Feb 9 10:13:28.007664 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 10:13:28.007683 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 08:56:26 -00 2024 Feb 9 10:13:28.007690 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 9 10:13:28.007697 kernel: printk: bootconsole [pl11] enabled Feb 9 10:13:28.007703 kernel: efi: EFI v2.70 by EDK II Feb 9 10:13:28.007708 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 9 10:13:28.007715 kernel: random: crng init done Feb 9 10:13:28.007720 kernel: ACPI: Early table checksum verification disabled Feb 9 10:13:28.007725 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 9 10:13:28.007731 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:13:28.007736 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:13:28.007743 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 10:13:28.007748 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:13:28.007754 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:13:28.007760 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:13:28.007766 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:13:28.007772 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:13:28.007779 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:13:28.007785 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 9 10:13:28.007791 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:13:28.007796 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 9 10:13:28.007802 kernel: NUMA: Failed to initialise from firmware Feb 9 10:13:28.007808 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 10:13:28.007814 kernel: NUMA: NODE_DATA [mem 0x1bf7f1900-0x1bf7f6fff] Feb 9 10:13:28.007819 kernel: Zone ranges: Feb 9 10:13:28.007825 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 9 10:13:28.007830 kernel: DMA32 empty Feb 9 10:13:28.007837 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 10:13:28.007843 kernel: Movable zone start for each node Feb 9 10:13:28.007849 kernel: Early memory node ranges Feb 9 10:13:28.007855 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 9 10:13:28.007860 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 9 10:13:28.007866 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 9 10:13:28.007872 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 9 10:13:28.007877 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 9 10:13:28.007883 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 9 10:13:28.007889 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 9 10:13:28.007895 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 9 10:13:28.007900 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 10:13:28.007907 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 10:13:28.007915 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 9 10:13:28.007921 kernel: psci: probing for conduit method from ACPI. Feb 9 10:13:28.007927 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 10:13:28.007933 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 10:13:28.007941 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 9 10:13:28.012445 kernel: psci: SMC Calling Convention v1.4 Feb 9 10:13:28.012473 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 9 10:13:28.012480 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 9 10:13:28.012487 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 10:13:28.012494 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 10:13:28.012501 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 10:13:28.012508 kernel: Detected PIPT I-cache on CPU0 Feb 9 10:13:28.012514 kernel: CPU features: detected: GIC system register CPU interface Feb 9 10:13:28.012521 kernel: CPU features: detected: Hardware dirty bit management Feb 9 10:13:28.012527 kernel: CPU features: detected: Spectre-BHB Feb 9 10:13:28.012533 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 10:13:28.012543 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 10:13:28.012549 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 10:13:28.012556 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 9 10:13:28.012562 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 9 10:13:28.012568 kernel: Policy zone: Normal Feb 9 10:13:28.012576 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:13:28.012583 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 10:13:28.012589 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 10:13:28.012595 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 10:13:28.012601 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 10:13:28.012609 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 9 10:13:28.012616 kernel: Memory: 3991932K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202228K reserved, 0K cma-reserved) Feb 9 10:13:28.012622 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 10:13:28.012628 kernel: trace event string verifier disabled Feb 9 10:13:28.012634 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 10:13:28.012641 kernel: rcu: RCU event tracing is enabled. Feb 9 10:13:28.012647 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 10:13:28.012653 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 10:13:28.012659 kernel: Tracing variant