:54:29.173570 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 09:54:29.173579 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 09:54:29.173589 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 09:54:29.173598 systemd[1]: Created slice user.slice. Feb 9 09:54:29.173608 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:54:29.173617 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 09:54:29.173626 systemd[1]: Set up automount boot.automount. Feb 9 09:54:29.173636 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 09:54:29.173646 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 09:54:29.173655 systemd[1]: Stopped target initrd-fs.target. Feb 9 09:54:29.173664 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 09:54:29.173673 systemd[1]: Reached target integritysetup.target. Feb 9 09:54:29.173683 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:54:29.173692 systemd[1]: Reached target remote-fs.target. Feb 9 09:54:29.173701 systemd[1]: Reached target slices.target. Feb 9 09:54:29.173712 systemd[1]: Reached target swap.target. Feb 9 09:54:29.173721 systemd[1]: Reached target torcx.target. Feb 9 09:54:29.173730 systemd[1]: Reached target veritysetup.target. Feb 9 09:54:29.173739 systemd[1]: Listening on systemd-coredump.socket. Feb 9 09:54:29.173749 systemd[1]: Listening on systemd-initctl.socket. Feb 9 09:54:29.173758 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:54:29.173769 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:54:29.173778 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:54:29.173788 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 09:54:29.173797 systemd[1]: Mounting dev-hugepages.mount... Feb 9 09:54:29.173807 systemd[1]: Mounting dev-mqueue.mount... Feb 9 09:54:29.173816 systemd[1]: Mounting media.mount... Feb 9 09:54:29.173826 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 09:54:29.173835 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 09:54:29.173846 systemd[1]: Mounting tmp.mount... Feb 9 09:54:29.173855 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 09:54:29.173864 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 09:54:29.173874 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:54:29.173883 systemd[1]: Starting modprobe@configfs.service... Feb 9 09:54:29.173893 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 09:54:29.173902 systemd[1]: Starting modprobe@drm.service... Feb 9 09:54:29.173911 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 09:54:29.173921 systemd[1]: Starting modprobe@fuse.service... Feb 9 09:54:29.173932 systemd[1]: Starting modprobe@loop.service... Feb 9 09:54:29.173941 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 09:54:29.173951 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 09:54:29.173961 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 09:54:29.173970 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 09:54:29.173980 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 09:54:29.173989 systemd[1]: Stopped systemd-journald.service. Feb 9 09:54:29.173998 kernel: loop: module loaded Feb 9 09:54:29.174009 kernel: fuse: init (API version 7.34) Feb 9 09:54:29.174018 systemd[1]: systemd-journald.service: Consumed 3.781s CPU time. Feb 9 09:54:29.174028 systemd[1]: Starting systemd-journald.service... Feb 9 09:54:29.174037 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:54:29.174046 systemd[1]: Starting systemd-network-generator.service... Feb 9 09:54:29.174056 systemd[1]: Starting systemd-remount-fs.service... Feb 9 09:54:29.174065 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:54:29.174074 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 09:54:29.174084 systemd[1]: Stopped verity-setup.service. Feb 9 09:54:29.174094 systemd[1]: Mounted dev-hugepages.mount. Feb 9 09:54:29.174103 systemd[1]: Mounted dev-mqueue.mount. Feb 9 09:54:29.174116 systemd-journald[1199]: Journal started Feb 9 09:54:29.174155 systemd-journald[1199]: Runtime Journal (/run/log/journal/314c2f2374e248a898a59018c9e241d0) is 8.0M, max 78.6M, 70.6M free. Feb 9 09:54:20.363000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 09:54:21.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:54:21.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:54:21.064000 audit: BPF prog-id=10 op=LOAD Feb 9 09:54:21.064000 audit: BPF prog-id=10 op=UNLOAD Feb 9 09:54:21.064000 audit: BPF prog-id=11 op=LOAD Feb 9 09:54:21.064000 audit: BPF prog-id=11 op=UNLOAD Feb 9 09:54:22.130000 audit[1099]: AVC avc: denied { associate } for pid=1099 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 09:54:22.130000 audit[1099]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458a2 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1082 pid=1099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:22.130000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:54:22.145000 audit[1099]: AVC avc: denied { associate } for pid=1099 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 09:54:22.145000 audit[1099]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145979 a2=1ed a3=0 items=2 ppid=1082 pid=1099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:22.145000 audit: CWD cwd="/" Feb 9 09:54:22.145000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:22.145000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:22.145000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:54:28.450000 audit: BPF prog-id=12 op=LOAD Feb 9 09:54:28.450000 audit: BPF prog-id=3 op=UNLOAD Feb 9 09:54:28.450000 audit: BPF prog-id=13 op=LOAD Feb 9 09:54:28.450000 audit: BPF prog-id=14 op=LOAD Feb 9 09:54:28.450000 audit: BPF prog-id=4 op=UNLOAD Feb 9 09:54:28.450000 audit: BPF prog-id=5 op=UNLOAD Feb 9 09:54:28.450000 audit: BPF prog-id=15 op=LOAD Feb 9 09:54:28.450000 audit: BPF prog-id=12 op=UNLOAD Feb 9 09:54:28.450000 audit: BPF prog-id=16 op=LOAD Feb 9 09:54:28.450000 audit: BPF prog-id=17 op=LOAD Feb 9 09:54:28.450000 audit: BPF prog-id=13 op=UNLOAD Feb 9 09:54:28.450000 audit: BPF prog-id=14 op=UNLOAD Feb 9 09:54:28.451000 audit: BPF prog-id=18 op=LOAD Feb 9 09:54:28.451000 audit: BPF prog-id=15 op=UNLOAD Feb 9 09:54:28.451000 audit: BPF prog-id=19 op=LOAD Feb 9 09:54:28.451000 audit: BPF prog-id=20 op=LOAD Feb 9 09:54:28.451000 audit: BPF prog-id=16 op=UNLOAD Feb 9 09:54:28.451000 audit: BPF prog-id=17 op=UNLOAD Feb 9 09:54:28.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:28.489000 audit: BPF prog-id=18 op=UNLOAD Feb 9 09:54:28.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:28.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.073000 audit: BPF prog-id=21 op=LOAD Feb 9 09:54:29.073000 audit: BPF prog-id=22 op=LOAD Feb 9 09:54:29.073000 audit: BPF prog-id=23 op=LOAD Feb 9 09:54:29.073000 audit: BPF prog-id=19 op=UNLOAD Feb 9 09:54:29.073000 audit: BPF prog-id=20 op=UNLOAD Feb 9 09:54:29.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.170000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 09:54:29.170000 audit[1199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffd958b670 a2=4000 a3=1 items=0 ppid=1 pid=1199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:29.170000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 09:54:28.449202 systemd[1]: Queued start job for default target multi-user.target. Feb 9 09:54:22.088902 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:54:28.452591 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 09:54:22.115934 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:54:28.452987 systemd[1]: systemd-journald.service: Consumed 3.781s CPU time. Feb 9 09:54:22.115954 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:54:22.115992 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 09:54:22.116002 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 09:54:22.116035 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 09:54:22.116047 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 09:54:22.116260 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 09:54:22.116313 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:54:22.116327 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:54:22.116868 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 09:54:22.116904 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 09:54:22.116921 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 09:54:22.116935 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 09:54:22.116952 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 09:54:22.116965 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 09:54:27.333975 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:27Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:54:27.334244 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:27Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:54:27.334358 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:27Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:54:27.334509 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:27Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:54:27.334559 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:27Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 09:54:27.334614 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-02-09T09:54:27Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 09:54:29.195655 systemd[1]: Started systemd-journald.service. Feb 9 09:54:29.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.196368 systemd[1]: Mounted media.mount. Feb 9 09:54:29.201488 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 09:54:29.207652 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 09:54:29.212933 systemd[1]: Mounted tmp.mount. Feb 9 09:54:29.217194 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 09:54:29.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.222356 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:54:29.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.227495 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 09:54:29.227613 systemd[1]: Finished modprobe@configfs.service. Feb 9 09:54:29.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.232700 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 09:54:29.232890 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 09:54:29.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.237901 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 09:54:29.238046 systemd[1]: Finished modprobe@drm.service. Feb 9 09:54:29.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.243165 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 09:54:29.243323 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 09:54:29.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.248621 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 09:54:29.248755 systemd[1]: Finished modprobe@fuse.service. Feb 9 09:54:29.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.254270 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 09:54:29.254407 systemd[1]: Finished modprobe@loop.service. Feb 9 09:54:29.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.259132 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:54:29.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.264388 systemd[1]: Finished systemd-network-generator.service. Feb 9 09:54:29.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.270015 systemd[1]: Finished systemd-remount-fs.service. Feb 9 09:54:29.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.275222 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:54:29.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.280749 systemd[1]: Reached target network-pre.target. Feb 9 09:54:29.286920 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 09:54:29.292413 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 09:54:29.296468 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 09:54:29.310006 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 09:54:29.315636 systemd[1]: Starting systemd-journal-flush.service... Feb 9 09:54:29.320236 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 09:54:29.321225 systemd[1]: Starting systemd-random-seed.service... Feb 9 09:54:29.325771 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 09:54:29.326844 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:54:29.332269 systemd[1]: Starting systemd-sysusers.service... Feb 9 09:54:29.337858 systemd[1]: Starting systemd-udev-settle.service... Feb 9 09:54:29.344549 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 09:54:29.350413 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 09:54:29.363624 udevadm[1219]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 09:54:29.370428 systemd-journald[1199]: Time spent on flushing to /var/log/journal/314c2f2374e248a898a59018c9e241d0 is 19.203ms for 1139 entries. Feb 9 09:54:29.370428 systemd-journald[1199]: System Journal (/var/log/journal/314c2f2374e248a898a59018c9e241d0) is 8.0M, max 2.6G, 2.6G free. Feb 9 09:54:29.439325 systemd-journald[1199]: Received client request to flush runtime journal. Feb 9 09:54:29.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.376007 systemd[1]: Finished systemd-random-seed.service. Feb 9 09:54:29.382866 systemd[1]: Reached target first-boot-complete.target. Feb 9 09:54:29.423523 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:54:29.440131 systemd[1]: Finished systemd-journal-flush.service. Feb 9 09:54:29.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.778505 systemd[1]: Finished systemd-sysusers.service. Feb 9 09:54:29.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:29.784185 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 09:54:30.045406 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 09:54:30.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:30.302172 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 09:54:30.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:30.307000 audit: BPF prog-id=24 op=LOAD Feb 9 09:54:30.307000 audit: BPF prog-id=25 op=LOAD Feb 9 09:54:30.307000 audit: BPF prog-id=7 op=UNLOAD Feb 9 09:54:30.307000 audit: BPF prog-id=8 op=UNLOAD Feb 9 09:54:30.308897 systemd[1]: Starting systemd-udevd.service... Feb 9 09:54:30.327467 systemd-udevd[1224]: Using default interface naming scheme 'v252'. Feb 9 09:54:30.485074 systemd[1]: Started systemd-udevd.service. Feb 9 09:54:30.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:30.496000 audit: BPF prog-id=26 op=LOAD Feb 9 09:54:30.497980 systemd[1]: Starting systemd-networkd.service... Feb 9 09:54:30.518694 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 09:54:30.559047 systemd[1]: Starting systemd-userdbd.service... Feb 9 09:54:30.557000 audit: BPF prog-id=27 op=LOAD Feb 9 09:54:30.558000 audit: BPF prog-id=28 op=LOAD Feb 9 09:54:30.558000 audit: BPF prog-id=29 op=LOAD Feb 9 09:54:30.586311 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 09:54:30.637000 audit[1244]: AVC avc: denied { confidentiality } for pid=1244 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 09:54:30.641707 systemd[1]: Started systemd-userdbd.service. Feb 9 09:54:30.648293 kernel: hv_vmbus: registering driver hv_balloon Feb 9 09:54:30.663804 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 09:54:30.663901 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 9 09:54:30.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:30.669334 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 09:54:30.678443 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 09:54:30.681319 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 09:54:30.699092 kernel: Console: switching to colour dummy device 80x25 Feb 9 09:54:30.703314 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 09:54:30.637000 audit[1244]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaadb103ad0 a1=aa2c a2=ffff9b5824b0 a3=aaaadb038010 items=12 ppid=1224 pid=1244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:30.637000 audit: CWD cwd="/" Feb 9 09:54:30.637000 audit: PATH item=0 name=(null) inode=6749 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.637000 audit: PATH item=1 name=(null) inode=10015 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.637000 audit: PATH item=2 name=(null) inode=10015 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.637000 audit: PATH item=3 name=(null) inode=10016 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.637000 audit: PATH item=4 name=(null) inode=10015 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.637000 audit: PATH item=5 name=(null) inode=10017 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.637000 audit: PATH item=6 name=(null) inode=10015 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.637000 audit: PATH item=7 name=(null) inode=10018 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.637000 audit: PATH item=8 name=(null) inode=10015 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.637000 audit: PATH item=9 name=(null) inode=10019 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.637000 audit: PATH item=10 name=(null) inode=10015 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.637000 audit: PATH item=11 name=(null) inode=10020 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:54:30.637000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 09:54:30.733291 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 09:54:30.733398 kernel: hv_vmbus: registering driver hv_utils Feb 9 09:54:30.734303 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 09:54:30.738299 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 09:54:30.745600 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 09:54:31.197796 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1237) Feb 9 09:54:31.202089 systemd-networkd[1245]: lo: Link UP Feb 9 09:54:31.202098 systemd-networkd[1245]: lo: Gained carrier Feb 9 09:54:31.202471 systemd-networkd[1245]: Enumeration completed Feb 9 09:54:31.202587 systemd[1]: Started systemd-networkd.service. Feb 9 09:54:31.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:31.208672 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 09:54:31.227494 systemd-networkd[1245]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:54:31.231782 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:54:31.240152 systemd[1]: Finished systemd-udev-settle.service. Feb 9 09:54:31.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:31.247791 systemd[1]: Starting lvm2-activation-early.service... Feb 9 09:54:31.294774 kernel: mlx5_core 5ba8:00:02.0 enP23464s1: Link up Feb 9 09:54:31.321769 kernel: hv_netvsc 002248b7-1232-0022-48b7-1232002248b7 eth0: Data path switched to VF: enP23464s1 Feb 9 09:54:31.322404 systemd-networkd[1245]: enP23464s1: Link UP Feb 9 09:54:31.322492 systemd-networkd[1245]: eth0: Link UP Feb 9 09:54:31.322510 systemd-networkd[1245]: eth0: Gained carrier Feb 9 09:54:31.327224 systemd-networkd[1245]: enP23464s1: Gained carrier Feb 9 09:54:31.339903 systemd-networkd[1245]: eth0: DHCPv4 address 10.200.20.39/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 09:54:31.498968 lvm[1302]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:54:31.540676 systemd[1]: Finished lvm2-activation-early.service. Feb 9 09:54:31.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:31.545800 systemd[1]: Reached target cryptsetup.target. Feb 9 09:54:31.551527 systemd[1]: Starting lvm2-activation.service... Feb 9 09:54:31.555637 lvm[1303]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:54:31.574624 systemd[1]: Finished lvm2-activation.service. Feb 9 09:54:31.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:31.579537 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:54:31.584281 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 09:54:31.584306 systemd[1]: Reached target local-fs.target. Feb 9 09:54:31.588670 systemd[1]: Reached target machines.target. Feb 9 09:54:31.594330 systemd[1]: Starting ldconfig.service... Feb 9 09:54:31.610061 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 09:54:31.610126 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:54:31.611260 systemd[1]: Starting systemd-boot-update.service... Feb 9 09:54:31.616985 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 09:54:31.624068 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 09:54:31.631249 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:54:31.631306 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:54:31.632633 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 09:54:31.646835 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1305 (bootctl) Feb 9 09:54:31.647959 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 09:54:31.662558 systemd-tmpfiles[1308]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 09:54:31.697426 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 09:54:31.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:31.750181 systemd-tmpfiles[1308]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 09:54:31.798264 systemd-tmpfiles[1308]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 09:54:32.340688 systemd-fsck[1313]: fsck.fat 4.2 (2021-01-31) Feb 9 09:54:32.340688 systemd-fsck[1313]: /dev/sda1: 236 files, 113719/258078 clusters Feb 9 09:54:32.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:32.341662 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 09:54:32.349222 systemd[1]: Mounting boot.mount... Feb 9 09:54:32.398652 systemd[1]: Mounted boot.mount. Feb 9 09:54:32.413406 systemd[1]: Finished systemd-boot-update.service. Feb 9 09:54:32.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:32.819435 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 09:54:32.820665 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 09:54:32.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:33.074895 systemd-networkd[1245]: eth0: Gained IPv6LL Feb 9 09:54:33.079652 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 09:54:33.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:33.138774 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 09:54:33.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:33.145802 systemd[1]: Starting audit-rules.service... Feb 9 09:54:33.151356 systemd[1]: Starting clean-ca-certificates.service... Feb 9 09:54:33.158064 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 09:54:33.166000 audit: BPF prog-id=30 op=LOAD Feb 9 09:54:33.168841 systemd[1]: Starting systemd-resolved.service... Feb 9 09:54:33.172000 audit: BPF prog-id=31 op=LOAD Feb 9 09:54:33.175107 systemd[1]: Starting systemd-timesyncd.service... Feb 9 09:54:33.181261 systemd[1]: Starting systemd-update-utmp.service... Feb 9 09:54:33.219376 systemd[1]: Finished clean-ca-certificates.service. Feb 9 09:54:33.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:33.227951 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 09:54:33.234000 audit[1325]: SYSTEM_BOOT pid=1325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 09:54:33.238590 systemd[1]: Finished systemd-update-utmp.service. Feb 9 09:54:33.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:33.282948 systemd[1]: Started systemd-timesyncd.service. Feb 9 09:54:33.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:33.290051 systemd[1]: Reached target time-set.target. Feb 9 09:54:33.311660 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 09:54:33.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:33.337968 systemd-resolved[1323]: Positive Trust Anchors: Feb 9 09:54:33.338284 systemd-resolved[1323]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:54:33.338362 systemd-resolved[1323]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:54:33.426763 systemd-resolved[1323]: Using system hostname 'ci-3510.3.2-a-f6c11093dc'. Feb 9 09:54:33.428402 systemd[1]: Started systemd-resolved.service. Feb 9 09:54:33.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:54:33.434000 systemd[1]: Reached target network.target. Feb 9 09:54:33.439414 systemd[1]: Reached target network-online.target. Feb 9 09:54:33.445268 systemd[1]: Reached target nss-lookup.target. Feb 9 09:54:33.498000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 09:54:33.498000 audit[1340]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffa8b19e0 a2=420 a3=0 items=0 ppid=1319 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:54:33.498000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 09:54:33.511985 augenrules[1340]: No rules Feb 9 09:54:33.512945 systemd[1]: Finished audit-rules.service. Feb 9 09:54:33.568096 systemd-timesyncd[1324]: Contacted time server 45.33.53.84:123 (0.flatcar.pool.ntp.org). Feb 9 09:54:33.568169 systemd-timesyncd[1324]: Initial clock synchronization to Fri 2024-02-09 09:54:33.574054 UTC. Feb 9 09:54:39.004281 ldconfig[1304]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 09:54:39.013876 systemd[1]: Finished ldconfig.service. Feb 9 09:54:39.019786 systemd[1]: Starting systemd-update-done.service... Feb 9 09:54:39.049614 systemd[1]: Finished systemd-update-done.service. Feb 9 09:54:39.054481 systemd[1]: Reached target sysinit.target. Feb 9 09:54:39.060101 systemd[1]: Started motdgen.path. Feb 9 09:54:39.063851 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 09:54:39.070324 systemd[1]: Started logrotate.timer. Feb 9 09:54:39.074720 systemd[1]: Started mdadm.timer. Feb 9 09:54:39.078306 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 09:54:39.083243 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 09:54:39.083274 systemd[1]: Reached target paths.target. Feb 9 09:54:39.088802 systemd[1]: Reached target timers.target. Feb 9 09:54:39.095275 systemd[1]: Listening on dbus.socket. Feb 9 09:54:39.100908 systemd[1]: Starting docker.socket... Feb 9 09:54:39.106905 systemd[1]: Listening on sshd.socket. Feb 9 09:54:39.110934 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:54:39.111366 systemd[1]: Listening on docker.socket. Feb 9 09:54:39.115405 systemd[1]: Reached target sockets.target. Feb 9 09:54:39.119762 systemd[1]: Reached target basic.target. Feb 9 09:54:39.123930 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:54:39.123959 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:54:39.124996 systemd[1]: Starting containerd.service... Feb 9 09:54:39.129434 systemd[1]: Starting dbus.service... Feb 9 09:54:39.133526 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 09:54:39.138857 systemd[1]: Starting extend-filesystems.service... Feb 9 09:54:39.145698 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 09:54:39.146734 systemd[1]: Starting motdgen.service... Feb 9 09:54:39.151206 systemd[1]: Started nvidia.service. Feb 9 09:54:39.156184 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 09:54:39.161177 systemd[1]: Starting prepare-critools.service... Feb 9 09:54:39.166155 systemd[1]: Starting prepare-helm.service... Feb 9 09:54:39.171109 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 09:54:39.176505 systemd[1]: Starting sshd-keygen.service... Feb 9 09:54:39.182854 systemd[1]: Starting systemd-logind.service... Feb 9 09:54:39.189234 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:54:39.189293 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 09:54:39.189706 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 09:54:39.190392 systemd[1]: Starting update-engine.service... Feb 9 09:54:39.195677 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 09:54:39.209443 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 09:54:39.209650 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 09:54:39.216574 jq[1369]: true Feb 9 09:54:39.216954 jq[1350]: false Feb 9 09:54:39.218323 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 09:54:39.218818 systemd[1]: Finished motdgen.service. Feb 9 09:54:39.231165 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 09:54:39.231369 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 09:54:39.243701 extend-filesystems[1351]: Found sda Feb 9 09:54:39.248579 extend-filesystems[1351]: Found sda1 Feb 9 09:54:39.248579 extend-filesystems[1351]: Found sda2 Feb 9 09:54:39.248579 extend-filesystems[1351]: Found sda3 Feb 9 09:54:39.248579 extend-filesystems[1351]: Found usr Feb 9 09:54:39.248579 extend-filesystems[1351]: Found sda4 Feb 9 09:54:39.248579 extend-filesystems[1351]: Found sda6 Feb 9 09:54:39.248579 extend-filesystems[1351]: Found sda7 Feb 9 09:54:39.248579 extend-filesystems[1351]: Found sda9 Feb 9 09:54:39.248579 extend-filesystems[1351]: Checking size of /dev/sda9 Feb 9 09:54:39.337642 env[1379]: time="2024-02-09T09:54:39.305568154Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 09:54:39.287517 systemd-logind[1364]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 09:54:39.338143 jq[1380]: true Feb 9 09:54:39.288639 systemd-logind[1364]: New seat seat0. Feb 9 09:54:39.343529 env[1379]: time="2024-02-09T09:54:39.343489674Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 09:54:39.343821 env[1379]: time="2024-02-09T09:54:39.343802960Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:54:39.347070 env[1379]: time="2024-02-09T09:54:39.347008483Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:54:39.347182 env[1379]: time="2024-02-09T09:54:39.347166726Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:54:39.347464 env[1379]: time="2024-02-09T09:54:39.347444163Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:54:39.347546 env[1379]: time="2024-02-09T09:54:39.347532467Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 09:54:39.347613 env[1379]: time="2024-02-09T09:54:39.347599446Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 09:54:39.348134 env[1379]: time="2024-02-09T09:54:39.348113307Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 09:54:39.348295 env[1379]: time="2024-02-09T09:54:39.348279633Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:54:39.348551 env[1379]: time="2024-02-09T09:54:39.348533743Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:54:39.348794 env[1379]: time="2024-02-09T09:54:39.348743000Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:54:39.348876 env[1379]: time="2024-02-09T09:54:39.348862593Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 09:54:39.348986 env[1379]: time="2024-02-09T09:54:39.348971463Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 09:54:39.349057 env[1379]: time="2024-02-09T09:54:39.349043243Z" level=info msg="metadata content store policy set" policy=shared Feb 9 09:54:39.353084 extend-filesystems[1351]: Old size kept for /dev/sda9 Feb 9 09:54:39.359829 extend-filesystems[1351]: Found sr0 Feb 9 09:54:39.359799 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 09:54:39.359971 systemd[1]: Finished extend-filesystems.service. Feb 9 09:54:39.376942 env[1379]: time="2024-02-09T09:54:39.376813369Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 09:54:39.376942 env[1379]: time="2024-02-09T09:54:39.376869344Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 09:54:39.376942 env[1379]: time="2024-02-09T09:54:39.376882988Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 09:54:39.376942 env[1379]: time="2024-02-09T09:54:39.376922799Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 09:54:39.376942 env[1379]: time="2024-02-09T09:54:39.376939043Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 09:54:39.377144 env[1379]: time="2024-02-09T09:54:39.376952967Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 09:54:39.377144 env[1379]: time="2024-02-09T09:54:39.376966771Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 09:54:39.377638 env[1379]: time="2024-02-09T09:54:39.377309665Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 09:54:39.377638 env[1379]: time="2024-02-09T09:54:39.377333152Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 09:54:39.377638 env[1379]: time="2024-02-09T09:54:39.377348396Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 09:54:39.377638 env[1379]: time="2024-02-09T09:54:39.377361000Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 09:54:39.377638 env[1379]: time="2024-02-09T09:54:39.377373723Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 09:54:39.377638 env[1379]: time="2024-02-09T09:54:39.377507720Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 09:54:39.377638 env[1379]: time="2024-02-09T09:54:39.377579420Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 09:54:39.377999 env[1379]: time="2024-02-09T09:54:39.377897027Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 09:54:39.377999 env[1379]: time="2024-02-09T09:54:39.377931677Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 09:54:39.377999 env[1379]: time="2024-02-09T09:54:39.377945320Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 09:54:39.377999 env[1379]: time="2024-02-09T09:54:39.377994214Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 09:54:39.378155 env[1379]: time="2024-02-09T09:54:39.378007177Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 09:54:39.378155 env[1379]: time="2024-02-09T09:54:39.378021461Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 09:54:39.378155 env[1379]: time="2024-02-09T09:54:39.378034945Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 09:54:39.378155 env[1379]: time="2024-02-09T09:54:39.378047148Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 09:54:39.378155 env[1379]: time="2024-02-09T09:54:39.378059232Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 09:54:39.378155 env[1379]: time="2024-02-09T09:54:39.378070475Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 09:54:39.378155 env[1379]: time="2024-02-09T09:54:39.378081958Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 09:54:39.378155 env[1379]: time="2024-02-09T09:54:39.378096562Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 09:54:39.378309 env[1379]: time="2024-02-09T09:54:39.378214154Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 09:54:39.378309 env[1379]: time="2024-02-09T09:54:39.378232599Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 09:54:39.378309 env[1379]: time="2024-02-09T09:54:39.378244883Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 09:54:39.378309 env[1379]: time="2024-02-09T09:54:39.378255766Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 09:54:39.378309 env[1379]: time="2024-02-09T09:54:39.378270570Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 09:54:39.378309 env[1379]: time="2024-02-09T09:54:39.378283093Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 09:54:39.378309 env[1379]: time="2024-02-09T09:54:39.378300938Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 09:54:39.378438 env[1379]: time="2024-02-09T09:54:39.378333307Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 09:54:39.378780 env[1379]: time="2024-02-09T09:54:39.378519959Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 09:54:39.378780 env[1379]: time="2024-02-09T09:54:39.378602341Z" level=info msg="Connect containerd service" Feb 9 09:54:39.378780 env[1379]: time="2024-02-09T09:54:39.378637711Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 09:54:39.401386 env[1379]: time="2024-02-09T09:54:39.379213029Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 09:54:39.401386 env[1379]: time="2024-02-09T09:54:39.379455136Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 09:54:39.401386 env[1379]: time="2024-02-09T09:54:39.379505310Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 09:54:39.401386 env[1379]: time="2024-02-09T09:54:39.385585304Z" level=info msg="containerd successfully booted in 0.080658s" Feb 9 09:54:39.401386 env[1379]: time="2024-02-09T09:54:39.385639159Z" level=info msg="Start subscribing containerd event" Feb 9 09:54:39.401386 env[1379]: time="2024-02-09T09:54:39.385673768Z" level=info msg="Start recovering state" Feb 9 09:54:39.401386 env[1379]: time="2024-02-09T09:54:39.385851097Z" level=info msg="Start event monitor" Feb 9 09:54:39.401386 env[1379]: time="2024-02-09T09:54:39.385872663Z" level=info msg="Start snapshots syncer" Feb 9 09:54:39.401386 env[1379]: time="2024-02-09T09:54:39.385883026Z" level=info msg="Start cni network conf syncer for default" Feb 9 09:54:39.401386 env[1379]: time="2024-02-09T09:54:39.385892268Z" level=info msg="Start streaming server" Feb 9 09:54:39.379617 systemd[1]: Started containerd.service. Feb 9 09:54:39.402355 bash[1415]: Updated "/home/core/.ssh/authorized_keys" Feb 9 09:54:39.429907 tar[1372]: ./ Feb 9 09:54:39.429907 tar[1372]: ./macvlan Feb 9 09:54:39.442677 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 09:54:39.451143 tar[1373]: crictl Feb 9 09:54:39.451381 tar[1374]: linux-arm64/helm Feb 9 09:54:39.546838 tar[1372]: ./static Feb 9 09:54:39.560598 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 09:54:39.597413 dbus-daemon[1349]: [system] SELinux support is enabled Feb 9 09:54:39.597574 systemd[1]: Started dbus.service. Feb 9 09:54:39.604785 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 09:54:39.604815 systemd[1]: Reached target system-config.target. Feb 9 09:54:39.615059 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 09:54:39.615083 systemd[1]: Reached target user-config.target. Feb 9 09:54:39.621966 dbus-daemon[1349]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 09:54:39.622210 systemd[1]: Started systemd-logind.service. Feb 9 09:54:39.629813 tar[1372]: ./vlan Feb 9 09:54:39.720609 tar[1372]: ./portmap Feb 9 09:54:39.786584 tar[1372]: ./host-local Feb 9 09:54:39.820686 update_engine[1368]: I0209 09:54:39.809433 1368 main.cc:92] Flatcar Update Engine starting Feb 9 09:54:39.838448 tar[1372]: ./vrf Feb 9 09:54:39.873567 systemd[1]: Started update-engine.service. Feb 9 09:54:39.880051 update_engine[1368]: I0209 09:54:39.880012 1368 update_check_scheduler.cc:74] Next update check in 10m18s Feb 9 09:54:39.881505 systemd[1]: Started locksmithd.service. Feb 9 09:54:39.901350 tar[1372]: ./bridge Feb 9 09:54:39.963819 tar[1372]: ./tuning Feb 9 09:54:40.020729 tar[1372]: ./firewall Feb 9 09:54:40.088905 tar[1372]: ./host-device Feb 9 09:54:40.149061 tar[1372]: ./sbr Feb 9 09:54:40.155809 tar[1374]: linux-arm64/LICENSE Feb 9 09:54:40.155908 tar[1374]: linux-arm64/README.md Feb 9 09:54:40.160219 systemd[1]: Finished prepare-helm.service. Feb 9 09:54:40.206694 tar[1372]: ./loopback Feb 9 09:54:40.259089 tar[1372]: ./dhcp Feb 9 09:54:40.303315 systemd[1]: Finished prepare-critools.service. Feb 9 09:54:40.355585 tar[1372]: ./ptp Feb 9 09:54:40.388333 tar[1372]: ./ipvlan Feb 9 09:54:40.420919 tar[1372]: ./bandwidth Feb 9 09:54:40.494521 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 09:54:40.899778 sshd_keygen[1367]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 09:54:40.917559 systemd[1]: Finished sshd-keygen.service. Feb 9 09:54:40.923456 systemd[1]: Starting issuegen.service... Feb 9 09:54:40.928546 systemd[1]: Started waagent.service. Feb 9 09:54:40.933558 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 09:54:40.933790 systemd[1]: Finished issuegen.service. Feb 9 09:54:40.939557 systemd[1]: Starting systemd-user-sessions.service... Feb 9 09:54:40.967580 systemd[1]: Finished systemd-user-sessions.service. Feb 9 09:54:40.974527 systemd[1]: Started getty@tty1.service. Feb 9 09:54:40.981139 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 09:54:40.986494 systemd[1]: Reached target getty.target. Feb 9 09:54:40.991193 systemd[1]: Reached target multi-user.target. Feb 9 09:54:40.998812 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 09:54:41.007327 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 09:54:41.007486 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 09:54:41.013535 systemd[1]: Startup finished in 736ms (kernel) + 16.280s (initrd) + 20.776s (userspace) = 37.793s. Feb 9 09:54:41.459043 locksmithd[1456]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 09:54:41.530083 login[1478]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 09:54:41.531499 login[1479]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 09:54:41.589031 systemd[1]: Created slice user-500.slice. Feb 9 09:54:41.590060 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 09:54:41.592166 systemd-logind[1364]: New session 1 of user core. Feb 9 09:54:41.625603 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 09:54:41.627077 systemd[1]: Starting user@500.service... Feb 9 09:54:41.658194 (systemd)[1483]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:54:41.841840 systemd[1483]: Queued start job for default target default.target. Feb 9 09:54:41.842613 systemd[1483]: Reached target paths.target. Feb 9 09:54:41.842724 systemd[1483]: Reached target sockets.target. Feb 9 09:54:41.842829 systemd[1483]: Reached target timers.target. Feb 9 09:54:41.842908 systemd[1483]: Reached target basic.target. Feb 9 09:54:41.843020 systemd[1483]: Reached target default.target. Feb 9 09:54:41.843084 systemd[1]: Started user@500.service. Feb 9 09:54:41.843242 systemd[1483]: Startup finished in 178ms. Feb 9 09:54:41.844012 systemd[1]: Started session-1.scope. Feb 9 09:54:42.530402 login[1478]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 09:54:42.534440 systemd[1]: Started session-2.scope. Feb 9 09:54:42.534795 systemd-logind[1364]: New session 2 of user core. Feb 9 09:54:46.578402 waagent[1476]: 2024-02-09T09:54:46.578299Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 09:54:46.586001 waagent[1476]: 2024-02-09T09:54:46.585917Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 09:54:46.590768 waagent[1476]: 2024-02-09T09:54:46.590689Z INFO Daemon Daemon Python: 3.9.16 Feb 9 09:54:46.595505 waagent[1476]: 2024-02-09T09:54:46.595436Z INFO Daemon Daemon Run daemon Feb 9 09:54:46.600496 waagent[1476]: 2024-02-09T09:54:46.600438Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 09:54:46.617359 waagent[1476]: 2024-02-09T09:54:46.617244Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 09:54:46.632728 waagent[1476]: 2024-02-09T09:54:46.632609Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 09:54:46.642485 waagent[1476]: 2024-02-09T09:54:46.642418Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 09:54:46.648230 waagent[1476]: 2024-02-09T09:54:46.648163Z INFO Daemon Daemon Using waagent for provisioning Feb 9 09:54:46.654206 waagent[1476]: 2024-02-09T09:54:46.654146Z INFO Daemon Daemon Activate resource disk Feb 9 09:54:46.658987 waagent[1476]: 2024-02-09T09:54:46.658928Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 09:54:46.675940 waagent[1476]: 2024-02-09T09:54:46.675860Z INFO Daemon Daemon Found device: None Feb 9 09:54:46.680620 waagent[1476]: 2024-02-09T09:54:46.680557Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 09:54:46.689002 waagent[1476]: 2024-02-09T09:54:46.688940Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 09:54:46.701016 waagent[1476]: 2024-02-09T09:54:46.700958Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 09:54:46.707231 waagent[1476]: 2024-02-09T09:54:46.707172Z INFO Daemon Daemon Running default provisioning handler Feb 9 09:54:46.721041 waagent[1476]: 2024-02-09T09:54:46.720929Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 09:54:46.736407 waagent[1476]: 2024-02-09T09:54:46.736285Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 09:54:46.746718 waagent[1476]: 2024-02-09T09:54:46.746644Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 09:54:46.752596 waagent[1476]: 2024-02-09T09:54:46.752532Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 09:54:46.988638 waagent[1476]: 2024-02-09T09:54:46.988456Z INFO Daemon Daemon Successfully mounted dvd Feb 9 09:54:47.084029 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 09:54:47.122878 waagent[1476]: 2024-02-09T09:54:47.122708Z INFO Daemon Daemon Detect protocol endpoint Feb 9 09:54:47.128665 waagent[1476]: 2024-02-09T09:54:47.128585Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 09:54:47.136095 waagent[1476]: 2024-02-09T09:54:47.136021Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 09:54:47.143161 waagent[1476]: 2024-02-09T09:54:47.143093Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 09:54:47.149098 waagent[1476]: 2024-02-09T09:54:47.149013Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 09:54:47.155150 waagent[1476]: 2024-02-09T09:54:47.155079Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 09:54:47.260146 waagent[1476]: 2024-02-09T09:54:47.260084Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 09:54:47.267735 waagent[1476]: 2024-02-09T09:54:47.267688Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 09:54:47.273444 waagent[1476]: 2024-02-09T09:54:47.273378Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 09:54:47.813309 waagent[1476]: 2024-02-09T09:54:47.813155Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 09:54:47.829854 waagent[1476]: 2024-02-09T09:54:47.829785Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 09:54:47.835680 waagent[1476]: 2024-02-09T09:54:47.835621Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 09:54:47.910418 waagent[1476]: 2024-02-09T09:54:47.910282Z INFO Daemon Daemon Found private key matching thumbprint 575C47585D1459C00D5A0F07B441A63D325669A3 Feb 9 09:54:47.919205 waagent[1476]: 2024-02-09T09:54:47.919128Z INFO Daemon Daemon Certificate with thumbprint B8910F831702841F93B7EF734F4F2193722C3D6E has no matching private key. Feb 9 09:54:47.931414 waagent[1476]: 2024-02-09T09:54:47.931335Z INFO Daemon Daemon Fetch goal state completed Feb 9 09:54:47.990423 waagent[1476]: 2024-02-09T09:54:47.990369Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 810089be-20c1-47f4-8c24-200d0c60fcd0 New eTag: 17993331865570006401] Feb 9 09:54:48.001068 waagent[1476]: 2024-02-09T09:54:48.000998Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 09:54:48.017026 waagent[1476]: 2024-02-09T09:54:48.016970Z INFO Daemon Daemon Starting provisioning Feb 9 09:54:48.022069 waagent[1476]: 2024-02-09T09:54:48.022008Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 09:54:48.026892 waagent[1476]: 2024-02-09T09:54:48.026835Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-f6c11093dc] Feb 9 09:54:48.070292 waagent[1476]: 2024-02-09T09:54:48.070156Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-f6c11093dc] Feb 9 09:54:48.076947 waagent[1476]: 2024-02-09T09:54:48.076869Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 09:54:48.083593 waagent[1476]: 2024-02-09T09:54:48.083535Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 09:54:48.099228 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 09:54:48.099397 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 09:54:48.099450 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 09:54:48.099686 systemd[1]: Stopping systemd-networkd.service... Feb 9 09:54:48.104787 systemd-networkd[1245]: eth0: DHCPv6 lease lost Feb 9 09:54:48.105990 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 09:54:48.106150 systemd[1]: Stopped systemd-networkd.service. Feb 9 09:54:48.108023 systemd[1]: Starting systemd-networkd.service... Feb 9 09:54:48.134390 systemd-networkd[1527]: enP23464s1: Link UP Feb 9 09:54:48.134402 systemd-networkd[1527]: enP23464s1: Gained carrier Feb 9 09:54:48.135335 systemd-networkd[1527]: eth0: Link UP Feb 9 09:54:48.135346 systemd-networkd[1527]: eth0: Gained carrier Feb 9 09:54:48.135658 systemd-networkd[1527]: lo: Link UP Feb 9 09:54:48.135666 systemd-networkd[1527]: lo: Gained carrier Feb 9 09:54:48.135914 systemd-networkd[1527]: eth0: Gained IPv6LL Feb 9 09:54:48.137167 systemd-networkd[1527]: Enumeration completed Feb 9 09:54:48.137275 systemd[1]: Started systemd-networkd.service. Feb 9 09:54:48.139401 systemd-networkd[1527]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:54:48.139469 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 09:54:48.142390 waagent[1476]: 2024-02-09T09:54:48.142085Z INFO Daemon Daemon Create user account if not exists Feb 9 09:54:48.148696 waagent[1476]: 2024-02-09T09:54:48.148617Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 09:54:48.157219 waagent[1476]: 2024-02-09T09:54:48.157140Z INFO Daemon Daemon Configure sudoer Feb 9 09:54:48.163025 waagent[1476]: 2024-02-09T09:54:48.162951Z INFO Daemon Daemon Configure sshd Feb 9 09:54:48.167314 