of Tasks RCU enabled. Feb 9 10:13:28.012666 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 10:13:28.012672 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 10:13:28.012679 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 10:13:28.012685 kernel: GICv3: 960 SPIs implemented Feb 9 10:13:28.012691 kernel: GICv3: 0 Extended SPIs implemented Feb 9 10:13:28.012697 kernel: GICv3: Distributor has no Range Selector support Feb 9 10:13:28.012704 kernel: Root IRQ handler: gic_handle_irq Feb 9 10:13:28.012710 kernel: GICv3: 16 PPIs implemented Feb 9 10:13:28.012716 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 9 10:13:28.012722 kernel: ITS: No ITS available, not enabling LPIs Feb 9 10:13:28.012728 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:13:28.012734 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 10:13:28.012741 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 10:13:28.012747 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 10:13:28.012755 kernel: Console: colour dummy device 80x25 Feb 9 10:13:28.012762 kernel: printk: console [tty1] enabled Feb 9 10:13:28.012768 kernel: ACPI: Core revision 20210730 Feb 9 10:13:28.012775 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 10:13:28.012781 kernel: pid_max: default: 32768 minimum: 301 Feb 9 10:13:28.012787 kernel: LSM: Security Framework initializing Feb 9 10:13:28.012794 kernel: SELinux: Initializing. Feb 9 10:13:28.012800 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:13:28.012807 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:13:28.012814 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 9 10:13:28.012821 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 9 10:13:28.012827 kernel: rcu: Hierarchical SRCU implementation. Feb 9 10:13:28.012833 kernel: Remapping and enabling EFI services. Feb 9 10:13:28.012840 kernel: smp: Bringing up secondary CPUs ... Feb 9 10:13:28.012846 kernel: Detected PIPT I-cache on CPU1 Feb 9 10:13:28.012852 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 9 10:13:28.012859 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:13:28.012865 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 10:13:28.012873 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 10:13:28.012880 kernel: SMP: Total of 2 processors activated. Feb 9 10:13:28.012886 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 10:13:28.012892 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 9 10:13:28.012899 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 10:13:28.012905 kernel: CPU features: detected: CRC32 instructions Feb 9 10:13:28.012912 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 10:13:28.012918 kernel: CPU features: detected: LSE atomic instructions Feb 9 10:13:28.012924 kernel: CPU features: detected: Privileged Access Never Feb 9 10:13:28.012932 kernel: CPU: All CPU(s) started at EL1 Feb 9 10:13:28.012938 kernel: alternatives: patching kernel code Feb 9 10:13:28.015107 kernel: devtmpfs: initialized Feb 9 10:13:28.015123 kernel: KASLR enabled Feb 9 10:13:28.015130 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 10:13:28.015138 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 10:13:28.015144 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 10:13:28.015158 kernel: SMBIOS 3.1.0 present. Feb 9 10:13:28.015166 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 10:13:28.015173 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 10:13:28.015182 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 10:13:28.015189 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 10:13:28.015196 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 10:13:28.015203 kernel: audit: initializing netlink subsys (disabled) Feb 9 10:13:28.015209 kernel: audit: type=2000 audit(0.083:1): state=initialized audit_enabled=0 res=1 Feb 9 10:13:28.015216 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 10:13:28.015223 kernel: cpuidle: using governor menu Feb 9 10:13:28.015231 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 10:13:28.015238 kernel: ASID allocator initialised with 32768 entries Feb 9 10:13:28.015245 kernel: ACPI: bus type PCI registered Feb 9 10:13:28.015251 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 10:13:28.015258 kernel: Serial: AMBA PL011 UART driver Feb 9 10:13:28.015265 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 10:13:28.015272 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 10:13:28.015279 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 10:13:28.015291 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 10:13:28.015299 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 10:13:28.015306 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 10:13:28.015313 kernel: ACPI: Added _OSI(Module Device) Feb 9 10:13:28.015319 kernel: ACPI: Added _OSI(Processor Device) Feb 9 10:13:28.015326 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 10:13:28.015336 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 10:13:28.015343 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 10:13:28.015350 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 10:13:28.015356 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 10:13:28.015365 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 10:13:28.015375 kernel: ACPI: Interpreter enabled Feb 9 10:13:28.015382 kernel: ACPI: Using GIC for interrupt routing Feb 9 10:13:28.015389 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 9 10:13:28.015396 kernel: printk: console [ttyAMA0] enabled Feb 9 10:13:28.015403 kernel: printk: bootconsole [pl11] disabled Feb 9 10:13:28.015413 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 9 10:13:28.015420 kernel: iommu: Default domain type: Translated Feb 9 10:13:28.015427 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 10:13:28.015435 kernel: vgaarb: loaded Feb 9 10:13:28.015445 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 10:13:28.015452 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 10:13:28.015459 kernel: PTP clock support registered Feb 9 10:13:28.015466 kernel: Registered efivars operations Feb 9 10:13:28.015472 kernel: No ACPI PMU IRQ for CPU0 Feb 9 10:13:28.015479 kernel: No ACPI PMU IRQ for CPU1 Feb 9 10:13:28.015486 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 10:13:28.015492 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 10:13:28.015501 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 10:13:28.015508 kernel: pnp: PnP ACPI init Feb 9 10:13:28.015518 kernel: pnp: PnP ACPI: found 0 devices Feb 9 10:13:28.015525 kernel: NET: Registered PF_INET protocol family Feb 9 10:13:28.015532 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 10:13:28.015538 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 10:13:28.015545 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 10:13:28.015552 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 10:13:28.015558 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 10:13:28.015567 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 10:13:28.015573 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:13:28.015580 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:13:28.015587 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 10:13:28.015597 kernel: PCI: CLS 0 bytes, default 64 Feb 9 10:13:28.015605 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 9 10:13:28.015611 kernel: kvm [1]: HYP mode not available Feb 9 10:13:28.015618 kernel: Initialise system trusted keyrings Feb 9 10:13:28.015625 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 10:13:28.015633 kernel: Key type asymmetric registered Feb 9 10:13:28.015640 kernel: Asymmetric key parser 'x509' registered Feb 9 10:13:28.015647 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 10:13:28.015657 kernel: io scheduler mq-deadline registered Feb 9 10:13:28.015664 kernel: io scheduler kyber registered Feb 9 10:13:28.015671 kernel: io scheduler bfq registered Feb 9 10:13:28.015678 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 10:13:28.015684 kernel: thunder_xcv, ver 1.0 Feb 9 10:13:28.015691 kernel: thunder_bgx, ver 1.0 Feb 9 10:13:28.015699 kernel: nicpf, ver 1.0 Feb 9 10:13:28.015706 kernel: nicvf, ver 1.0 Feb 9 10:13:28.015858 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 10:13:28.015944 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T10:13:27 UTC (1707473607) Feb 9 10:13:28.015971 kernel: efifb: probing for efifb Feb 9 10:13:28.015978 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 10:13:28.015985 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 10:13:28.015992 kernel: efifb: scrolling: redraw Feb 9 10:13:28.016001 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 10:13:28.016008 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 10:13:28.016018 kernel: fb0: EFI VGA frame buffer device Feb 9 10:13:28.016025 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 9 10:13:28.016031 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 10:13:28.016038 kernel: NET: Registered PF_INET6 protocol family Feb 9 10:13:28.016045 kernel: Segment Routing with IPv6 Feb 9 10:13:28.016051 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 10:13:28.016058 kernel: NET: Registered PF_PACKET protocol family Feb 9 10:13:28.016066 kernel: Key type dns_resolver registered Feb 9 10:13:28.016073 kernel: registered taskstats version 1 Feb 9 10:13:28.016080 kernel: Loading compiled-in X.509 certificates Feb 9 10:13:28.016087 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: ca91574208414224935c9cea513398977daf917d' Feb 9 10:13:28.016094 kernel: Key type .fscrypt registered Feb 9 10:13:28.016100 kernel: Key type fscrypt-provisioning registered Feb 9 10:13:28.016107 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 10:13:28.016114 kernel: ima: Allocated hash algorithm: sha1 Feb 9 10:13:28.016120 kernel: ima: No architecture policies found Feb 9 10:13:28.016128 kernel: Freeing unused kernel memory: 34688K Feb 9 10:13:28.016135 kernel: Run /init as init process Feb 9 10:13:28.016141 kernel: with arguments: Feb 9 10:13:28.016148 kernel: /init Feb 9 10:13:28.016155 kernel: with environment: Feb 9 10:13:28.016161 kernel: HOME=/ Feb 9 10:13:28.016168 kernel: TERM=linux Feb 9 10:13:28.016174 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 10:13:28.016183 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:13:28.016194 systemd[1]: Detected virtualization microsoft. Feb 9 