waagent[1476]: 2024-02-09T09:54:48.167254Z INFO Daemon Daemon Deploy ssh public key. Feb 9 09:54:48.173858 systemd-networkd[1527]: eth0: DHCPv4 address 10.200.20.39/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 09:54:48.176510 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 09:54:49.402610 waagent[1476]: 2024-02-09T09:54:49.402517Z INFO Daemon Daemon Provisioning complete Feb 9 09:54:49.426934 waagent[1476]: 2024-02-09T09:54:49.426872Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 09:54:49.434188 waagent[1476]: 2024-02-09T09:54:49.434115Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 09:54:49.447694 waagent[1476]: 2024-02-09T09:54:49.447613Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 09:54:49.748419 waagent[1536]: 2024-02-09T09:54:49.748259Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 09:54:49.750912 waagent[1536]: 2024-02-09T09:54:49.750845Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:54:49.751182 waagent[1536]: 2024-02-09T09:54:49.751132Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:54:49.763925 waagent[1536]: 2024-02-09T09:54:49.763838Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 09:54:49.764266 waagent[1536]: 2024-02-09T09:54:49.764216Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 09:54:49.854044 waagent[1536]: 2024-02-09T09:54:49.853911Z INFO ExtHandler ExtHandler Found private key matching thumbprint 575C47585D1459C00D5A0F07B441A63D325669A3 Feb 9 09:54:49.854428 waagent[1536]: 2024-02-09T09:54:49.854372Z INFO ExtHandler ExtHandler Certificate with thumbprint B8910F831702841F93B7EF734F4F2193722C3D6E has no matching private key. Feb 9 09:54:49.854743 waagent[1536]: 2024-02-09T09:54:49.854694Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 09:54:49.868936 waagent[1536]: 2024-02-09T09:54:49.868878Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: a325449d-b5be-4fa7-9163-0160234df7dd New eTag: 17993331865570006401] Feb 9 09:54:49.869706 waagent[1536]: 2024-02-09T09:54:49.869649Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 09:54:50.003991 waagent[1536]: 2024-02-09T09:54:50.003811Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 09:54:50.025754 waagent[1536]: 2024-02-09T09:54:50.025658Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1536 Feb 9 09:54:50.029523 waagent[1536]: 2024-02-09T09:54:50.029458Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 09:54:50.030858 waagent[1536]: 2024-02-09T09:54:50.030799Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 09:54:50.134257 waagent[1536]: 2024-02-09T09:54:50.134187Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 09:54:50.134687 waagent[1536]: 2024-02-09T09:54:50.134625Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 09:54:50.142423 waagent[1536]: 2024-02-09T09:54:50.142355Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 09:54:50.142983 waagent[1536]: 2024-02-09T09:54:50.142922Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 09:54:50.144167 waagent[1536]: 2024-02-09T09:54:50.144104Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 09:54:50.145539 waagent[1536]: 2024-02-09T09:54:50.145468Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 09:54:50.146234 waagent[1536]: 2024-02-09T09:54:50.146167Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:54:50.146509 waagent[1536]: 2024-02-09T09:54:50.146455Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:54:50.147268 waagent[1536]: 2024-02-09T09:54:50.147200Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 09:54:50.147833 waagent[1536]: 2024-02-09T09:54:50.147730Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 09:54:50.148518 waagent[1536]: 2024-02-09T09:54:50.148444Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:54:50.148849 waagent[1536]: 2024-02-09T09:54:50.148661Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 09:54:50.148926 waagent[1536]: 2024-02-09T09:54:50.148850Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 09:54:50.149383 waagent[1536]: 2024-02-09T09:54:50.149304Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 09:54:50.149383 waagent[1536]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 09:54:50.149383 waagent[1536]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 09:54:50.149383 waagent[1536]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 09:54:50.149383 waagent[1536]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:54:50.149383 waagent[1536]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:54:50.149383 waagent[1536]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:54:50.149887 waagent[1536]: 2024-02-09T09:54:50.149803Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 09:54:50.150089 waagent[1536]: 2024-02-09T09:54:50.150025Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:54:50.150588 waagent[1536]: 2024-02-09T09:54:50.150519Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 09:54:50.153719 waagent[1536]: 2024-02-09T09:54:50.153544Z INFO EnvHandler ExtHandler Configure routes Feb 9 09:54:50.154151 waagent[1536]: 2024-02-09T09:54:50.154070Z INFO EnvHandler ExtHandler Gateway:None Feb 9 09:54:50.154655 waagent[1536]: 2024-02-09T09:54:50.154590Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 09:54:50.154717 waagent[1536]: 2024-02-09T09:54:50.154675Z INFO EnvHandler ExtHandler Routes:None Feb 9 09:54:50.170503 waagent[1536]: 2024-02-09T09:54:50.170434Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 09:54:50.171167 waagent[1536]: 2024-02-09T09:54:50.171115Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 09:54:50.172125 waagent[1536]: 2024-02-09T09:54:50.172066Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 09:54:50.197931 waagent[1536]: 2024-02-09T09:54:50.197795Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1527' Feb 9 09:54:50.218371 waagent[1536]: 2024-02-09T09:54:50.218300Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 09:54:50.260647 waagent[1536]: 2024-02-09T09:54:50.260504Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 09:54:50.260647 waagent[1536]: Executing ['ip', '-a', '-o', 'link']: Feb 9 09:54:50.260647 waagent[1536]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 09:54:50.260647 waagent[1536]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b7:12:32 brd ff:ff:ff:ff:ff:ff Feb 9 09:54:50.260647 waagent[1536]: 3: enP23464s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b7:12:32 brd ff:ff:ff:ff:ff:ff\ altname enP23464p0s2 Feb 9 09:54:50.260647 waagent[1536]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 09:54:50.260647 waagent[1536]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 09:54:50.260647 waagent[1536]: 2: eth0 inet 10.200.20.39/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 09:54:50.260647 waagent[1536]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 09:54:50.260647 waagent[1536]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 09:54:50.260647 waagent[1536]: 2: eth0 inet6 fe80::222:48ff:feb7:1232/64 scope link \ valid_lft forever preferred_lft forever Feb 9 09:54:50.377550 waagent[1536]: 2024-02-09T09:54:50.377481Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 09:54:50.451172 waagent[1476]: 2024-02-09T09:54:50.451039Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 09:54:50.454979 waagent[1476]: 2024-02-09T09:54:50.454916Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 09:54:51.596905 waagent[1565]: 2024-02-09T09:54:51.596808Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 09:54:51.597965 waagent[1565]: 2024-02-09T09:54:51.597905Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 09:54:51.598203 waagent[1565]: 2024-02-09T09:54:51.598154Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 09:54:51.606434 waagent[1565]: 2024-02-09T09:54:51.606322Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 09:54:51.607009 waagent[1565]: 2024-02-09T09:54:51.606954Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:54:51.607268 waagent[1565]: 2024-02-09T09:54:51.607219Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:54:51.620154 waagent[1565]: 2024-02-09T09:54:51.620082Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 09:54:51.628786 waagent[1565]: 2024-02-09T09:54:51.628716Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 09:54:51.629923 waagent[1565]: 2024-02-09T09:54:51.629867Z INFO ExtHandler Feb 9 09:54:51.630155 waagent[1565]: 2024-02-09T09:54:51.630106Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 4b3ecf44-6a45-4276-8013-6921841a4e61 eTag: 17993331865570006401 source: Fabric] Feb 9 09:54:51.630991 waagent[1565]: 2024-02-09T09:54:51.630935Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 09:54:51.632315 waagent[1565]: 2024-02-09T09:54:51.632256Z INFO ExtHandler Feb 9 09:54:51.632551 waagent[1565]: 2024-02-09T09:54:51.632502Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 09:54:51.639606 waagent[1565]: 2024-02-09T09:54:51.639560Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 09:54:51.640189 waagent[1565]: 2024-02-09T09:54:51.640144Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 09:54:51.661295 waagent[1565]: 2024-02-09T09:54:51.661232Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 09:54:51.742586 waagent[1565]: 2024-02-09T09:54:51.742450Z INFO ExtHandler Downloaded certificate {'thumbprint': 'B8910F831702841F93B7EF734F4F2193722C3D6E', 'hasPrivateKey': False} Feb 9 09:54:51.743902 waagent[1565]: 2024-02-09T09:54:51.743841Z INFO ExtHandler Downloaded certificate {'thumbprint': '575C47585D1459C00D5A0F07B441A63D325669A3', 'hasPrivateKey': True} Feb 9 09:54:51.745076 waagent[1565]: 2024-02-09T09:54:51.745016Z INFO ExtHandler Fetch goal state completed Feb 9 09:54:51.772271 waagent[1565]: 2024-02-09T09:54:51.772191Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1565 Feb 9 09:54:51.775949 waagent[1565]: 2024-02-09T09:54:51.775881Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 09:54:51.777535 waagent[1565]: 2024-02-09T09:54:51.777478Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 09:54:51.782775 waagent[1565]: 2024-02-09T09:54:51.782705Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 09:54:51.783272 waagent[1565]: 2024-02-09T09:54:51.783216Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 09:54:51.791443 waagent[1565]: 2024-02-09T09:54:51.791386Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 09:54:51.792136 waagent[1565]: 2024-02-09T09:54:51.792079Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 09:54:51.798505 waagent[1565]: 2024-02-09T09:54:51.798407Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 9 09:54:51.802275 waagent[1565]: 2024-02-09T09:54:51.802217Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 09:54:51.803981 waagent[1565]: 2024-02-09T09:54:51.803909Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 09:54:51.804267 waagent[1565]: 2024-02-09T09:54:51.804194Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:54:51.805045 waagent[1565]: 2024-02-09T09:54:51.804977Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:54:51.805667 waagent[1565]: 2024-02-09T09:54:51.805595Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 09:54:51.806007 waagent[1565]: 2024-02-09T09:54:51.805946Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 09:54:51.806007 waagent[1565]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 09:54:51.806007 waagent[1565]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 09:54:51.806007 waagent[1565]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 09:54:51.806007 waagent[1565]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:54:51.806007 waagent[1565]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:54:51.806007 waagent[1565]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:54:51.808351 waagent[1565]: 2024-02-09T09:54:51.808230Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 09:54:51.808805 waagent[1565]: 2024-02-09T09:54:51.808709Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:54:51.811088 waagent[1565]: 2024-02-09T09:54:51.809428Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:54:51.812082 waagent[1565]: 2024-02-09T09:54:51.811970Z INFO EnvHandler ExtHandler Configure routes Feb 9 09:54:51.812251 waagent[1565]: 2024-02-09T09:54:51.812191Z INFO EnvHandler ExtHandler Gateway:None Feb 9 09:54:51.812386 waagent[1565]: 2024-02-09T09:54:51.812337Z INFO EnvHandler ExtHandler Routes:None Feb 9 09:54:51.812618 waagent[1565]: 2024-02-09T09:54:51.812553Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 09:54:51.812845 waagent[1565]: 2024-02-09T09:54:51.812736Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 09:54:51.816699 waagent[1565]: 2024-02-09T09:54:51.816620Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 09:54:51.816699 waagent[1565]: Executing ['ip', '-a', '-o', 'link']: Feb 9 09:54:51.816699 waagent[1565]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 09:54:51.816699 waagent[1565]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b7:12:32 brd ff:ff:ff:ff:ff:ff Feb 9 09:54:51.816699 waagent[1565]: 3: enP23464s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b7:12:32 brd ff:ff:ff:ff:ff:ff\ altname enP23464p0s2 Feb 9 09:54:51.816699 waagent[1565]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 09:54:51.816699 waagent[1565]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 09:54:51.816699 waagent[1565]: 2: eth0 inet 10.200.20.39/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 09:54:51.816699 waagent[1565]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 09:54:51.816699 waagent[1565]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 09:54:51.816699 waagent[1565]: 2: eth0 inet6 fe80::222:48ff:feb7:1232/64 scope link \ valid_lft forever preferred_lft forever Feb 9 09:54:51.818992 waagent[1565]: 2024-02-09T09:54:51.818819Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 09:54:51.819258 waagent[1565]: 2024-02-09T09:54:51.819179Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 09:54:51.821067 waagent[1565]: 2024-02-09T09:54:51.821004Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 09:54:51.833360 waagent[1565]: 2024-02-09T09:54:51.833288Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 09:54:51.834980 waagent[1565]: 2024-02-09T09:54:51.834908Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 09:54:51.891255 waagent[1565]: 2024-02-09T09:54:51.891106Z INFO ExtHandler ExtHandler Feb 9 09:54:51.891599 waagent[1565]: 2024-02-09T09:54:51.891538Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: df999c18-a2d3-41e2-bf16-5fd25bdebac4 correlation a176a055-22cf-41cc-bac1-37e64d5dfdcc created: 2024-02-09T09:53:12.010941Z] Feb 9 09:54:51.893847 waagent[1565]: 2024-02-09T09:54:51.893771Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 09:54:51.900661 waagent[1565]: 2024-02-09T09:54:51.900596Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 9 ms] Feb 9 09:54:51.933377 waagent[1565]: 2024-02-09T09:54:51.933305Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 09:54:51.950210 waagent[1565]: 2024-02-09T09:54:51.950134Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: ADBB7A79-F125-449F-AAF2-A5DB1AD3524A;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 09:54:52.050470 waagent[1565]: 2024-02-09T09:54:52.050338Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 9 09:54:52.050470 waagent[1565]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:54:52.050470 waagent[1565]: pkts bytes target prot opt in out source destination Feb 9 09:54:52.050470 waagent[1565]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:54:52.050470 waagent[1565]: pkts bytes target prot opt in out source destination Feb 9 09:54:52.050470 waagent[1565]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:54:52.050470 waagent[1565]: pkts bytes target prot opt in out source destination Feb 9 09:54:52.050470 waagent[1565]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 09:54:52.050470 waagent[1565]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 09:54:52.050470 waagent[1565]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 09:54:52.057797 waagent[1565]: 2024-02-09T09:54:52.057649Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 09:54:52.057797 waagent[1565]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:54:52.057797 waagent[1565]: pkts bytes target prot opt in out source destination Feb 9 09:54:52.057797 waagent[1565]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:54:52.057797 waagent[1565]: pkts bytes target prot opt in out source destination Feb 9 09:54:52.057797 waagent[1565]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:54:52.057797 waagent[1565]: pkts bytes target prot opt in out source destination Feb 9 09:54:52.057797 waagent[1565]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 09:54:52.057797 waagent[1565]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 09:54:52.057797 waagent[1565]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 09:54:52.058321 waagent[1565]: 2024-02-09T09:54:52.058264Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 09:55:19.028460 systemd[1]: Created slice system-sshd.slice. Feb 9 09:55:19.029540 systemd[1]: Started sshd@0-10.200.20.39:22-10.200.12.6:46794.service. Feb 9 09:55:19.084552 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 9 09:55:19.614345 sshd[1615]: Accepted publickey for core from 10.200.12.6 port 46794 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:19.629979 sshd[1615]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:19.634559 systemd[1]: Started session-3.scope. Feb 9 09:55:19.635545 systemd-logind[1364]: New session 3 of user core. Feb 9 09:55:19.987909 systemd[1]: Started sshd@1-10.200.20.39:22-10.200.12.6:46804.service. Feb 9 09:55:20.434953 sshd[1620]: Accepted publickey for core from 10.200.12.6 port 46804 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:20.436502 sshd[1620]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:20.440114 systemd-logind[1364]: New session 4 of user core. Feb 9 09:55:20.440524 systemd[1]: Started session-4.scope. Feb 9 09:55:20.761427 sshd[1620]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:20.763567 systemd[1]: sshd@1-10.200.20.39:22-10.200.12.6:46804.service: Deactivated successfully. Feb 9 09:55:20.764246 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 09:55:20.764781 systemd-logind[1364]: Session 4 logged out. Waiting for processes to exit. Feb 9 09:55:20.765666 systemd-logind[1364]: Removed session 4. Feb 9 09:55:20.831119 systemd[1]: Started sshd@2-10.200.20.39:22-10.200.12.6:46814.service. Feb 9 09:55:21.242317 sshd[1626]: Accepted publickey for core from 10.200.12.6 port 46814 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:21.242062 sshd[1626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:21.246346 systemd[1]: Started session-5.scope. Feb 9 09:55:21.246868 systemd-logind[1364]: New session 5 of user core. Feb 9 09:55:21.538401 sshd[1626]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:21.540808 systemd[1]: sshd@2-10.200.20.39:22-10.200.12.6:46814.service: Deactivated successfully. Feb 9 09:55:21.541458 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 09:55:21.542008 systemd-logind[1364]: Session 5 logged out. Waiting for processes to exit. Feb 9 09:55:21.542804 systemd-logind[1364]: Removed session 5. Feb 9 09:55:21.607208 systemd[1]: Started sshd@3-10.200.20.39:22-10.200.12.6:46822.service. Feb 9 09:55:22.013167 sshd[1632]: Accepted publickey for core from 10.200.12.6 port 46822 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:22.014391 sshd[1632]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:22.018524 systemd[1]: Started session-6.scope. Feb 9 09:55:22.018840 systemd-logind[1364]: New session 6 of user core. Feb 9 09:55:22.313076 sshd[1632]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:22.315474 systemd[1]: sshd@3-10.200.20.39:22-10.200.12.6:46822.service: Deactivated successfully. Feb 9 09:55:22.316138 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 09:55:22.316583 systemd-logind[1364]: Session 6 logged out. Waiting for processes to exit. Feb 9 09:55:22.317312 systemd-logind[1364]: Removed session 6. Feb 9 09:55:22.389082 systemd[1]: Started sshd@4-10.200.20.39:22-10.200.12.6:46826.service. Feb 9 09:55:22.840025 sshd[1638]: Accepted publickey for core from 10.200.12.6 port 46826 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:22.841523 sshd[1638]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:22.845446 systemd[1]: Started session-7.scope. Feb 9 09:55:22.846591 systemd-logind[1364]: New session 7 of user core. Feb 9 09:55:23.285545 sudo[1641]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 09:55:23.285741 sudo[1641]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:55:23.329933 dbus-daemon[1349]: avc: received setenforce notice (enforcing=1) Feb 9 09:55:23.331701 sudo[1641]: pam_unix(sudo:session): session closed for user root Feb 9 09:55:23.416790 sshd[1638]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:23.419577 systemd[1]: sshd@4-10.200.20.39:22-10.200.12.6:46826.service: Deactivated successfully. Feb 9 09:55:23.420388 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 09:55:23.420963 systemd-logind[1364]: Session 7 logged out. Waiting for processes to exit. Feb 9 09:55:23.421983 systemd-logind[1364]: Removed session 7. Feb 9 09:55:23.486477 systemd[1]: Started sshd@5-10.200.20.39:22-10.200.12.6:46832.service. Feb 9 09:55:23.899338 sshd[1645]: Accepted publickey for core from 10.200.12.6 port 46832 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:23.900633 sshd[1645]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:23.904275 systemd-logind[1364]: New session 8 of user core. Feb 9 09:55:23.904678 systemd[1]: Started session-8.scope. Feb 9 09:55:24.137767 sudo[1649]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 09:55:24.137960 sudo[1649]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:55:24.140352 sudo[1649]: pam_unix(sudo:session): session closed for user root Feb 9 09:55:24.144370 sudo[1648]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 09:55:24.144548 sudo[1648]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:55:24.152715 systemd[1]: Stopping audit-rules.service... Feb 9 09:55:24.151000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:55:24.157671 kernel: kauditd_printk_skb: 97 callbacks suppressed Feb 9 09:55:24.157739 kernel: audit: type=1305 audit(1707472524.151:179): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:55:24.151000 audit[1652]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd8443ea0 a2=420 a3=0 items=0 ppid=1 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:24.168693 auditctl[1652]: No rules Feb 9 09:55:24.169057 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 09:55:24.169234 systemd[1]: Stopped audit-rules.service. Feb 9 09:55:24.151000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:55:24.170858 systemd[1]: Starting audit-rules.service... Feb 9 09:55:24.199444 kernel: audit: type=1300 audit(1707472524.151:179): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd8443ea0 a2=420 a3=0 items=0 ppid=1 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:24.199538 kernel: audit: type=1327 audit(1707472524.151:179): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:55:24.199568 kernel: audit: type=1131 audit(1707472524.167:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:24.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:24.216265 augenrules[1669]: No rules Feb 9 09:55:24.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:24.217153 systemd[1]: Finished audit-rules.service. Feb 9 09:55:24.234254 sudo[1648]: pam_unix(sudo:session): session closed for user root Feb 9 09:55:24.233000 audit[1648]: USER_END pid=1648 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:24.253227 kernel: audit: type=1130 audit(1707472524.215:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:24.253307 kernel: audit: type=1106 audit(1707472524.233:182): pid=1648 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:24.253348 kernel: audit: type=1104 audit(1707472524.233:183): pid=1648 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:24.233000 audit[1648]: CRED_DISP pid=1648 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:24.299957 sshd[1645]: pam_unix(sshd:session): session closed for user core Feb 9 09:55:24.299000 audit[1645]: USER_END pid=1645 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:24.324023 systemd[1]: sshd@5-10.200.20.39:22-10.200.12.6:46832.service: Deactivated successfully. Feb 9 09:55:24.299000 audit[1645]: CRED_DISP pid=1645 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:24.342691 kernel: audit: type=1106 audit(1707472524.299:184): pid=1645 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:24.342796 kernel: audit: type=1104 audit(1707472524.299:185): pid=1645 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:24.324701 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 09:55:24.343238 systemd-logind[1364]: Session 8 logged out. Waiting for processes to exit. Feb 9 09:55:24.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.39:22-10.200.12.6:46832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:24.344163 systemd-logind[1364]: Removed session 8. Feb 9 09:55:24.362769 kernel: audit: type=1131 audit(1707472524.322:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.39:22-10.200.12.6:46832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:24.368682 systemd[1]: Started sshd@6-10.200.20.39:22-10.200.12.6:46840.service. Feb 9 09:55:24.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.39:22-10.200.12.6:46840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:24.777000 audit[1675]: USER_ACCT pid=1675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:24.779250 sshd[1675]: Accepted publickey for core from 10.200.12.6 port 46840 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:55:24.778000 audit[1675]: CRED_ACQ pid=1675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:24.778000 audit[1675]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4767300 a2=3 a3=1 items=0 ppid=1 pid=1675 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:24.778000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:55:24.780763 sshd[1675]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:55:24.784531 systemd-logind[1364]: New session 9 of user core. Feb 9 09:55:24.785011 systemd[1]: Started session-9.scope. Feb 9 09:55:24.787000 audit[1675]: USER_START pid=1675 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:24.788000 audit[1677]: CRED_ACQ pid=1677 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:55:25.014000 audit[1678]: USER_ACCT pid=1678 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:25.016333 sudo[1678]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 09:55:25.014000 audit[1678]: CRED_REFR pid=1678 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:25.016528 sudo[1678]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:55:25.016000 audit[1678]: USER_START pid=1678 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:55:25.220842 update_engine[1368]: I0209 09:55:25.220410 1368 update_attempter.cc:509] Updating boot flags... Feb 9 09:55:25.903561 systemd[1]: Starting docker.service... Feb 9 09:55:25.933592 env[1732]: time="2024-02-09T09:55:25.933546119Z" level=info msg="Starting up" Feb 9 09:55:25.935738 env[1732]: time="2024-02-09T09:55:25.935709229Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 09:55:25.935738 env[1732]: time="2024-02-09T09:55:25.935731590Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 09:55:25.935903 env[1732]: time="2024-02-09T09:55:25.935779310Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 09:55:25.935903 env[1732]: time="2024-02-09T09:55:25.935791591Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 09:55:25.937433 env[1732]: time="2024-02-09T09:55:25.937407773Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 09:55:25.937433 env[1732]: time="2024-02-09T09:55:25.937429494Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 09:55:25.937508 env[1732]: time="2024-02-09T09:55:25.937441534Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 09:55:25.937508 env[1732]: time="2024-02-09T09:55:25.937449894Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 09:55:25.945000 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2873805440-merged.mount: Deactivated successfully. Feb 9 09:55:26.099485 env[1732]: time="2024-02-09T09:55:26.099438059Z" level=info msg="Loading containers: start." Feb 9 09:55:26.166000 audit[1758]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.166000 audit[1758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffff2cd460 a2=0 a3=1 items=0 ppid=1732 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.166000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 09:55:26.168000 audit[1760]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.168000 audit[1760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffe53f4870 a2=0 a3=1 items=0 ppid=1732 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.168000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 09:55:26.170000 audit[1762]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.170000 audit[1762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffce2bc000 a2=0 a3=1 items=0 ppid=1732 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.170000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 09:55:26.172000 audit[1764]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.172000 audit[1764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd1af91b0 a2=0 a3=1 items=0 ppid=1732 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.172000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 09:55:26.174000 audit[1766]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.174000 audit[1766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdcb11e00 a2=0 a3=1 items=0 ppid=1732 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.174000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 09:55:26.175000 audit[1768]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.175000 audit[1768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd3eac780 a2=0 a3=1 items=0 ppid=1732 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.175000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 09:55:26.192000 audit[1770]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.192000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc63d5b20 a2=0 a3=1 items=0 ppid=1732 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.192000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 09:55:26.194000 audit[1772]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.194000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffd59d0860 a2=0 a3=1 items=0 ppid=1732 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.194000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 09:55:26.196000 audit[1774]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.196000 audit[1774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffeadbfe10 a2=0 a3=1 items=0 ppid=1732 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.196000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:26.214000 audit[1778]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.214000 audit[1778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd65f3d70 a2=0 a3=1 items=0 ppid=1732 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.214000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:26.215000 audit[1779]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.215000 audit[1779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffdc775dc0 a2=0 a3=1 items=0 ppid=1732 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.215000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:26.237783 kernel: Initializing XFRM netlink socket Feb 9 09:55:26.256595 env[1732]: time="2024-02-09T09:55:26.256554062Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 09:55:26.308000 audit[1787]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.308000 audit[1787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffe9b24260 a2=0 a3=1 items=0 ppid=1732 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.308000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 09:55:26.333000 audit[1790]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.333000 audit[1790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe01311e0 a2=0 a3=1 items=0 ppid=1732 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.333000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 09:55:26.336000 audit[1793]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.336000 audit[1793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd547af10 a2=0 a3=1 items=0 ppid=1732 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 09:55:26.337000 audit[1795]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.337000 audit[1795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd11b9690 a2=0 a3=1 items=0 ppid=1732 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.337000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 09:55:26.339000 audit[1797]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.339000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd7c4e380 a2=0 a3=1 items=0 ppid=1732 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.339000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 09:55:26.341000 audit[1799]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.341000 audit[1799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffcd21aae0 a2=0 a3=1 items=0 ppid=1732 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.341000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 09:55:26.343000 audit[1801]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.343000 audit[1801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffc42623d0 a2=0 a3=1 items=0 ppid=1732 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.343000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 09:55:26.344000 audit[1803]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.344000 audit[1803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffcbe911b0 a2=0 a3=1 items=0 ppid=1732 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.344000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 09:55:26.346000 audit[1805]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.346000 audit[1805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffcb9bc200 a2=0 a3=1 items=0 ppid=1732 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.346000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 09:55:26.348000 audit[1807]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.348000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffea9ba570 a2=0 a3=1 items=0 ppid=1732 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 09:55:26.350000 audit[1809]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.350000 audit[1809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffceb63300 a2=0 a3=1 items=0 ppid=1732 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.350000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 09:55:26.352509 systemd-networkd[1527]: docker0: Link UP Feb 9 09:55:26.372000 audit[1813]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.372000 audit[1813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffdb23950 a2=0 a3=1 items=0 ppid=1732 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.372000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:26.373000 audit[1814]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:26.373000 audit[1814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe29c7240 a2=0 a3=1 items=0 ppid=1732 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:26.373000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:55:26.375269 env[1732]: time="2024-02-09T09:55:26.375235156Z" level=info msg="Loading containers: done." Feb 9 09:55:26.384554 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3751383710-merged.mount: Deactivated successfully. Feb 9 09:55:26.418557 env[1732]: time="2024-02-09T09:55:26.418515850Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 09:55:26.418726 env[1732]: time="2024-02-09T09:55:26.418688853Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 09:55:26.418877 env[1732]: time="2024-02-09T09:55:26.418813254Z" level=info msg="Daemon has completed initialization" Feb 9 09:55:26.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:26.451217 systemd[1]: Started docker.service. Feb 9 09:55:26.455194 env[1732]: time="2024-02-09T09:55:26.455155616Z" level=info msg="API listen on /run/docker.sock" Feb 9 09:55:26.470622 systemd[1]: Reloading. Feb 9 09:55:26.525017 /usr/lib/systemd/system-generators/torcx-generator[1861]: time="2024-02-09T09:55:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:55:26.525049 /usr/lib/systemd/system-generators/torcx-generator[1861]: time="2024-02-09T09:55:26Z" level=info msg="torcx already run" Feb 9 09:55:26.599170 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:55:26.599189 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:55:26.615978 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:55:26.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit: BPF prog-id=38 op=LOAD Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit: BPF prog-id=39 op=LOAD Feb 9 09:55:26.677000 audit: BPF prog-id=24 op=UNLOAD Feb 9 09:55:26.677000 audit: BPF prog-id=25 op=UNLOAD Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.677000 audit: BPF prog-id=40 op=LOAD Feb 9 09:55:26.678000 audit: BPF prog-id=27 op=UNLOAD Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit: BPF prog-id=41 op=LOAD Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit: BPF prog-id=42 op=LOAD Feb 9 09:55:26.678000 audit: BPF prog-id=28 op=UNLOAD Feb 9 09:55:26.678000 audit: BPF prog-id=29 op=UNLOAD Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.679000 audit: BPF prog-id=43 op=LOAD Feb 9 09:55:26.679000 audit: BPF prog-id=35 op=UNLOAD Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit: BPF prog-id=44 op=LOAD Feb 9 09:55:26.680000 audit: BPF prog-id=31 op=UNLOAD Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.680000 audit: BPF prog-id=45 op=LOAD Feb 9 09:55:26.680000 audit: BPF prog-id=37 op=UNLOAD Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit: BPF prog-id=46 op=LOAD Feb 9 09:55:26.681000 audit: BPF prog-id=21 op=UNLOAD Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.681000 audit: BPF prog-id=47 op=LOAD Feb 9 09:55:26.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit: BPF prog-id=48 op=LOAD Feb 9 09:55:26.682000 audit: BPF prog-id=22 op=UNLOAD Feb 9 09:55:26.682000 audit: BPF prog-id=23 op=UNLOAD Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit: BPF prog-id=49 op=LOAD Feb 9 09:55:26.683000 audit: BPF prog-id=32 op=UNLOAD Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit: BPF prog-id=50 op=LOAD Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.683000 audit: BPF prog-id=51 op=LOAD Feb 9 09:55:26.683000 audit: BPF prog-id=33 op=UNLOAD Feb 9 09:55:26.683000 audit: BPF prog-id=34 op=UNLOAD Feb 9 09:55:26.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:26.684000 audit: BPF prog-id=52 op=LOAD Feb 9 09:55:26.684000 audit: BPF prog-id=30 op=UNLOAD Feb 9 09:55:26.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:26.692400 systemd[1]: Started kubelet.service. Feb 9 09:55:26.755196 kubelet[1920]: E0209 09:55:26.755131 1920 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 09:55:26.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:55:26.757195 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:55:26.757310 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:55:29.936070 env[1379]: time="2024-02-09T09:55:29.936020333Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 09:55:30.855161 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1867706656.mount: Deactivated successfully. Feb 9 09:55:33.022795 env[1379]: time="2024-02-09T09:55:33.022728653Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:33.030041 env[1379]: time="2024-02-09T09:55:33.030008834Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:33.033994 env[1379]: time="2024-02-09T09:55:33.033967548Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:33.039041 env[1379]: time="2024-02-09T09:55:33.039015190Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:33.039969 env[1379]: time="2024-02-09T09:55:33.039944478Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88\"" Feb 9 09:55:33.048617 env[1379]: time="2024-02-09T09:55:33.048593071Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 09:55:35.316762 env[1379]: time="2024-02-09T09:55:35.316708060Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:35.324704 env[1379]: time="2024-02-09T09:55:35.324664999Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:35.331281 env[1379]: time="2024-02-09T09:55:35.331248288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:35.337015 env[1379]: time="2024-02-09T09:55:35.336980651Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:35.337734 env[1379]: time="2024-02-09T09:55:35.337707736Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2\"" Feb 9 09:55:35.346714 env[1379]: time="2024-02-09T09:55:35.346685563Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 09:55:36.985508 env[1379]: time="2024-02-09T09:55:36.985458625Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:36.993679 env[1379]: time="2024-02-09T09:55:36.993646842Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:36.998527 env[1379]: time="2024-02-09T09:55:36.998495915Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.003463 env[1379]: time="2024-02-09T09:55:37.003436349Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:37.004229 env[1379]: time="2024-02-09T09:55:37.004202434Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a\"" Feb 9 09:55:37.007365 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 09:55:37.027816 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 9 09:55:37.027896 kernel: audit: type=1130 audit(1707472537.005:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:37.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:37.007542 systemd[1]: Stopped kubelet.service. Feb 9 09:55:37.008943 systemd[1]: Started kubelet.service. Feb 9 09:55:37.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:37.045170 kernel: audit: type=1131 audit(1707472537.005:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:37.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:37.061463 kernel: audit: type=1130 audit(1707472537.007:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:37.065663 env[1379]: time="2024-02-09T09:55:37.065621715Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 09:55:37.085268 kubelet[1953]: E0209 09:55:37.085210 1953 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 09:55:37.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:55:37.088277 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:55:37.088401 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:55:37.107794 kernel: audit: type=1131 audit(1707472537.086:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:55:38.164516 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3161075880.mount: Deactivated successfully. Feb 9 09:55:38.791615 env[1379]: time="2024-02-09T09:55:38.791557988Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:38.798518 env[1379]: time="2024-02-09T09:55:38.798476670Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:38.804040 env[1379]: time="2024-02-09T09:55:38.804004552Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:38.807887 env[1379]: time="2024-02-09T09:55:38.807860004Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:38.808312 env[1379]: time="2024-02-09T09:55:38.808287410Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 9 09:55:38.816610 env[1379]: time="2024-02-09T09:55:38.816582654Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 09:55:39.413656 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3012108640.mount: Deactivated successfully. Feb 9 09:55:39.443847 env[1379]: time="2024-02-09T09:55:39.443793307Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:39.453521 env[1379]: time="2024-02-09T09:55:39.453473277Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:39.458383 env[1379]: time="2024-02-09T09:55:39.458349856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:39.464726 env[1379]: time="2024-02-09T09:55:39.464692748Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:39.465466 env[1379]: time="2024-02-09T09:55:39.465440822Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 09:55:39.474458 env[1379]: time="2024-02-09T09:55:39.474422550Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 09:55:40.292350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount273686355.mount: Deactivated successfully. Feb 9 09:55:44.154888 env[1379]: time="2024-02-09T09:55:44.154834586Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:44.163197 env[1379]: time="2024-02-09T09:55:44.163157727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:44.167881 env[1379]: time="2024-02-09T09:55:44.167853679Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:44.174815 env[1379]: time="2024-02-09T09:55:44.174787144Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:44.175614 env[1379]: time="2024-02-09T09:55:44.175590106Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb\"" Feb 9 09:55:44.184731 env[1379]: time="2024-02-09T09:55:44.184702091Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 09:55:44.969208 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3672265385.mount: Deactivated successfully. Feb 9 09:55:45.398481 env[1379]: time="2024-02-09T09:55:45.398435631Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:45.407398 env[1379]: time="2024-02-09T09:55:45.407361759Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:45.413005 env[1379]: time="2024-02-09T09:55:45.412975759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:45.420016 env[1379]: time="2024-02-09T09:55:45.419988160Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:45.420733 env[1379]: time="2024-02-09T09:55:45.420706857Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0\"" Feb 9 09:55:47.257390 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 09:55:47.257567 systemd[1]: Stopped kubelet.service. Feb 9 09:55:47.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:47.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:47.296122 kernel: audit: type=1130 audit(1707472547.256:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:47.296221 kernel: audit: type=1131 audit(1707472547.256:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:47.290116 systemd[1]: Started kubelet.service. Feb 9 09:55:47.314697 kernel: audit: type=1130 audit(1707472547.289:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:47.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:47.370637 kubelet[2031]: E0209 09:55:47.370588 2031 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 09:55:47.376460 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:55:47.376596 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:55:47.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:55:47.396777 kernel: audit: type=1131 audit(1707472547.376:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:55:50.811499 systemd[1]: Stopped kubelet.service. Feb 9 09:55:50.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:50.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:50.849625 kernel: audit: type=1130 audit(1707472550.810:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:50.849711 kernel: audit: type=1131 audit(1707472550.810:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:50.858411 systemd[1]: Reloading. Feb 9 09:55:50.914361 /usr/lib/systemd/system-generators/torcx-generator[2062]: time="2024-02-09T09:55:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:55:50.914703 /usr/lib/systemd/system-generators/torcx-generator[2062]: time="2024-02-09T09:55:50Z" level=info msg="torcx already run" Feb 9 09:55:50.986738 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:55:50.986788 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:55:51.003521 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:55:51.