10:13:28.016201 systemd[1]: Detected architecture arm64. Feb 9 10:13:28.016209 systemd[1]: Running in initrd. Feb 9 10:13:28.016216 systemd[1]: No hostname configured, using default hostname. Feb 9 10:13:28.016223 systemd[1]: Hostname set to . Feb 9 10:13:28.016230 systemd[1]: Initializing machine ID from random generator. Feb 9 10:13:28.016237 systemd[1]: Queued start job for default target initrd.target. Feb 9 10:13:28.016246 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:13:28.016253 systemd[1]: Reached target cryptsetup.target. Feb 9 10:13:28.016260 systemd[1]: Reached target paths.target. Feb 9 10:13:28.016267 systemd[1]: Reached target slices.target. Feb 9 10:13:28.016274 systemd[1]: Reached target swap.target. Feb 9 10:13:28.016281 systemd[1]: Reached target timers.target. Feb 9 10:13:28.016289 systemd[1]: Listening on iscsid.socket. Feb 9 10:13:28.016296 systemd[1]: Listening on iscsiuio.socket. Feb 9 10:13:28.016304 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 10:13:28.016312 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 10:13:28.016319 systemd[1]: Listening on systemd-journald.socket. Feb 9 10:13:28.016326 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:13:28.016333 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:13:28.016340 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:13:28.016348 systemd[1]: Reached target sockets.target. Feb 9 10:13:28.016355 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:13:28.016362 systemd[1]: Finished network-cleanup.service. Feb 9 10:13:28.016370 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 10:13:28.016378 systemd[1]: Starting systemd-journald.service... Feb 9 10:13:28.016385 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:13:28.016392 systemd[1]: Starting systemd-resolved.service... Feb 9 10:13:28.016399 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 10:13:28.016409 systemd-journald[276]: Journal started Feb 9 10:13:28.016453 systemd-journald[276]: Runtime Journal (/run/log/journal/d4ae90eb358d4676acdcad1b96bc37a3) is 8.0M, max 78.6M, 70.6M free. Feb 9 10:13:27.996987 systemd-modules-load[277]: Inserted module 'overlay' Feb 9 10:13:28.043119 systemd[1]: Started systemd-journald.service. Feb 9 10:13:28.043145 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 10:13:28.037517 systemd-resolved[278]: Positive Trust Anchors: Feb 9 10:13:28.080321 kernel: audit: type=1130 audit(1707473608.047:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.080344 kernel: Bridge firewalling registered Feb 9 10:13:28.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.037525 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:13:28.131756 kernel: SCSI subsystem initialized Feb 9 10:13:28.131787 kernel: audit: type=1130 audit(1707473608.094:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.131796 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 10:13:28.131806 kernel: device-mapper: uevent: version 1.0.3 Feb 9 10:13:28.131814 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 10:13:28.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.037551 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:13:28.039621 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 9 10:13:28.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.069154 systemd[1]: Started systemd-resolved.service. Feb 9 10:13:28.072368 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 9 10:13:28.221048 kernel: audit: type=1130 audit(1707473608.167:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.221075 kernel: audit: type=1130 audit(1707473608.192:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.110463 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:13:28.245683 kernel: audit: type=1130 audit(1707473608.216:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.131964 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 9 10:13:28.269709 kernel: audit: type=1130 audit(1707473608.225:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.167672 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 10:13:28.193147 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:13:28.216709 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 10:13:28.239921 systemd[1]: Reached target nss-lookup.target. Feb 9 10:13:28.265926 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 10:13:28.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.278119 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:13:28.337009 kernel: audit: type=1130 audit(1707473608.311:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.289845 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 10:13:28.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.306076 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:13:28.332669 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 10:13:28.391359 kernel: audit: type=1130 audit(1707473608.347:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.391386 kernel: audit: type=1130 audit(1707473608.372:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.364224 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 10:13:28.391618 systemd[1]: Starting dracut-cmdline.service... Feb 9 10:13:28.412764 dracut-cmdline[298]: dracut-dracut-053 Feb 9 10:13:28.417262 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:13:28.499969 kernel: Loading iSCSI transport class v2.0-870. Feb 9 10:13:28.510977 kernel: iscsi: registered transport (tcp) Feb 9 10:13:28.530066 kernel: iscsi: registered transport (qla4xxx) Feb 9 10:13:28.530125 kernel: QLogic iSCSI HBA Driver Feb 9 10:13:28.564598 systemd[1]: Finished dracut-cmdline.service. Feb 9 10:13:28.