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.102785 kernel: audit: type=1400 audit(1707472551.066:405): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.102866 kernel: audit: type=1400 audit(1707472551.077:406): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.102897 kernel: audit: type=1400 audit(1707472551.077:407): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.139182 kernel: audit: type=1400 audit(1707472551.077:408): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.084000 audit: BPF prog-id=53 op=LOAD Feb 9 09:55:51.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.102000 audit: BPF prog-id=54 op=LOAD Feb 9 09:55:51.102000 audit: BPF prog-id=38 op=UNLOAD Feb 9 09:55:51.102000 audit: BPF prog-id=39 op=UNLOAD Feb 9 09:55:51.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.121000 audit: BPF prog-id=55 op=LOAD Feb 9 09:55:51.121000 audit: BPF prog-id=40 op=UNLOAD Feb 9 09:55:51.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.139000 audit: BPF prog-id=56 op=LOAD Feb 9 09:55:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.139000 audit: BPF prog-id=57 op=LOAD Feb 9 09:55:51.139000 audit: BPF prog-id=41 op=UNLOAD Feb 9 09:55:51.139000 audit: BPF prog-id=42 op=UNLOAD Feb 9 09:55:51.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.141000 audit: BPF prog-id=58 op=LOAD Feb 9 09:55:51.141000 audit: BPF prog-id=43 op=UNLOAD Feb 9 09:55:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.143000 audit: BPF prog-id=59 op=LOAD Feb 9 09:55:51.143000 audit: BPF prog-id=44 op=UNLOAD Feb 9 09:55:51.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.144000 audit: BPF prog-id=60 op=LOAD Feb 9 09:55:51.144000 audit: BPF prog-id=45 op=UNLOAD Feb 9 09:55:51.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.145000 audit: BPF prog-id=61 op=LOAD Feb 9 09:55:51.145000 audit: BPF prog-id=46 op=UNLOAD Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit: BPF prog-id=62 op=LOAD Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.146000 audit: BPF prog-id=63 op=LOAD Feb 9 09:55:51.146000 audit: BPF prog-id=47 op=UNLOAD Feb 9 09:55:51.146000 audit: BPF prog-id=48 op=UNLOAD Feb 9 09:55:51.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.148000 audit: BPF prog-id=64 op=LOAD Feb 9 09:55:51.148000 audit: BPF prog-id=49 op=UNLOAD Feb 9 09:55:51.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.149000 audit: BPF prog-id=65 op=LOAD Feb 9 09:55:51.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.149000 audit: BPF prog-id=66 op=LOAD Feb 9 09:55:51.149000 audit: BPF prog-id=50 op=UNLOAD Feb 9 09:55:51.149000 audit: BPF prog-id=51 op=UNLOAD Feb 9 09:55:51.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.151000 audit: BPF prog-id=67 op=LOAD Feb 9 09:55:51.151000 audit: BPF prog-id=52 op=UNLOAD Feb 9 09:55:51.177419 systemd[1]: Started kubelet.service. Feb 9 09:55:51.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:55:51.236953 kubelet[2122]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 09:55:51.236953 kubelet[2122]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:55:51.237277 kubelet[2122]: I0209 09:55:51.236995 2122 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 09:55:51.238296 kubelet[2122]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 09:55:51.238296 kubelet[2122]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:55:51.893635 kubelet[2122]: I0209 09:55:51.893601 2122 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 09:55:51.893635 kubelet[2122]: I0209 09:55:51.893627 2122 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 09:55:51.893844 kubelet[2122]: I0209 09:55:51.893825 2122 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 09:55:51.897539 kubelet[2122]: E0209 09:55:51.897519 2122 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.39:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:51.897739 kubelet[2122]: I0209 09:55:51.897727 2122 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:55:51.898285 kubelet[2122]: W0209 09:55:51.898270 2122 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 09:55:51.898782 kubelet[2122]: I0209 09:55:51.898745 2122 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 09:55:51.898989 kubelet[2122]: I0209 09:55:51.898976 2122 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 09:55:51.899061 kubelet[2122]: I0209 09:55:51.899046 2122 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 09:55:51.899143 kubelet[2122]: I0209 09:55:51.899070 2122 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 09:55:51.899143 kubelet[2122]: I0209 09:55:51.899080 2122 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 09:55:51.899192 kubelet[2122]: I0209 09:55:51.899171 2122 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:55:51.901781 kubelet[2122]: I0209 09:55:51.901744 2122 kubelet.go:398] "Attempting to sync node with API server" Feb 9 09:55:51.901941 kubelet[2122]: I0209 09:55:51.901929 2122 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 09:55:51.902029 kubelet[2122]: I0209 09:55:51.902018 2122 kubelet.go:297] "Adding apiserver pod source" Feb 9 09:55:51.902089 kubelet[2122]: I0209 09:55:51.902080 2122 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 09:55:51.902200 kubelet[2122]: W0209 09:55:51.902152 2122 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.39:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-f6c11093dc&limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:51.902247 kubelet[2122]: E0209 09:55:51.902207 2122 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.39:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-f6c11093dc&limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:51.902906 kubelet[2122]: I0209 09:55:51.902889 2122 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 09:55:51.903223 kubelet[2122]: W0209 09:55:51.903207 2122 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 09:55:51.903614 kubelet[2122]: I0209 09:55:51.903595 2122 server.go:1186] "Started kubelet" Feb 9 09:55:51.903844 kubelet[2122]: W0209 09:55:51.903810 2122 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.39:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:51.903939 kubelet[2122]: E0209 09:55:51.903926 2122 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.39:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:51.903000 audit[2122]: AVC avc: denied { mac_admin } for pid=2122 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.903000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:55:51.903000 audit[2122]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000909e90 a1=40006fdfe0 a2=4000909e60 a3=25 items=0 ppid=1 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:51.903000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:55:51.905806 kubelet[2122]: I0209 09:55:51.905791 2122 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 09:55:51.904000 audit[2122]: AVC avc: denied { mac_admin } for pid=2122 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:51.904000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:55:51.904000 audit[2122]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000869260 a1=4000d5a000 a2=4000909f20 a3=25 items=0 ppid=1 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:51.904000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:55:51.906091 kubelet[2122]: I0209 09:55:51.906079 2122 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 09:55:51.906205 kubelet[2122]: I0209 09:55:51.906195 2122 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 09:55:51.906000 audit[2132]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:51.906000 audit[2132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffffe9fef0 a2=0 a3=1 items=0 ppid=2122 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:51.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:55:51.908709 kubelet[2122]: I0209 09:55:51.908695 2122 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 09:55:51.909297 kubelet[2122]: I0209 09:55:51.909281 2122 server.go:451] "Adding debug handlers to kubelet server" Feb 9 09:55:51.911334 kubelet[2122]: I0209 09:55:51.911312 2122 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 09:55:51.912551 kubelet[2122]: E0209 09:55:51.911866 2122 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-f6c11093dc?timeout=10s": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:51.912551 kubelet[2122]: E0209 09:55:51.911927 2122 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f6c11093dc.17b2293d47f142d4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f6c11093dc", UID:"ci-3510.3.2-a-f6c11093dc", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 903576788, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 903576788, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.20.39:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.39:6443: connect: connection refused'(may retry after sleeping) Feb 9 09:55:51.912551 kubelet[2122]: I0209 09:55:51.912071 2122 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 09:55:51.912745 kubelet[2122]: W0209 09:55:51.912411 2122 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.39:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:51.912745 kubelet[2122]: E0209 09:55:51.912444 2122 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.39:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:51.913350 kubelet[2122]: E0209 09:55:51.913322 2122 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 09:55:51.913418 kubelet[2122]: E0209 09:55:51.913362 2122 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 09:55:51.912000 audit[2133]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:51.912000 audit[2133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe2836e20 a2=0 a3=1 items=0 ppid=2122 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:51.912000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:55:51.914000 audit[2135]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:51.914000 audit[2135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff6abe640 a2=0 a3=1 items=0 ppid=2122 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:51.914000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:55:51.915000 audit[2137]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:51.915000 audit[2137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd2e9f8d0 a2=0 a3=1 items=0 ppid=2122 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:51.915000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:55:51.965000 audit[2144]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:51.965000 audit[2144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe1e074e0 a2=0 a3=1 items=0 ppid=2122 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:51.965000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 09:55:51.966000 audit[2145]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:51.966000 audit[2145]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe4921db0 a2=0 a3=1 items=0 ppid=2122 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:51.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 09:55:51.988809 kubelet[2122]: I0209 09:55:51.988789 2122 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 09:55:51.988936 kubelet[2122]: I0209 09:55:51.988927 2122 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 09:55:51.989032 kubelet[2122]: I0209 09:55:51.989023 2122 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:55:51.994433 kubelet[2122]: I0209 09:55:51.994412 2122 policy_none.go:49] "None policy: Start" Feb 9 09:55:51.995081 kubelet[2122]: I0209 09:55:51.995070 2122 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 09:55:51.995180 kubelet[2122]: I0209 09:55:51.995171 2122 state_mem.go:35] "Initializing new in-memory state store" Feb 9 09:55:52.002849 systemd[1]: Created slice kubepods.slice. Feb 9 09:55:52.006888 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 09:55:52.009470 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 09:55:52.013774 kubelet[2122]: I0209 09:55:52.013742 2122 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.014209 kubelet[2122]: E0209 09:55:52.014193 2122 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.39:6443/api/v1/nodes\": dial tcp 10.200.20.39:6443: connect: connection refused" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.017409 kubelet[2122]: I0209 09:55:52.017395 2122 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 09:55:52.015000 audit[2122]: AVC avc: denied { mac_admin } for pid=2122 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:52.015000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:55:52.015000 audit[2122]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000909530 a1=4000f12e40 a2=4000909500 a3=25 items=0 ppid=1 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.015000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:55:52.017774 kubelet[2122]: I0209 09:55:52.017762 2122 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 09:55:52.017993 kubelet[2122]: I0209 09:55:52.017981 2122 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 09:55:52.020524 kubelet[2122]: E0209 09:55:52.020507 2122 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-f6c11093dc\" not found" Feb 9 09:55:52.042000 audit[2148]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_rule pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:52.042000 audit[2148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffff7ee170 a2=0 a3=1 items=0 ppid=2122 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 09:55:52.081000 audit[2151]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:52.081000 audit[2151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffe92ff8d0 a2=0 a3=1 items=0 ppid=2122 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 09:55:52.082000 audit[2152]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:52.082000 audit[2152]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdd48f010 a2=0 a3=1 items=0 ppid=2122 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 09:55:52.083000 audit[2153]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:52.083000 audit[2153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2673090 a2=0 a3=1 items=0 ppid=2122 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:55:52.085000 audit[2155]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:52.085000 audit[2155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd6faa060 a2=0 a3=1 items=0 ppid=2122 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 09:55:52.087000 audit[2157]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:52.087000 audit[2157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffc2fee530 a2=0 a3=1 items=0 ppid=2122 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:55:52.089000 audit[2159]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_rule pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:52.089000 audit[2159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffdaecc5e0 a2=0 a3=1 items=0 ppid=2122 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 09:55:52.091000 audit[2161]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_rule pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:52.091000 audit[2161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffd25b89f0 a2=0 a3=1 items=0 ppid=2122 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.091000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 09:55:52.093000 audit[2163]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_rule pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:52.093000 audit[2163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffe3342050 a2=0 a3=1 items=0 ppid=2122 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 09:55:52.095935 kubelet[2122]: I0209 09:55:52.095910 2122 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 09:55:52.094000 audit[2164]: NETFILTER_CFG table=mangle:44 family=2 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:52.094000 audit[2164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef343ec0 a2=0 a3=1 items=0 ppid=2122 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.094000 audit[2165]: NETFILTER_CFG table=mangle:45 family=10 entries=2 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.094000 audit[2165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcb5510b0 a2=0 a3=1 items=0 ppid=2122 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:55:52.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:55:52.095000 audit[2166]: NETFILTER_CFG table=nat:46 family=10 entries=2 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.095000 audit[2166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffea698c10 a2=0 a3=1 items=0 ppid=2122 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 09:55:52.096000 audit[2167]: NETFILTER_CFG table=nat:47 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:52.096000 audit[2167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe92c5510 a2=0 a3=1 items=0 ppid=2122 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.096000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:55:52.097000 audit[2169]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:55:52.097000 audit[2169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffeac8780 a2=0 a3=1 items=0 ppid=2122 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:55:52.098000 audit[2170]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_rule pid=2170 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.098000 audit[2170]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe67bf270 a2=0 a3=1 items=0 ppid=2122 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.098000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 09:55:52.099000 audit[2171]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.099000 audit[2171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd7616b40 a2=0 a3=1 items=0 ppid=2122 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:55:52.101000 audit[2173]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.101000 audit[2173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=fffff6cfc670 a2=0 a3=1 items=0 ppid=2122 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 09:55:52.101000 audit[2174]: NETFILTER_CFG table=nat:52 family=10 entries=1 op=nft_register_chain pid=2174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.101000 audit[2174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff13f49d0 a2=0 a3=1 items=0 ppid=2122 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 09:55:52.102000 audit[2175]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.102000 audit[2175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9b3a1d0 a2=0 a3=1 items=0 ppid=2122 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.102000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:55:52.104000 audit[2177]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.104000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe1d4f7e0 a2=0 a3=1 items=0 ppid=2122 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.104000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 09:55:52.106000 audit[2179]: NETFILTER_CFG table=nat:55 family=10 entries=2 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.106000 audit[2179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd4973970 a2=0 a3=1 items=0 ppid=2122 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.106000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:55:52.108000 audit[2181]: NETFILTER_CFG table=nat:56 family=10 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.108000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffd08ef440 a2=0 a3=1 items=0 ppid=2122 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 09:55:52.109000 audit[2183]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.109000 audit[2183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffc77bd830 a2=0 a3=1 items=0 ppid=2122 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 09:55:52.112303 kubelet[2122]: E0209 09:55:52.112264 2122 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-f6c11093dc?timeout=10s": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:52.141000 audit[2185]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_rule pid=2185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.141000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=fffffd4dbe20 a2=0 a3=1 items=0 ppid=2122 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 09:55:52.143551 kubelet[2122]: I0209 09:55:52.143528 2122 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 09:55:52.143551 kubelet[2122]: I0209 09:55:52.143552 2122 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 09:55:52.142000 audit[2186]: NETFILTER_CFG table=mangle:59 family=10 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.142000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd604c820 a2=0 a3=1 items=0 ppid=2122 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:55:52.143000 audit[2187]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.143000 audit[2187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc22dc50 a2=0 a3=1 items=0 ppid=2122 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.143000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:55:52.144000 audit[2188]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:55:52.144000 audit[2188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe4325030 a2=0 a3=1 items=0 ppid=2122 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:52.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:55:52.146739 kubelet[2122]: I0209 09:55:52.143569 2122 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 09:55:52.146739 kubelet[2122]: E0209 09:55:52.143615 2122 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 09:55:52.147014 kubelet[2122]: W0209 09:55:52.146962 2122 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.39:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:52.147123 kubelet[2122]: E0209 09:55:52.147112 2122 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.39:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:52.216419 kubelet[2122]: I0209 09:55:52.216395 2122 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.216948 kubelet[2122]: E0209 09:55:52.216935 2122 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.39:6443/api/v1/nodes\": dial tcp 10.200.20.39:6443: connect: connection refused" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.244079 kubelet[2122]: I0209 09:55:52.244049 2122 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:55:52.245459 kubelet[2122]: I0209 09:55:52.245435 2122 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:55:52.247690 kubelet[2122]: I0209 09:55:52.247665 2122 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:55:52.248352 kubelet[2122]: I0209 09:55:52.248329 2122 status_manager.go:698] "Failed to get status for pod" podUID=daf5258dec490896c4b7f781909cca73 pod="kube-system/kube-apiserver-ci-3510.3.2-a-f6c11093dc" err="Get \"https://10.200.20.39:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-a-f6c11093dc\": dial tcp 10.200.20.39:6443: connect: connection refused" Feb 9 09:55:52.250134 kubelet[2122]: I0209 09:55:52.250101 2122 status_manager.go:698] "Failed to get status for pod" podUID=08a1346cc948d1036a78fa89aefa1bf7 pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f6c11093dc" err="Get \"https://10.200.20.39:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-a-f6c11093dc\": dial tcp 10.200.20.39:6443: connect: connection refused" Feb 9 09:55:52.252320 systemd[1]: Created slice kubepods-burstable-poddaf5258dec490896c4b7f781909cca73.slice. Feb 9 09:55:52.254942 kubelet[2122]: I0209 09:55:52.254921 2122 status_manager.go:698] "Failed to get status for pod" podUID=c71e1da94f27b669fee6d73d6e727150 pod="kube-system/kube-scheduler-ci-3510.3.2-a-f6c11093dc" err="Get \"https://10.200.20.39:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-a-f6c11093dc\": dial tcp 10.200.20.39:6443: connect: connection refused" Feb 9 09:55:52.266202 systemd[1]: Created slice kubepods-burstable-pod08a1346cc948d1036a78fa89aefa1bf7.slice. Feb 9 09:55:52.275889 systemd[1]: Created slice kubepods-burstable-podc71e1da94f27b669fee6d73d6e727150.slice. Feb 9 09:55:52.316309 kubelet[2122]: I0209 09:55:52.316283 2122 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/08a1346cc948d1036a78fa89aefa1bf7-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-f6c11093dc\" (UID: \"08a1346cc948d1036a78fa89aefa1bf7\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.316527 kubelet[2122]: I0209 09:55:52.316515 2122 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/08a1346cc948d1036a78fa89aefa1bf7-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-f6c11093dc\" (UID: \"08a1346cc948d1036a78fa89aefa1bf7\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.316608 kubelet[2122]: I0209 09:55:52.316599 2122 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/daf5258dec490896c4b7f781909cca73-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-f6c11093dc\" (UID: \"daf5258dec490896c4b7f781909cca73\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.316715 kubelet[2122]: I0209 09:55:52.316705 2122 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/daf5258dec490896c4b7f781909cca73-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-f6c11093dc\" (UID: \"daf5258dec490896c4b7f781909cca73\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.316852 kubelet[2122]: I0209 09:55:52.316822 2122 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/08a1346cc948d1036a78fa89aefa1bf7-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-f6c11093dc\" (UID: \"08a1346cc948d1036a78fa89aefa1bf7\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.316904 kubelet[2122]: I0209 09:55:52.316865 2122 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/08a1346cc948d1036a78fa89aefa1bf7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-f6c11093dc\" (UID: \"08a1346cc948d1036a78fa89aefa1bf7\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.316904 kubelet[2122]: I0209 09:55:52.316895 2122 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c71e1da94f27b669fee6d73d6e727150-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-f6c11093dc\" (UID: \"c71e1da94f27b669fee6d73d6e727150\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.316961 kubelet[2122]: I0209 09:55:52.316916 2122 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/daf5258dec490896c4b7f781909cca73-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-f6c11093dc\" (UID: \"daf5258dec490896c4b7f781909cca73\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.316961 kubelet[2122]: I0209 09:55:52.316938 2122 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/08a1346cc948d1036a78fa89aefa1bf7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-f6c11093dc\" (UID: \"08a1346cc948d1036a78fa89aefa1bf7\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.513070 kubelet[2122]: E0209 09:55:52.513033 2122 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-f6c11093dc?timeout=10s": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:52.565146 env[1379]: time="2024-02-09T09:55:52.565104694Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-f6c11093dc,Uid:daf5258dec490896c4b7f781909cca73,Namespace:kube-system,Attempt:0,}" Feb 9 09:55:52.575007 env[1379]: time="2024-02-09T09:55:52.574972890Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-f6c11093dc,Uid:08a1346cc948d1036a78fa89aefa1bf7,Namespace:kube-system,Attempt:0,}" Feb 9 09:55:52.578626 env[1379]: time="2024-02-09T09:55:52.578594743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-f6c11093dc,Uid:c71e1da94f27b669fee6d73d6e727150,Namespace:kube-system,Attempt:0,}" Feb 9 09:55:52.618166 kubelet[2122]: I0209 09:55:52.618145 2122 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.618681 kubelet[2122]: E0209 09:55:52.618664 2122 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.39:6443/api/v1/nodes\": dial tcp 10.200.20.39:6443: connect: connection refused" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:52.862989 kubelet[2122]: W0209 09:55:52.862869 2122 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.39:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-f6c11093dc&limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:52.862989 kubelet[2122]: E0209 09:55:52.862923 2122 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.39:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-f6c11093dc&limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:52.981169 kubelet[2122]: W0209 09:55:52.981119 2122 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.39:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:52.981169 kubelet[2122]: E0209 09:55:52.981172 2122 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.39:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:53.281118 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2419904288.mount: Deactivated successfully. Feb 9 09:55:53.303065 env[1379]: time="2024-02-09T09:55:53.303021912Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:53.314095 kubelet[2122]: E0209 09:55:53.314040 2122 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-f6c11093dc?timeout=10s": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:53.322259 env[1379]: time="2024-02-09T09:55:53.322218507Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:53.327278 env[1379]: time="2024-02-09T09:55:53.327251489Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:53.331259 env[1379]: time="2024-02-09T09:55:53.331227912Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:53.338371 env[1379]: time="2024-02-09T09:55:53.338339975Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:53.346062 env[1379]: time="2024-02-09T09:55:53.346034212Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:53.349643 env[1379]: time="2024-02-09T09:55:53.349619400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:53.355810 env[1379]: time="2024-02-09T09:55:53.355779612Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:53.363732 env[1379]: time="2024-02-09T09:55:53.363701142Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:53.368683 kubelet[2122]: W0209 09:55:53.368640 2122 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.39:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:53.368683 kubelet[2122]: E0209 09:55:53.368690 2122 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.39:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:53.369316 env[1379]: time="2024-02-09T09:55:53.369288261Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:53.378471 env[1379]: time="2024-02-09T09:55:53.378436650Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:53.397621 env[1379]: time="2024-02-09T09:55:53.397584891Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:55:53.420519 kubelet[2122]: I0209 09:55:53.420492 2122 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:53.420872 kubelet[2122]: E0209 09:55:53.420850 2122 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.39:6443/api/v1/nodes\": dial tcp 10.200.20.39:6443: connect: connection refused" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:53.421198 env[1379]: time="2024-02-09T09:55:53.421048076Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:55:53.421198 env[1379]: time="2024-02-09T09:55:53.421087551Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:55:53.421198 env[1379]: time="2024-02-09T09:55:53.421097550Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:55:53.421793 env[1379]: time="2024-02-09T09:55:53.421374958Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9908691b4ce47b122c4f709c38a10e2f35568a2052800a53cd252955d363c819 pid=2197 runtime=io.containerd.runc.v2 Feb 9 09:55:53.437067 systemd[1]: Started cri-containerd-9908691b4ce47b122c4f709c38a10e2f35568a2052800a53cd252955d363c819.scope. Feb 9 09:55:53.474717 kernel: kauditd_printk_skb: 280 callbacks suppressed Feb 9 09:55:53.474839 kernel: audit: type=1400 audit(1707472553.450:614): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.493492 kernel: audit: type=1400 audit(1707472553.450:615): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.536418 kernel: audit: type=1400 audit(1707472553.450:616): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.536527 kernel: audit: type=1400 audit(1707472553.450:617): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.537599 env[1379]: time="2024-02-09T09:55:53.525039692Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:55:53.537599 env[1379]: time="2024-02-09T09:55:53.525075567Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:55:53.537599 env[1379]: time="2024-02-09T09:55:53.525085366Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:55:53.537599 env[1379]: time="2024-02-09T09:55:53.525279144Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c0edfaac788d2efe34ea846cc3817ee6f2f159655d7b3a1e8f4cf2ca1a055aa0 pid=2230 runtime=io.containerd.runc.v2 Feb 9 09:55:53.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.556966 kernel: audit: type=1400 audit(1707472553.450:618): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.572922 systemd[1]: Started cri-containerd-c0edfaac788d2efe34ea846cc3817ee6f2f159655d7b3a1e8f4cf2ca1a055aa0.scope. Feb 9 09:55:53.584324 kernel: audit: type=1400 audit(1707472553.450:619): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.584468 env[1379]: time="2024-02-09T09:55:53.579637781Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:55:53.584468 env[1379]: time="2024-02-09T09:55:53.579673896Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:55:53.584468 env[1379]: time="2024-02-09T09:55:53.579683575Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:55:53.584468 env[1379]: time="2024-02-09T09:55:53.579801922Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ae0afd89ec6a2467ab82dccad1977b43305a18c5396217d110bfbfd7bfd2a497 pid=2257 runtime=io.containerd.runc.v2 Feb 9 09:55:53.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.602975 kernel: audit: type=1400 audit(1707472553.450:620): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.621552 kernel: audit: type=1400 audit(1707472553.450:621): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.621675 kernel: audit: type=1400 audit(1707472553.450:622): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.628318 env[1379]: time="2024-02-09T09:55:53.628267435Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-f6c11093dc,Uid:daf5258dec490896c4b7f781909cca73,Namespace:kube-system,Attempt:0,} returns sandbox id \"9908691b4ce47b122c4f709c38a10e2f35568a2052800a53cd252955d363c819\"" Feb 9 09:55:53.631778 env[1379]: time="2024-02-09T09:55:53.631730357Z" level=info msg="CreateContainer within sandbox \"9908691b4ce47b122c4f709c38a10e2f35568a2052800a53cd252955d363c819\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 09:55:53.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.651058 systemd[1]: Started cri-containerd-ae0afd89ec6a2467ab82dccad1977b43305a18c5396217d110bfbfd7bfd2a497.scope. Feb 9 09:55:53.657630 kernel: audit: type=1400 audit(1707472553.450:623): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.450000 audit: BPF prog-id=68 op=LOAD Feb 9 09:55:53.450000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.450000 audit[2206]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2197 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939303836393162346365343762313232633466373039633338613130 Feb 9 09:55:53.451000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.451000 audit[2206]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2197 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939303836393162346365343762313232633466373039633338613130 Feb 9 09:55:53.451000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.451000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.451000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.451000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.451000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.451000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.451000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.451000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.451000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.451000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.451000 audit: BPF prog-id=69 op=LOAD Feb 9 09:55:53.451000 audit[2206]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2197 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939303836393162346365343762313232633466373039633338613130 Feb 9 09:55:53.456000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.456000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.456000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.456000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.456000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.456000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.456000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.456000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.456000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.456000 audit: BPF prog-id=70 op=LOAD Feb 9 09:55:53.456000 audit[2206]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2197 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939303836393162346365343762313232633466373039633338613130 Feb 9 09:55:53.473000 audit: BPF prog-id=70 op=UNLOAD Feb 9 09:55:53.473000 audit: BPF prog-id=69 op=UNLOAD Feb 9 09:55:53.473000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.473000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.473000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.473000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.473000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.473000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.473000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.473000 audit[2206]: AVC avc: denied { perfmon } for pid=2206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.473000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.473000 audit[2206]: AVC avc: denied { bpf } for pid=2206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.473000 audit: BPF prog-id=71 op=LOAD Feb 9 09:55:53.473000 audit[2206]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2197 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939303836393162346365343762313232633466373039633338613130 Feb 9 09:55:53.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.634000 audit: BPF prog-id=72 op=LOAD Feb 9 09:55:53.635000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.635000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2230 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330656466616163373838643265666533346561383436636333383137 Feb 9 09:55:53.661000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.661000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2230 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330656466616163373838643265666533346561383436636333383137 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit: BPF prog-id=73 op=LOAD Feb 9 09:55:53.662000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2230 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330656466616163373838643265666533346561383436636333383137 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit: BPF prog-id=74 op=LOAD Feb 9 09:55:53.662000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2230 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330656466616163373838643265666533346561383436636333383137 Feb 9 09:55:53.662000 audit: BPF prog-id=74 op=UNLOAD Feb 9 09:55:53.662000 audit: BPF prog-id=73 op=UNLOAD Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { perfmon } for pid=2241 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit[2241]: AVC avc: denied { bpf } for pid=2241 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.662000 audit: BPF prog-id=75 op=LOAD Feb 9 09:55:53.662000 audit[2241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2230 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330656466616163373838643265666533346561383436636333383137 Feb 9 09:55:53.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.671000 audit: BPF prog-id=76 op=LOAD Feb 9 09:55:53.672000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.672000 audit[2280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2257 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165306166643839656336613234363761623832646363616431393737 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2257 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165306166643839656336613234363761623832646363616431393737 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit: BPF prog-id=77 op=LOAD Feb 9 09:55:53.673000 audit[2280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2257 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165306166643839656336613234363761623832646363616431393737 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit: BPF prog-id=78 op=LOAD Feb 9 09:55:53.673000 audit[2280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2257 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165306166643839656336613234363761623832646363616431393737 Feb 9 09:55:53.673000 audit: BPF prog-id=78 op=UNLOAD Feb 9 09:55:53.673000 audit: BPF prog-id=77 op=UNLOAD Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.673000 audit: BPF prog-id=79 op=LOAD Feb 9 09:55:53.673000 audit[2280]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2257 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165306166643839656336613234363761623832646363616431393737 Feb 9 09:55:53.695739 env[1379]: time="2024-02-09T09:55:53.695695451Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-f6c11093dc,Uid:c71e1da94f27b669fee6d73d6e727150,Namespace:kube-system,Attempt:0,} returns sandbox id \"c0edfaac788d2efe34ea846cc3817ee6f2f159655d7b3a1e8f4cf2ca1a055aa0\"" Feb 9 09:55:53.699176 env[1379]: time="2024-02-09T09:55:53.699130256Z" level=info msg="CreateContainer within sandbox \"c0edfaac788d2efe34ea846cc3817ee6f2f159655d7b3a1e8f4cf2ca1a055aa0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 09:55:53.699518 env[1379]: time="2024-02-09T09:55:53.699479496Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-f6c11093dc,Uid:08a1346cc948d1036a78fa89aefa1bf7,Namespace:kube-system,Attempt:0,} returns sandbox id \"ae0afd89ec6a2467ab82dccad1977b43305a18c5396217d110bfbfd7bfd2a497\"" Feb 9 09:55:53.702190 env[1379]: time="2024-02-09T09:55:53.702151709Z" level=info msg="CreateContainer within sandbox \"ae0afd89ec6a2467ab82dccad1977b43305a18c5396217d110bfbfd7bfd2a497\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 09:55:53.710933 env[1379]: time="2024-02-09T09:55:53.710883906Z" level=info msg="CreateContainer within sandbox \"9908691b4ce47b122c4f709c38a10e2f35568a2052800a53cd252955d363c819\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"39a6a28b6ec1d8dee54fe02bf7a7ef62c3237c5a73a1cbe8f2cccc57ddbef027\"" Feb 9 09:55:53.711720 env[1379]: time="2024-02-09T09:55:53.711690973Z" level=info msg="StartContainer for \"39a6a28b6ec1d8dee54fe02bf7a7ef62c3237c5a73a1cbe8f2cccc57ddbef027\"" Feb 9 09:55:53.726598 systemd[1]: Started cri-containerd-39a6a28b6ec1d8dee54fe02bf7a7ef62c3237c5a73a1cbe8f2cccc57ddbef027.scope. Feb 9 09:55:53.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.737000 audit: BPF prog-id=80 op=LOAD Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2197 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613661323862366563316438646565353466653032626637613765 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2197 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613661323862366563316438646565353466653032626637613765 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit: BPF prog-id=81 op=LOAD Feb 9 09:55:53.739000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2197 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613661323862366563316438646565353466653032626637613765 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit: BPF prog-id=82 op=LOAD Feb 9 09:55:53.739000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2197 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613661323862366563316438646565353466653032626637613765 Feb 9 09:55:53.739000 audit: BPF prog-id=82 op=UNLOAD Feb 9 09:55:53.739000 audit: BPF prog-id=81 op=UNLOAD Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.739000 audit: BPF prog-id=83 op=LOAD Feb 9 09:55:53.739000 audit[2322]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2197 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613661323862366563316438646565353466653032626637613765 Feb 9 09:55:53.745469 kubelet[2122]: W0209 09:55:53.745435 2122 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.39:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:53.745469 kubelet[2122]: E0209 09:55:53.745472 2122 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.39:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.39:6443: connect: connection refused Feb 9 09:55:53.770306 env[1379]: time="2024-02-09T09:55:53.770256087Z" level=info msg="CreateContainer within sandbox \"ae0afd89ec6a2467ab82dccad1977b43305a18c5396217d110bfbfd7bfd2a497\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"402a1c9cafd48b026cdd52f307e1d778ffdfb4315ac9d22fe56e9be799dd9dde\"" Feb 9 09:55:53.770842 env[1379]: time="2024-02-09T09:55:53.770810943Z" level=info msg="StartContainer for \"402a1c9cafd48b026cdd52f307e1d778ffdfb4315ac9d22fe56e9be799dd9dde\"" Feb 9 09:55:53.774243 env[1379]: time="2024-02-09T09:55:53.774201354Z" level=info msg="StartContainer for \"39a6a28b6ec1d8dee54fe02bf7a7ef62c3237c5a73a1cbe8f2cccc57ddbef027\" returns successfully" Feb 9 09:55:53.787005 env[1379]: time="2024-02-09T09:55:53.786949969Z" level=info msg="CreateContainer within sandbox \"c0edfaac788d2efe34ea846cc3817ee6f2f159655d7b3a1e8f4cf2ca1a055aa0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"5c17542d071c87d64ba2b5e834d7179a78c2870f3714510b7672d844ffce04ef\"" Feb 9 09:55:53.787631 env[1379]: time="2024-02-09T09:55:53.787547341Z" level=info msg="StartContainer for \"5c17542d071c87d64ba2b5e834d7179a78c2870f3714510b7672d844ffce04ef\"" Feb 9 09:55:53.799303 systemd[1]: Started cri-containerd-402a1c9cafd48b026cdd52f307e1d778ffdfb4315ac9d22fe56e9be799dd9dde.scope. Feb 9 09:55:53.813458 systemd[1]: Started cri-containerd-5c17542d071c87d64ba2b5e834d7179a78c2870f3714510b7672d844ffce04ef.scope. Feb 9 09:55:53.