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:28.571266 systemd[1]: Starting dracut-pre-udev.service... Feb 9 10:13:28.625979 kernel: raid6: neonx8 gen() 13801 MB/s Feb 9 10:13:28.645960 kernel: raid6: neonx8 xor() 10828 MB/s Feb 9 10:13:28.665964 kernel: raid6: neonx4 gen() 13523 MB/s Feb 9 10:13:28.685958 kernel: raid6: neonx4 xor() 11087 MB/s Feb 9 10:13:28.707959 kernel: raid6: neonx2 gen() 12975 MB/s Feb 9 10:13:28.727965 kernel: raid6: neonx2 xor() 10267 MB/s Feb 9 10:13:28.747962 kernel: raid6: neonx1 gen() 10530 MB/s Feb 9 10:13:28.768959 kernel: raid6: neonx1 xor() 8784 MB/s Feb 9 10:13:28.788959 kernel: raid6: int64x8 gen() 6297 MB/s Feb 9 10:13:28.808958 kernel: raid6: int64x8 xor() 3551 MB/s Feb 9 10:13:28.829958 kernel: raid6: int64x4 gen() 7277 MB/s Feb 9 10:13:28.849958 kernel: raid6: int64x4 xor() 3859 MB/s Feb 9 10:13:28.869961 kernel: raid6: int64x2 gen() 6155 MB/s Feb 9 10:13:28.890963 kernel: raid6: int64x2 xor() 3323 MB/s Feb 9 10:13:28.910962 kernel: raid6: int64x1 gen() 5046 MB/s Feb 9 10:13:28.935244 kernel: raid6: int64x1 xor() 2649 MB/s Feb 9 10:13:28.935256 kernel: raid6: using algorithm neonx8 gen() 13801 MB/s Feb 9 10:13:28.935264 kernel: raid6: .... xor() 10828 MB/s, rmw enabled Feb 9 10:13:28.939445 kernel: raid6: using neon recovery algorithm Feb 9 10:13:28.961444 kernel: xor: measuring software checksum speed Feb 9 10:13:28.961456 kernel: 8regs : 17308 MB/sec Feb 9 10:13:28.965556 kernel: 32regs : 20755 MB/sec Feb 9 10:13:28.969616 kernel: arm64_neon : 27901 MB/sec Feb 9 10:13:28.969626 kernel: xor: using function: arm64_neon (27901 MB/sec) Feb 9 10:13:29.028976 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 10:13:29.038943 systemd[1]: Finished dracut-pre-udev.service. Feb 9 10:13:29.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:29.046000 audit: BPF prog-id=7 op=LOAD Feb 9 10:13:29.046000 audit: BPF prog-id=8 op=LOAD Feb 9 10:13:29.047719 systemd[1]: Starting systemd-udevd.service... Feb 9 10:13:29.062606 systemd-udevd[475]: Using default interface naming scheme 'v252'. Feb 9 10:13:29.070054 systemd[1]: Started systemd-udevd.service. Feb 9 10:13:29.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:29.084138 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 10:13:29.097970 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Feb 9 10:13:29.126882 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 10:13:29.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:29.132931 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:13:29.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:29.169439 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:13:29.223004 kernel: hv_vmbus: Vmbus version:5.3 Feb 9 10:13:29.240981 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 10:13:29.241038 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 10:13:29.263802 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 9 10:13:29.263852 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 10:13:29.263861 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 10:13:29.264974 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 9 10:13:29.281053 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 10:13:29.285968 kernel: scsi host1: storvsc_host_t Feb 9 10:13:29.286128 kernel: scsi host0: storvsc_host_t Feb 9 10:13:29.298968 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 10:13:29.307973 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 10:13:29.326302 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 10:13:29.326518 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 10:13:29.337673 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 10:13:29.337846 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 10:13:29.337931 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 10:13:29.341742 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 10:13:29.341958 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 10:13:29.342079 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 10:13:29.355788 kernel: hv_netvsc 002248bb-354b-0022-48bb-354b002248bb eth0: VF slot 1 added Feb 9 10:13:29.355999 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:13:29.366314 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 10:13:29.381033 kernel: hv_vmbus: registering driver hv_pci Feb 9 10:13:29.381087 kernel: hv_pci dfbd055f-ff73-44d0-a785-46a9ecc7ce00: PCI VMBus probing: Using version 0x10004 Feb 9 10:13:29.399126 kernel: hv_pci dfbd055f-ff73-44d0-a785-46a9ecc7ce00: PCI host bridge to bus ff73:00 Feb 9 10:13:29.399308 kernel: pci_bus ff73:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 9 10:13:29.405727 kernel: pci_bus ff73:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 10:13:29.414067 kernel: pci ff73:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 9 10:13:29.425852 kernel: pci ff73:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 10:13:29.447009 kernel: pci ff73:00:02.0: enabling Extended Tags Feb 9 10:13:29.471009 kernel: pci ff73:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at ff73:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 9 10:13:29.471207 kernel: pci_bus ff73:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 10:13:29.471300 kernel: pci ff73:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 10:13:29.517970 kernel: mlx5_core ff73:00:02.0: firmware version: 16.30.1284 Feb 9 10:13:29.689983 kernel: mlx5_core ff73:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 9 10:13:29.697954 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 10:13:29.742971 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (543) Feb 9 10:13:29.756613 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:13:29.777173 kernel: hv_netvsc 002248bb-354b-0022-48bb-354b002248bb eth0: VF registering: eth1 Feb 9 10:13:29.777368 kernel: mlx5_core ff73:00:02.0 eth1: joined to eth0 Feb 9 10:13:29.793979 kernel: mlx5_core ff73:00:02.0 enP65395s1: renamed from eth1 Feb 9 10:13:29.887404 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 10:13:29.893516 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 10:13:29.905903 systemd[1]: Starting disk-uuid.service... Feb 9 10:13:29.939605 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 10:13:30.941977 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:13:30.942181 disk-uuid[601]: The operation has completed successfully. Feb 9 10:13:31.004412 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 10:13:31.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:31.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:31.004500 systemd[1]: Finished disk-uuid.service. Feb 9 10:13:31.013696 systemd[1]: Starting verity-setup.service... Feb 9 10:13:31.064969 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 10:13:31.269046 systemd[1]: Found device dev-mapper-usr.device. Feb 9 10:13:31.273917 systemd[1]: Finished verity-setup.service. Feb 9 10:13:31.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:31.283486 systemd[1]: Mounting sysusr-usr.mount... Feb 9 10:13:31.345997 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 10:13:31.346196 systemd[1]: Mounted sysusr-usr.mount. Feb 9 10:13:31.349989 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 10:13:31.350711 systemd[1]: Starting ignition-setup.service... Feb 9 10:13:31.365910 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 10:13:31.398086 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:13:31.398143 kernel: BTRFS info (device sda6): using free space tree Feb 9 10:13:31.398153 kernel: BTRFS info (device sda6): has skinny extents Feb 9 10:13:31.445654 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 10:13:31.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:31.453000 audit: BPF prog-id=9 op=LOAD Feb 9 10:13:31.455339 systemd[1]: Starting systemd-networkd.service... Feb 9 10:13:31.475324 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 10:13:31.481934 systemd-networkd[871]: lo: Link UP Feb 9 10:13:31.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:31.481937 systemd-networkd[871]: lo: Gained carrier Feb 9 10:13:31.482319 systemd-networkd[871]: Enumeration completed Feb 9 10:13:31.482567 systemd[1]: Started systemd-networkd.service. Feb 9 10:13:31.488113 systemd-networkd[871]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:13:31.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:31.491985 systemd[1]: Reached target network.target. Feb 9 10:13:31.527722 iscsid[880]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:13:31.527722 iscsid[880]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 10:13:31.527722 iscsid[880]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 10:13:31.527722 iscsid[880]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 10:13:31.527722 iscsid[880]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 10:13:31.527722 iscsid[880]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:13:31.527722 iscsid[880]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 10:13:31.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:31.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:31.497265 systemd[1]: Starting iscsiuio.service... Feb 9 10:13:31.512669 systemd[1]: Started iscsiuio.service. Feb 9 10:13:31.518097 systemd[1]: Starting iscsid.service... Feb 9 10:13:31.538530 systemd[1]: Started iscsid.service. Feb 9 10:13:31.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:31.560267 systemd[1]: Starting dracut-initqueue.service... Feb 9 10:13:31.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:31.587424 systemd[1]: Finished dracut-initqueue.service. Feb 9 10:13:31.592159 systemd[1]: Reached target remote-fs-pre.target. Feb 9 10:13:31.596920 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:13:31.608838 systemd[1]: Reached target remote-fs.target. Feb 9 10:13:31.621079 systemd[1]: Starting dracut-pre-mount.service... Feb 9 10:13:31.689157 kernel: mlx5_core ff73:00:02.0 enP65395s1: Link up Feb 9 10:13:31.636784 systemd[1]: Finished ignition-setup.service. Feb 9 10:13:31.646732 systemd[1]: Finished dracut-pre-mount.service. Feb 9 10:13:31.655338 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 10:13:31.733850 kernel: hv_netvsc 002248bb-354b-0022-48bb-354b002248bb eth0: Data path switched to VF: enP65395s1 Feb 9 10:13:31.734069 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:13:31.734178 systemd-networkd[871]: enP65395s1: Link UP Feb 9 10:13:31.734257 systemd-networkd[871]: eth0: Link UP Feb 9 10:13:31.734345 systemd-networkd[871]: eth0: Gained carrier Feb 9 10:13:31.743119 systemd-networkd[871]: enP65395s1: Gained carrier Feb 9 10:13:31.761017 systemd-networkd[871]: eth0: DHCPv4 address 10.200.20.13/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 10:13:33.732139 systemd-networkd[871]: eth0: Gained IPv6LL Feb 9 10:13:33.901042 ignition[895]: Ignition 2.14.0 Feb 9 10:13:33.901053 ignition[895]: Stage: fetch-offline Feb 9 10:13:33.901106 ignition[895]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:13:33.901129 ignition[895]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:13:33.996137 ignition[895]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:13:33.996318 ignition[895]: parsed url from cmdline: "" Feb 9 10:13:33.996323 ignition[895]: no config URL provided Feb 9 10:13:33.996328 ignition[895]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 10:13:34.037884 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 9 10:13:34.037908 kernel: audit: type=1130 audit(1707473614.011:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:34.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:34.003788 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 10:13:33.996339 ignition[895]: no config at "/usr/lib/ignition/user.ign" Feb 9 10:13:34.012124 systemd[1]: Starting ignition-fetch.service... Feb 9 10:13:33.996344 ignition[895]: failed to fetch config: resource requires networking Feb 9 10:13:33.996615 ignition[895]: Ignition finished successfully Feb 9 10:13:34.027793 ignition[901]: Ignition 2.14.0 Feb 9 10:13:34.027800 ignition[901]: Stage: fetch Feb 9 10:13:34.027905 ignition[901]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:13:34.027927 ignition[901]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:13:34.030807 ignition[901]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:13:34.037156 ignition[901]: parsed url from cmdline: "" Feb 9 10:13:34.037161 ignition[901]: no config URL provided Feb 9 10:13:34.037167 ignition[901]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 10:13:34.037192 ignition[901]: no config at "/usr/lib/ignition/user.ign" Feb 9 10:13:34.037244 ignition[901]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 10:13:34.119283 ignition[901]: GET result: OK Feb 9 10:13:34.119363 ignition[901]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty) Feb 9 10:13:34.202306 ignition[901]: opening config device: "/dev/sr0" Feb 9 10:13:34.202688 ignition[901]: getting drive status for "/dev/sr0" Feb 9 10:13:34.202761 ignition[901]: drive status: OK Feb 9 10:13:34.202806 ignition[901]: mounting config device Feb 9 10:13:34.202821 ignition[901]: op(1): [started] mounting "/dev/sr0" at "/tmp/ignition-azure2088753164" Feb 9 10:13:34.226972 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2024/02/10 00:00 (1000) Feb 9 10:13:34.227546 ignition[901]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure2088753164" Feb 9 10:13:34.227561 ignition[901]: checking for config drive Feb 9 10:13:34.234478 ignition[901]: reading config Feb 9 10:13:34.234848 ignition[901]: op(2): [started] unmounting "/dev/sr0" at "/tmp/ignition-azure2088753164" Feb 9 10:13:34.241559 ignition[901]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure2088753164" Feb 9 10:13:34.235197 systemd[1]: tmp-ignition\x2dazure2088753164.mount: Deactivated successfully. Feb 9 10:13:34.241574 ignition[901]: config has been read from custom data Feb 9 10:13:34.241688 ignition[901]: parsing config with SHA512: 968485451bc675c228308fecd69cc0c4abacd8c85cdc423ed36915c5666fded1624831968f3ad69dce3242e193a4359e8bfa375d1f0c5455c5f8a4289345e909 Feb 9 10:13:34.283680 unknown[901]: fetched base config from "system" Feb 9 10:13:34.283697 unknown[901]: fetched base config from "system" Feb 9 10:13:34.284331 ignition[901]: fetch: fetch complete Feb 9 10:13:34.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:34.283702 unknown[901]: fetched user config from "azure" Feb 9 10:13:34.321255 kernel: audit: type=1130 audit(1707473614.296:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:34.284336 ignition[901]: fetch: fetch passed Feb 9 10:13:34.289355 systemd[1]: Finished ignition-fetch.service. Feb 9 10:13:34.284375 ignition[901]: Ignition finished successfully Feb 9 10:13:34.315975 systemd[1]: Starting ignition-kargs.service... Feb 9 10:13:34.329038 ignition[908]: Ignition 2.14.0 Feb 9 10:13:34.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:34.337419 systemd[1]: Finished ignition-kargs.service. Feb 9 10:13:34.373363 kernel: audit: type=1130 audit(1707473614.345:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:34.329044 ignition[908]: Stage: kargs Feb 9 10:13:34.346893 systemd[1]: Starting ignition-disks.service... Feb 9 10:13:34.329171 ignition[908]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:13:34.380879 systemd[1]: Finished ignition-disks.service. Feb 9 10:13:34.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:34.329194 ignition[908]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:13:34.332433 ignition[908]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:13:34.335332 ignition[908]: kargs: kargs passed Feb 9 10:13:34.410223 systemd[1]: Reached target initrd-root-device.target. Feb 9 10:13:34.434754 kernel: audit: type=1130 audit(1707473614.390:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:34.335381 ignition[908]: Ignition finished successfully Feb 9 10:13:34.420468 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:13:34.355615 ignition[914]: Ignition 2.14.0 Feb 9 10:13:34.430367 systemd[1]: Reached target local-fs.target. Feb 9 10:13:34.355622 ignition[914]: Stage: disks Feb 9 10:13:34.439191 systemd[1]: Reached target sysinit.target. Feb 9 10:13:34.355727 ignition[914]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:13:34.447071 systemd[1]: Reached target basic.target. Feb 9 10:13:34.355744 ignition[914]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:13:34.457972 systemd[1]: Starting systemd-fsck-root.service... Feb 9 10:13:34.358364 ignition[914]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:13:34.374715 ignition[914]: disks: disks passed Feb 9 10:13:34.374765 ignition[914]: Ignition finished successfully Feb 9 10:13:34.538147 systemd-fsck[922]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 9 10:13:34.545579 systemd[1]: Finished systemd-fsck-root.service. Feb 9 10:13:34.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:34.573650 systemd[1]: Mounting sysroot.mount... Feb 9 10:13:34.580884 kernel: audit: type=1130 audit(1707473614.550:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:34.598971 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 10:13:34.599448 systemd[1]: Mounted sysroot.mount. Feb 9 10:13:34.603133 systemd[1]: Reached target initrd-root-fs.target. Feb 9 10:13:34.635504 systemd[1]: Mounting sysroot-usr.mount... Feb 9 10:13:34.639968 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 10:13:34.647334 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 10:13:34.647365 systemd[1]: Reached target ignition-diskful.target. Feb 9 10:13:34.653032 systemd[1]: Mounted sysroot-usr.mount. Feb 9 10:13:34.685931 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 10:13:34.690908 systemd[1]: Starting initrd-setup-root.service... Feb 9 10:13:34.713991 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (932) Feb 9 10:13:34.714665 initrd-setup-root[937]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 10:13:34.731995 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:13:34.732044 kernel: BTRFS info (device sda6): using free space tree Feb 9 10:13:34.732055 kernel: BTRFS info (device sda6): has skinny extents Feb 9 10:13:34.742477 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 10:13:34.765849 initrd-setup-root[963]: cut: /sysroot/etc/group: No such file or directory Feb 9 10:13:34.775546 initrd-setup-root[971]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 10:13:34.784412 initrd-setup-root[979]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 10:13:35.210093 systemd[1]: Finished initrd-setup-root.service. Feb 9 10:13:35.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:35.234217 systemd[1]: Starting ignition-mount.service... Feb 9 10:13:35.243697 kernel: audit: type=1130 audit(1707473615.214:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:35.240113 systemd[1]: Starting sysroot-boot.service... Feb 9 10:13:35.250471 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 10:13:35.250871 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 10:13:35.272190 systemd[1]: Finished sysroot-boot.service. Feb 9 10:13:35.297170 kernel: audit: type=1130 audit(1707473615.276:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:35.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:35.305168 ignition[1001]: INFO : Ignition 2.14.0 Feb 9 10:13:35.305168 ignition[1001]: INFO : Stage: mount Feb 9 10:13:35.316009 ignition[1001]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:13:35.316009 ignition[1001]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:13:35.316009 ignition[1001]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:13:35.316009 ignition[1001]: INFO : mount: mount passed Feb 9 10:13:35.316009 ignition[1001]: INFO : Ignition finished successfully Feb 9 10:13:35.370735 kernel: audit: type=1130 audit(1707473615.319:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:35.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:35.314550 systemd[1]: Finished ignition-mount.service. Feb 9 10:13:35.693344 coreos-metadata[931]: Feb 09 10:13:35.693 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 10:13:35.701542 coreos-metadata[931]: Feb 09 10:13:35.701 INFO Fetch successful Feb 9 10:13:35.728993 coreos-metadata[931]: Feb 09 10:13:35.728 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 10:13:35.740264 coreos-metadata[931]: Feb 09 10:13:35.739 INFO Fetch successful Feb 9 10:13:35.751999 coreos-metadata[931]: Feb 09 10:13:35.751 INFO wrote hostname ci-3510