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.824000 audit: BPF prog-id=84 op=LOAD Feb 9 09:55:53.825000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.825000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2257 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326131633963616664343862303236636464353266333037653164 Feb 9 09:55:53.825000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.825000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2257 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326131633963616664343862303236636464353266333037653164 Feb 9 09:55:53.826000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.826000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.826000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.826000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.826000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.826000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.827000 audit: BPF prog-id=85 op=LOAD Feb 9 09:55:53.826000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.826000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.826000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2230 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563313735343264303731633837643634626132623565383334643731 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2230 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563313735343264303731633837643634626132623565383334643731 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit: BPF prog-id=86 op=LOAD Feb 9 09:55:53.828000 audit[2372]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2230 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563313735343264303731633837643634626132623565383334643731 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit: BPF prog-id=87 op=LOAD Feb 9 09:55:53.828000 audit[2372]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2230 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563313735343264303731633837643634626132623565383334643731 Feb 9 09:55:53.828000 audit: BPF prog-id=87 op=UNLOAD Feb 9 09:55:53.828000 audit: BPF prog-id=86 op=UNLOAD Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { perfmon } for pid=2372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.828000 audit: BPF prog-id=88 op=LOAD Feb 9 09:55:53.828000 audit[2372]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2230 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563313735343264303731633837643634626132623565383334643731 Feb 9 09:55:53.826000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.826000 audit: BPF prog-id=89 op=LOAD Feb 9 09:55:53.826000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2257 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326131633963616664343862303236636464353266333037653164 Feb 9 09:55:53.831000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.831000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.831000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.831000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.831000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.831000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.831000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.831000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.831000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.831000 audit: BPF prog-id=90 op=LOAD Feb 9 09:55:53.831000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2257 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326131633963616664343862303236636464353266333037653164 Feb 9 09:55:53.833000 audit: BPF prog-id=90 op=UNLOAD Feb 9 09:55:53.833000 audit: BPF prog-id=89 op=UNLOAD Feb 9 09:55:53.833000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.833000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.833000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.833000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.833000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.833000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.833000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.833000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.833000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.833000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:55:53.833000 audit: BPF prog-id=91 op=LOAD Feb 9 09:55:53.833000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2257 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:55:53.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326131633963616664343862303236636464353266333037653164 Feb 9 09:55:53.867791 env[1379]: time="2024-02-09T09:55:53.867714293Z" level=info msg="StartContainer for \"5c17542d071c87d64ba2b5e834d7179a78c2870f3714510b7672d844ffce04ef\" returns successfully" Feb 9 09:55:53.878716 env[1379]: time="2024-02-09T09:55:53.878656636Z" level=info msg="StartContainer for \"402a1c9cafd48b026cdd52f307e1d778ffdfb4315ac9d22fe56e9be799dd9dde\" returns successfully" Feb 9 09:55:54.277378 systemd[1]: run-containerd-runc-k8s.io-9908691b4ce47b122c4f709c38a10e2f35568a2052800a53cd252955d363c819-runc.HfGKpd.mount: Deactivated successfully. Feb 9 09:55:55.022920 kubelet[2122]: I0209 09:55:55.022895 2122 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:56.879000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c610,c849 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:56.879000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40046d8000 a2=fc6 a3=0 items=0 ppid=2197 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c610,c849 key=(null) Feb 9 09:55:56.879000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:55:56.879000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c610,c849 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:56.879000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=400296a040 a2=fc6 a3=0 items=0 ppid=2197 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c610,c849 key=(null) Feb 9 09:55:56.879000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:55:56.880000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c610,c849 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:56.880000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40046d8120 a2=fc6 a3=0 items=0 ppid=2197 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c610,c849 key=(null) Feb 9 09:55:56.880000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:55:56.896000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c610,c849 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:56.896000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=400297e680 a2=fc6 a3=0 items=0 ppid=2197 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c610,c849 key=(null) Feb 9 09:55:56.896000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:55:56.896000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c610,c849 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:56.896000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=4004671f80 a2=fc6 a3=0 items=0 ppid=2197 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c610,c849 key=(null) Feb 9 09:55:56.896000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:55:56.906000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521267 scontext=system_u:system_r:svirt_lxc_net_t:s0:c610,c849 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:56.906000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=400474c7e0 a2=fc6 a3=0 items=0 ppid=2197 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c610,c849 key=(null) Feb 9 09:55:56.906000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:55:56.908000 audit[2382]: AVC avc: denied { watch } for pid=2382 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:56.908000 audit[2382]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40002f47b0 a2=fc6 a3=0 items=0 ppid=2257 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 key=(null) Feb 9 09:55:56.908000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:55:56.911000 audit[2382]: AVC avc: denied { watch } for pid=2382 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:55:56.911000 audit[2382]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400113c040 a2=fc6 a3=0 items=0 ppid=2257 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 key=(null) Feb 9 09:55:56.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:55:57.119601 kubelet[2122]: E0209 09:55:57.119558 2122 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-f6c11093dc\" not found" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:57.175046 kubelet[2122]: I0209 09:55:57.174943 2122 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:55:57.288968 kubelet[2122]: E0209 09:55:57.288871 2122 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f6c11093dc.17b2293d47f142d4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f6c11093dc", UID:"ci-3510.3.2-a-f6c11093dc", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 903576788, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 903576788, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:55:57.370560 kubelet[2122]: E0209 09:55:57.370453 2122 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f6c11093dc.17b2293d488671fc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f6c11093dc", UID:"ci-3510.3.2-a-f6c11093dc", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 913353724, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 913353724, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:55:57.459052 kubelet[2122]: E0209 09:55:57.458887 2122 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f6c11093dc.17b2293d4cfd62fb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f6c11093dc", UID:"ci-3510.3.2-a-f6c11093dc", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-f6c11093dc status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 988257531, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 988257531, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:55:57.529272 kubelet[2122]: E0209 09:55:57.529163 2122 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f6c11093dc.17b2293d4cfd7723", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f6c11093dc", UID:"ci-3510.3.2-a-f6c11093dc", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.2-a-f6c11093dc status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 988262691, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 988262691, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:55:57.618067 kubelet[2122]: E0209 09:55:57.617969 2122 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f6c11093dc.17b2293d4cfd841a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f6c11093dc", UID:"ci-3510.3.2-a-f6c11093dc", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.2-a-f6c11093dc status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 988266010, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 988266010, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:55:57.674090 kubelet[2122]: E0209 09:55:57.673971 2122 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f6c11093dc.17b2293d4cfd62fb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f6c11093dc", UID:"ci-3510.3.2-a-f6c11093dc", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-f6c11093dc status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 988257531, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 52, 13705367, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:55:57.762295 kubelet[2122]: E0209 09:55:57.762190 2122 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f6c11093dc.17b2293d4cfd7723", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f6c11093dc", UID:"ci-3510.3.2-a-f6c11093dc", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.2-a-f6c11093dc status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 988262691, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 52, 13711006, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:55:57.818167 kubelet[2122]: E0209 09:55:57.818058 2122 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f6c11093dc.17b2293d4cfd841a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f6c11093dc", UID:"ci-3510.3.2-a-f6c11093dc", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.2-a-f6c11093dc status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 988266010, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 52, 13714926, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:55:57.872129 kubelet[2122]: E0209 09:55:57.872032 2122 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f6c11093dc.17b2293d4ee6ba9a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f6c11093dc", UID:"ci-3510.3.2-a-f6c11093dc", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 52, 20327066, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 52, 20327066, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:55:57.906977 kubelet[2122]: I0209 09:55:57.906939 2122 apiserver.go:52] "Watching apiserver" Feb 9 09:55:57.912229 kubelet[2122]: I0209 09:55:57.912183 2122 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 09:55:57.943301 kubelet[2122]: E0209 09:55:57.943182 2122 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f6c11093dc.17b2293d4cfd62fb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f6c11093dc", UID:"ci-3510.3.2-a-f6c11093dc", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-f6c11093dc status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 988257531, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 52, 216357746, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:55:57.946620 kubelet[2122]: I0209 09:55:57.946592 2122 reconciler.go:41] "Reconciler: start to sync state" Feb 9 09:55:58.348707 kubelet[2122]: E0209 09:55:58.348602 2122 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f6c11093dc.17b2293d4cfd7723", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f6c11093dc", UID:"ci-3510.3.2-a-f6c11093dc", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.2-a-f6c11093dc status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 988262691, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 52, 216363825, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:55:58.743535 kubelet[2122]: E0209 09:55:58.743375 2122 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f6c11093dc.17b2293d4cfd841a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f6c11093dc", UID:"ci-3510.3.2-a-f6c11093dc", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.2-a-f6c11093dc status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 55, 51, 988266010, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 55, 52, 216367625, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:56:00.281866 systemd[1]: Reloading. Feb 9 09:56:00.370847 /usr/lib/systemd/system-generators/torcx-generator[2444]: time="2024-02-09T09:56:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:56:00.371201 /usr/lib/systemd/system-generators/torcx-generator[2444]: time="2024-02-09T09:56:00Z" level=info msg="torcx already run" Feb 9 09:56:00.457733 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:56:00.457935 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:56:00.475854 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:56:00.581575 kernel: kauditd_printk_skb: 356 callbacks suppressed Feb 9 09:56:00.581708 kernel: audit: type=1400 audit(1707472560.557:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.601680 kernel: audit: type=1400 audit(1707472560.557:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.623118 kernel: audit: type=1400 audit(1707472560.557:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.649039 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 09:56:00.649130 kernel: audit: type=1400 audit(1707472560.557:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.649173 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 09:56:00.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.673187 kernel: audit: type=1400 audit(1707472560.557:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.673274 kernel: audit: backlog limit exceeded Feb 9 09:56:00.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.696138 kernel: audit: type=1400 audit(1707472560.557:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.696255 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 09:56:00.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.562000 audit: BPF prog-id=92 op=LOAD Feb 9 09:56:00.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.580000 audit: BPF prog-id=93 op=LOAD Feb 9 09:56:00.580000 audit: BPF prog-id=53 op=UNLOAD Feb 9 09:56:00.580000 audit: BPF prog-id=54 op=UNLOAD Feb 9 09:56:00.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit: BPF prog-id=94 op=LOAD Feb 9 09:56:00.600000 audit: BPF prog-id=55 op=UNLOAD Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit: BPF prog-id=95 op=LOAD Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.602000 audit: BPF prog-id=96 op=LOAD Feb 9 09:56:00.602000 audit: BPF prog-id=56 op=UNLOAD Feb 9 09:56:00.602000 audit: BPF prog-id=57 op=UNLOAD Feb 9 09:56:00.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.622000 audit: BPF prog-id=97 op=LOAD Feb 9 09:56:00.622000 audit: BPF prog-id=58 op=UNLOAD Feb 9 09:56:00.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit: BPF prog-id=98 op=LOAD Feb 9 09:56:00.701000 audit: BPF prog-id=59 op=UNLOAD Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.701000 audit: BPF prog-id=99 op=LOAD Feb 9 09:56:00.702000 audit: BPF prog-id=60 op=UNLOAD Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit: BPF prog-id=100 op=LOAD Feb 9 09:56:00.703000 audit: BPF prog-id=61 op=UNLOAD Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit: BPF prog-id=101 op=LOAD Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit: BPF prog-id=102 op=LOAD Feb 9 09:56:00.703000 audit: BPF prog-id=62 op=UNLOAD Feb 9 09:56:00.703000 audit: BPF prog-id=63 op=UNLOAD Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.704000 audit: BPF prog-id=103 op=LOAD Feb 9 09:56:00.704000 audit: BPF prog-id=76 op=UNLOAD Feb 9 09:56:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit: BPF prog-id=104 op=LOAD Feb 9 09:56:00.705000 audit: BPF prog-id=64 op=UNLOAD Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit: BPF prog-id=105 op=LOAD Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit: BPF prog-id=106 op=LOAD Feb 9 09:56:00.705000 audit: BPF prog-id=65 op=UNLOAD Feb 9 09:56:00.705000 audit: BPF prog-id=66 op=UNLOAD Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit: BPF prog-id=107 op=LOAD Feb 9 09:56:00.706000 audit: BPF prog-id=80 op=UNLOAD Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit: BPF prog-id=108 op=LOAD Feb 9 09:56:00.706000 audit: BPF prog-id=84 op=UNLOAD Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit: BPF prog-id=109 op=LOAD Feb 9 09:56:00.707000 audit: BPF prog-id=67 op=UNLOAD Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit: BPF prog-id=110 op=LOAD Feb 9 09:56:00.707000 audit: BPF prog-id=68 op=UNLOAD Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.708000 audit: BPF prog-id=111 op=LOAD Feb 9 09:56:00.708000 audit: BPF prog-id=85 op=UNLOAD Feb 9 09:56:00.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.708000 audit: BPF prog-id=112 op=LOAD Feb 9 09:56:00.708000 audit: BPF prog-id=72 op=UNLOAD Feb 9 09:56:00.730365 kubelet[2122]: I0209 09:56:00.727077 2122 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:56:00.727521 systemd[1]: Stopping kubelet.service... Feb 9 09:56:00.751179 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 09:56:00.751383 systemd[1]: Stopped kubelet.service. Feb 9 09:56:00.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:00.751441 systemd[1]: kubelet.service: Consumed 1.030s CPU time. Feb 9 09:56:00.753636 systemd[1]: Started kubelet.service. Feb 9 09:56:00.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:00.831526 kubelet[2504]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 09:56:00.831526 kubelet[2504]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:56:00.831940 kubelet[2504]: I0209 09:56:00.831469 2504 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 09:56:00.838466 kubelet[2504]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 09:56:00.838466 kubelet[2504]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:56:00.841609 kubelet[2504]: I0209 09:56:00.841586 2504 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 09:56:00.841725 kubelet[2504]: I0209 09:56:00.841715 2504 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 09:56:00.842025 kubelet[2504]: I0209 09:56:00.842009 2504 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 09:56:00.845129 kubelet[2504]: I0209 09:56:00.845111 2504 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 09:56:00.845000 audit[2382]: AVC avc: denied { watch } for pid=2382 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:00.845000 audit[2382]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000dcb180 a2=fc6 a3=0 items=0 ppid=2257 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 key=(null) Feb 9 09:56:00.845000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:00.846000 audit[2382]: AVC avc: denied { watch } for pid=2382 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:00.846000 audit[2382]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000dcb2c0 a2=fc6 a3=0 items=0 ppid=2257 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 key=(null) Feb 9 09:56:00.846000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:00.847000 audit[2382]: AVC avc: denied { watch } for pid=2382 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:00.847000 audit[2382]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000dcb400 a2=fc6 a3=0 items=0 ppid=2257 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 key=(null) Feb 9 09:56:00.847000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:00.847000 audit[2382]: AVC avc: denied { watch } for pid=2382 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:00.847000 audit[2382]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e52980 a2=fc6 a3=0 items=0 ppid=2257 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 key=(null) Feb 9 09:56:00.847000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:00.850287 kubelet[2504]: I0209 09:56:00.849602 2504 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:56:00.852453 kubelet[2504]: W0209 09:56:00.852435 2504 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 09:56:00.853181 kubelet[2504]: I0209 09:56:00.853164 2504 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 09:56:00.853473 kubelet[2504]: I0209 09:56:00.853461 2504 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 09:56:00.853618 kubelet[2504]: I0209 09:56:00.853604 2504 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 09:56:00.853774 kubelet[2504]: I0209 09:56:00.853729 2504 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 09:56:00.853865 kubelet[2504]: I0209 09:56:00.853854 2504 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 09:56:00.853956 kubelet[2504]: I0209 09:56:00.853946 2504 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:56:00.856977 kubelet[2504]: I0209 09:56:00.856954 2504 kubelet.go:398] "Attempting to sync node with API server" Feb 9 09:56:00.856977 kubelet[2504]: I0209 09:56:00.856981 2504 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 09:56:00.857082 kubelet[2504]: I0209 09:56:00.857004 2504 kubelet.go:297] "Adding apiserver pod source" Feb 9 09:56:00.857082 kubelet[2504]: I0209 09:56:00.857015 2504 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 09:56:00.860151 kubelet[2504]: I0209 09:56:00.860135 2504 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 09:56:00.860648 kubelet[2504]: I0209 09:56:00.860631 2504 server.go:1186] "Started kubelet" Feb 9 09:56:00.861000 audit[2504]: AVC avc: denied { mac_admin } for pid=2504 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.861000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:56:00.861000 audit[2504]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b92420 a1=40008e1de8 a2=4000b923f0 a3=25 items=0 ppid=1 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:00.861000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:56:00.863669 kubelet[2504]: I0209 09:56:00.863653 2504 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 09:56:00.861000 audit[2504]: AVC avc: denied { mac_admin } for pid=2504 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:00.861000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:56:00.861000 audit[2504]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b8bb40 a1=40008e1e00 a2=4000b924b0 a3=25 items=0 ppid=1 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:00.861000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:56:00.864063 kubelet[2504]: I0209 09:56:00.864051 2504 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 09:56:00.864159 kubelet[2504]: I0209 09:56:00.864149 2504 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 09:56:00.884006 kubelet[2504]: I0209 09:56:00.883974 2504 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 09:56:00.884782 kubelet[2504]: I0209 09:56:00.884744 2504 server.go:451] "Adding debug handlers to kubelet server" Feb 9 09:56:00.887080 kubelet[2504]: I0209 09:56:00.887063 2504 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 09:56:00.887454 kubelet[2504]: E0209 09:56:00.883996 2504 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 09:56:00.887556 kubelet[2504]: E0209 09:56:00.887545 2504 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 09:56:00.887652 kubelet[2504]: I0209 09:56:00.887641 2504 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 09:56:00.996545 kubelet[2504]: I0209 09:56:00.996521 2504 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 09:56:00.996681 kubelet[2504]: I0209 09:56:00.996671 2504 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 09:56:00.996767 kubelet[2504]: I0209 09:56:00.996735 2504 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:56:00.997444 kubelet[2504]: I0209 09:56:00.997427 2504 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 09:56:00.997550 kubelet[2504]: I0209 09:56:00.997540 2504 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 09:56:00.997611 kubelet[2504]: I0209 09:56:00.997602 2504 policy_none.go:49] "None policy: Start" Feb 9 09:56:00.998228 kubelet[2504]: I0209 09:56:00.998212 2504 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:56:00.999861 kubelet[2504]: I0209 09:56:00.999846 2504 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 09:56:00.999967 kubelet[2504]: I0209 09:56:00.999957 2504 state_mem.go:35] "Initializing new in-memory state store" Feb 9 09:56:01.000138 kubelet[2504]: I0209 09:56:01.000126 2504 state_mem.go:75] "Updated machine memory state" Feb 9 09:56:01.003504 kubelet[2504]: I0209 09:56:01.003489 2504 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 09:56:01.001000 audit[2504]: AVC avc: denied { mac_admin } for pid=2504 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:01.001000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:56:01.001000 audit[2504]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001051740 a1=4001057e60 a2=4001051710 a3=25 items=0 ppid=1 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:01.001000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:56:01.003982 kubelet[2504]: I0209 09:56:01.003967 2504 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 09:56:01.004224 kubelet[2504]: I0209 09:56:01.004210 2504 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 09:56:01.018049 kubelet[2504]: I0209 09:56:01.018032 2504 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 09:56:01.018877 kubelet[2504]: I0209 09:56:01.018859 2504 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:56:01.019019 kubelet[2504]: I0209 09:56:01.019009 2504 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-f6c11093dc" Feb 9 09:56:01.041201 kubelet[2504]: I0209 09:56:01.041174 2504 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 09:56:01.041349 kubelet[2504]: I0209 09:56:01.041338 2504 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 09:56:01.041464 kubelet[2504]: I0209 09:56:01.041443 2504 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 09:56:01.041567 kubelet[2504]: E0209 09:56:01.041557 2504 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 09:56:01.142611 kubelet[2504]: I0209 09:56:01.142497 2504 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:56:01.142611 kubelet[2504]: I0209 09:56:01.142579 2504 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:56:01.144807 kubelet[2504]: I0209 09:56:01.144772 2504 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:56:01.193118 kubelet[2504]: I0209 09:56:01.193071 2504 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/08a1346cc948d1036a78fa89aefa1bf7-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-f6c11093dc\" (UID: \"08a1346cc948d1036a78fa89aefa1bf7\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f6c11093dc" Feb 9 09:56:01.193118 kubelet[2504]: I0209 09:56:01.193129 2504 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/08a1346cc948d1036a78fa89aefa1bf7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-f6c11093dc\" (UID: \"08a1346cc948d1036a78fa89aefa1bf7\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f6c11093dc" Feb 9 09:56:01.193345 kubelet[2504]: I0209 09:56:01.193154 2504 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/08a1346cc948d1036a78fa89aefa1bf7-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-f6c11093dc\" (UID: \"08a1346cc948d1036a78fa89aefa1bf7\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f6c11093dc" Feb 9 09:56:01.193345 kubelet[2504]: I0209 09:56:01.193178 2504 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/08a1346cc948d1036a78fa89aefa1bf7-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-f6c11093dc\" (UID: \"08a1346cc948d1036a78fa89aefa1bf7\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f6c11093dc" Feb 9 09:56:01.193345 kubelet[2504]: I0209 09:56:01.193222 2504 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/08a1346cc948d1036a78fa89aefa1bf7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-f6c11093dc\" (UID: \"08a1346cc948d1036a78fa89aefa1bf7\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f6c11093dc" Feb 9 09:56:01.193345 kubelet[2504]: I0209 09:56:01.193242 2504 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/daf5258dec490896c4b7f781909cca73-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-f6c11093dc\" (UID: \"daf5258dec490896c4b7f781909cca73\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-f6c11093dc" Feb 9 09:56:01.193345 kubelet[2504]: I0209 09:56:01.193261 2504 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/daf5258dec490896c4b7f781909cca73-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-f6c11093dc\" (UID: \"daf5258dec490896c4b7f781909cca73\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-f6c11093dc" Feb 9 09:56:01.193465 kubelet[2504]: I0209 09:56:01.193292 2504 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/daf5258dec490896c4b7f781909cca73-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-f6c11093dc\" (UID: \"daf5258dec490896c4b7f781909cca73\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-f6c11093dc" Feb 9 09:56:01.193465 kubelet[2504]: I0209 09:56:01.193314 2504 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c71e1da94f27b669fee6d73d6e727150-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-f6c11093dc\" (UID: \"c71e1da94f27b669fee6d73d6e727150\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-f6c11093dc" Feb 9 09:56:01.867245 kubelet[2504]: I0209 09:56:01.867210 2504 apiserver.go:52] "Watching apiserver" Feb 9 09:56:01.989420 kubelet[2504]: I0209 09:56:01.989389 2504 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 09:56:01.999549 kubelet[2504]: I0209 09:56:01.999504 2504 reconciler.go:41] "Reconciler: start to sync state" Feb 9 09:56:02.731778 sudo[1678]: pam_unix(sudo:session): session closed for user root Feb 9 09:56:02.730000 audit[1678]: USER_END pid=1678 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:56:02.730000 audit[1678]: CRED_DISP pid=1678 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:56:02.733558 kubelet[2504]: I0209 09:56:02.733534 2504 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-f6c11093dc" podStartSLOduration=1.733488728 pod.CreationTimestamp="2024-02-09 09:56:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:56:02.285745313 +0000 UTC m=+1.527884598" watchObservedRunningTime="2024-02-09 09:56:02.733488728 +0000 UTC m=+1.975628013" Feb 9 09:56:02.810502 sshd[1675]: pam_unix(sshd:session): session closed for user core Feb 9 09:56:02.809000 audit[1675]: USER_END pid=1675 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:56:02.809000 audit[1675]: CRED_DISP pid=1675 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:56:02.813155 systemd-logind[1364]: Session 9 logged out. Waiting for processes to exit. Feb 9 09:56:02.813329 systemd[1]: sshd@6-10.200.20.39:22-10.200.12.6:46840.service: Deactivated successfully. Feb 9 09:56:02.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.39:22-10.200.12.6:46840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:02.814076 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 09:56:02.814255 systemd[1]: session-9.scope: Consumed 5.740s CPU time. Feb 9 09:56:02.815363 systemd-logind[1364]: Removed session 9. Feb 9 09:56:03.098475 kubelet[2504]: I0209 09:56:03.098447 2504 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f6c11093dc" podStartSLOduration=2.098409064 pod.CreationTimestamp="2024-02-09 09:56:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:56:02.734279536 +0000 UTC m=+1.976418821" watchObservedRunningTime="2024-02-09 09:56:03.098409064 +0000 UTC m=+2.340548349" Feb 9 09:56:05.551253 kubelet[2504]: I0209 09:56:05.551221 2504 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-f6c11093dc" podStartSLOduration=4.551190438 pod.CreationTimestamp="2024-02-09 09:56:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:56:03.099067605 +0000 UTC m=+2.341206850" watchObservedRunningTime="2024-02-09 09:56:05.551190438 +0000 UTC m=+4.793329723" Feb 9 09:56:17.686395 systemd[1]: cri-containerd-402a1c9cafd48b026cdd52f307e1d778ffdfb4315ac9d22fe56e9be799dd9dde.scope: Deactivated successfully. Feb 9 09:56:17.686683 systemd[1]: cri-containerd-402a1c9cafd48b026cdd52f307e1d778ffdfb4315ac9d22fe56e9be799dd9dde.scope: Consumed 2.412s CPU time. Feb 9 09:56:17.689000 audit: BPF prog-id=91 op=UNLOAD Feb 9 09:56:17.694883 kernel: kauditd_printk_skb: 269 callbacks suppressed Feb 9 09:56:17.694986 kernel: audit: type=1334 audit(1707472577.689:986): prog-id=91 op=UNLOAD Feb 9 09:56:17.689000 audit: BPF prog-id=108 op=UNLOAD Feb 9 09:56:17.707744 kernel: audit: type=1334 audit(1707472577.689:987): prog-id=108 op=UNLOAD Feb 9 09:56:17.716662 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-402a1c9cafd48b026cdd52f307e1d778ffdfb4315ac9d22fe56e9be799dd9dde-rootfs.mount: Deactivated successfully. Feb 9 09:56:17.735443 env[1379]: time="2024-02-09T09:56:17.735396773Z" level=info msg="shim disconnected" id=402a1c9cafd48b026cdd52f307e1d778ffdfb4315ac9d22fe56e9be799dd9dde Feb 9 09:56:17.735925 env[1379]: time="2024-02-09T09:56:17.735903581Z" level=warning msg="cleaning up after shim disconnected" id=402a1c9cafd48b026cdd52f307e1d778ffdfb4315ac9d22fe56e9be799dd9dde namespace=k8s.io Feb 9 09:56:17.736021 env[1379]: time="2024-02-09T09:56:17.736006934Z" level=info msg="cleaning up dead shim" Feb 9 09:56:17.743197 env[1379]: time="2024-02-09T09:56:17.743163957Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:56:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2584 runtime=io.containerd.runc.v2\n" Feb 9 09:56:18.074777 kubelet[2504]: I0209 09:56:18.074415 2504 scope.go:115] "RemoveContainer" containerID="402a1c9cafd48b026cdd52f307e1d778ffdfb4315ac9d22fe56e9be799dd9dde" Feb 9 09:56:18.076722 env[1379]: time="2024-02-09T09:56:18.076677034Z" level=info msg="CreateContainer within sandbox \"ae0afd89ec6a2467ab82dccad1977b43305a18c5396217d110bfbfd7bfd2a497\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 09:56:18.100572 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1799658316.mount: Deactivated successfully. Feb 9 09:56:18.103582 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2644813669.mount: Deactivated successfully. Feb 9 09:56:18.121617 env[1379]: time="2024-02-09T09:56:18.121571269Z" level=info msg="CreateContainer within sandbox \"ae0afd89ec6a2467ab82dccad1977b43305a18c5396217d110bfbfd7bfd2a497\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"cded494d5f8e56560a61fb8e7c60e784d443a0b7daae5338c42e663b2ea99ca1\"" Feb 9 09:56:18.122417 env[1379]: time="2024-02-09T09:56:18.122385699Z" level=info msg="StartContainer for \"cded494d5f8e56560a61fb8e7c60e784d443a0b7daae5338c42e663b2ea99ca1\"" Feb 9 09:56:18.137179 systemd[1]: Started cri-containerd-cded494d5f8e56560a61fb8e7c60e784d443a0b7daae5338c42e663b2ea99ca1.scope. Feb 9 09:56:18.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191495 kernel: audit: type=1400 audit(1707472578.156:988): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191651 kernel: audit: type=1400 audit(1707472578.156:989): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.208531 kernel: audit: type=1400 audit(1707472578.156:990): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.225758 kernel: audit: type=1400 audit(1707472578.156:991): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.242991 kernel: audit: type=1400 audit(1707472578.156:992): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.260568 kernel: audit: type=1400 audit(1707472578.156:993): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.295267 kernel: audit: type=1400 audit(1707472578.156:994): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.295355 kernel: audit: type=1400 audit(1707472578.156:995): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.173000 audit: BPF prog-id=113 op=LOAD Feb 9 09:56:18.190000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.190000 audit[2605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2257 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:18.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364656434393464356638653536353630613631666238653763363065 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2257 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:18.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364656434393464356638653536353630613631666238653763363065 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit: BPF prog-id=114 op=LOAD Feb 9 09:56:18.191000 audit[2605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2257 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:18.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364656434393464356638653536353630613631666238653763363065 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit: BPF prog-id=115 op=LOAD Feb 9 09:56:18.191000 audit[2605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2257 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:18.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364656434393464356638653536353630613631666238653763363065 Feb 9 09:56:18.191000 audit: BPF prog-id=115 op=UNLOAD Feb 9 09:56:18.191000 audit: BPF prog-id=114 op=UNLOAD Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:18.191000 audit: BPF prog-id=116 op=LOAD Feb 9 09:56:18.191000 audit[2605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2257 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:18.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364656434393464356638653536353630613631666238653763363065 Feb 9 09:56:18.316889 env[1379]: time="2024-02-09T09:56:18.316818352Z" level=info msg="StartContainer for \"cded494d5f8e56560a61fb8e7c60e784d443a0b7daae5338c42e663b2ea99ca1\" returns successfully" Feb 9 09:56:19.533000 audit[2617]: AVC avc: denied { watch } for pid=2617 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:19.533000 audit[2617]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000e02000 a2=fc6 a3=0 items=0 ppid=2257 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 key=(null) Feb 9 09:56:19.533000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:19.533000 audit[2617]: AVC avc: denied { watch } for pid=2617 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:56:19.533000 audit[2617]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40001a00c0 a2=fc6 a3=0 items=0 ppid=2257 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c533 key=(null) Feb 9 09:56:19.533000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:56:21.282709 kubelet[2504]: E0209 09:56:21.282609 2504 controller.go:189] failed to update lease, error: Put "https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-f6c11093dc?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 09:56:21.301710 kubelet[2504]: E0209 09:56:21.300556 2504 kubelet_node_status.go:540] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T09:56:11Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T09:56:11Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T09:56:11Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2024-02-09T09:56:11Z\\\",\\\"message\\\":\\\"container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized\\\",\\\"type\\\":\\\"Ready\\\"}]}}\" for node \"ci-3510.3.2-a-f6c11093dc\": Patch \"https://10.200.20.39:6443/api/v1/nodes/ci-3510.3.2-a-f6c11093dc/status?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 09:56:22.464656 systemd[1]: cri-containerd-5c17542d071c87d64ba2b5e834d7179a78c2870f3714510b7672d844ffce04ef.scope: Deactivated successfully. Feb 9 09:56:22.464970 systemd[1]: cri-containerd-5c17542d071c87d64ba2b5e834d7179a78c2870f3714510b7672d844ffce04ef.scope: Consumed 1.661s CPU time. Feb 9 09:56:22.467000 audit: BPF prog-id=88 op=UNLOAD Feb 9 09:56:22.467000 audit: BPF prog-id=111 op=UNLOAD Feb 9 09:56:22.481621 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5c17542d071c87d64ba2b5e834d7179a78c2870f3714510b7672d844ffce04ef-rootfs.mount: Deactivated successfully. Feb 9 09:56:22.540001 env[1379]: time="2024-02-09T09:56:22.539952744Z" level=info msg="shim disconnected" id=5c17542d071c87d64ba2b5e834d7179a78c2870f3714510b7672d844ffce04ef Feb 9 09:56:22.540001 env[1379]: time="2024-02-09T09:56:22.540000821Z" level=warning msg="cleaning up after shim disconnected" id=5c17542d071c87d64ba2b5e834d7179a78c2870f3714510b7672d844ffce04ef namespace=k8s.io Feb 9 09:56:22.540395 env[1379]: time="2024-02-09T09:56:22.540009980Z" level=info msg="cleaning up dead shim" Feb 9 09:56:22.546971 env[1379]: time="2024-02-09T09:56:22.546923864Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:56:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2648 runtime=io.containerd.runc.v2\n" Feb 9 09:56:23.084691 kubelet[2504]: I0209 09:56:23.084669 2504 scope.go:115] "RemoveContainer" containerID="5c17542d071c87d64ba2b5e834d7179a78c2870f3714510b7672d844ffce04ef" Feb 9 09:56:23.087087 env[1379]: time="2024-02-09T09:56:23.087045167Z" level=info msg="CreateContainer within sandbox \"c0edfaac788d2efe34ea846cc3817ee6f2f159655d7b3a1e8f4cf2ca1a055aa0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 09:56:23.113282 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3021192014.mount: Deactivated successfully. Feb 9 09:56:23.118405 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1294334109.mount: Deactivated successfully. Feb 9 09:56:23.129743 env[1379]: time="2024-02-09T09:56:23.129700173Z" level=info msg="CreateContainer within sandbox \"c0edfaac788d2efe34ea846cc3817ee6f2f159655d7b3a1e8f4cf2ca1a055aa0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"ca64c3889b1b613247c65f9fd356c8801fb1387dfa5a2acfc8571f7cd627bc97\"" Feb 9 09:56:23.130394 env[1379]: time="2024-02-09T09:56:23.130362975Z" level=info msg="StartContainer for \"ca64c3889b1b613247c65f9fd356c8801fb1387dfa5a2acfc8571f7cd627bc97\"" Feb 9 09:56:23.144066 systemd[1]: Started cri-containerd-ca64c3889b1b613247c65f9fd356c8801fb1387dfa5a2acfc8571f7cd627bc97.scope. Feb 9 09:56:23.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160880 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 9 09:56:23.160960 kernel: audit: type=1400 audit(1707472583.155:1010): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.193252 kernel: audit: type=1400 audit(1707472583.155:1011): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.210094 kernel: audit: type=1400 audit(1707472583.155:1012): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.210188 kernel: audit: type=1400 audit(1707472583.155:1013): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.243700 kernel: audit: type=1400 audit(1707472583.155:1014): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.243861 kernel: audit: type=1400 audit(1707472583.155:1015): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.279133 kernel: audit: type=1400 audit(1707472583.155:1016): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.279262 kernel: audit: type=1400 audit(1707472583.155:1017): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.314501 kernel: audit: type=1400 audit(1707472583.155:1018): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.332209 kernel: audit: type=1400 audit(1707472583.155:1019): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.155000 audit: BPF prog-id=117 op=LOAD Feb 9 09:56:23.160000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160000 audit[2667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2230 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363463333838396231623631333234376336356639666433353663 Feb 9 09:56:23.160000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160000 audit[2667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2230 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363463333838396231623631333234376336356639666433353663 Feb 9 09:56:23.160000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.160000 audit: BPF prog-id=118 op=LOAD Feb 9 09:56:23.160000 audit[2667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2230 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363463333838396231623631333234376336356639666433353663 Feb 9 09:56:23.176000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.176000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.176000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.176000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.176000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.176000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.176000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.176000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.176000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.176000 audit: BPF prog-id=119 op=LOAD Feb 9 09:56:23.176000 audit[2667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2230 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363463333838396231623631333234376336356639666433353663 Feb 9 09:56:23.192000 audit: BPF prog-id=119 op=UNLOAD Feb 9 09:56:23.192000 audit: BPF prog-id=118 op=UNLOAD Feb 9 09:56:23.192000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[2667]: AVC avc: denied { perfmon } for pid=2667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit[2667]: AVC avc: denied { bpf } for pid=2667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:56:23.192000 audit: BPF prog-id=120 op=LOAD Feb 9 09:56:23.192000 audit[2667]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2230 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:23.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363463333838396231623631333234376336356639666433353663 Feb 9 09:56:23.348455 env[1379]: time="2024-02-09T09:56:23.348413377Z" level=info msg="StartContainer for \"ca64c3889b1b613247c65f9fd356c8801fb1387dfa5a2acfc8571f7cd627bc97\" returns successfully" Feb 9 09:56:24.949373 kubelet[2504]: E0209 09:56:24.949344 2504 controller.go:189] failed to update lease, error: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.39:41470->10.200.20.29:2379: read: connection timed out Feb 9 09:56:27.891716 kubelet[2504]: E0209 09:56:27.891598 2504 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-f6c11093dc.17b22941d718115e", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-f6c11093dc", UID:"daf5258dec490896c4b7f781909cca73", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f6c11093dc"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 56, 11, 485131102, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 56, 11, 485131102, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.39:41268->10.200.20.29:2379: read: connection timed out' (will not retry!) Feb 9 09:56:31.300813 kubelet[2504]: E0209 09:56:31.300781 2504 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"ci-3510.3.2-a-f6c11093dc\": Get \"https://10.200.20.39:6443/api/v1/nodes/ci-3510.3.2-a-f6c11093dc?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 09:56:34.950498 kubelet[2504]: E0209 09:56:34.950030 2504 controller.go:189] failed to update lease, error: Put "https://10.200.20.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-f6c11093dc?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers)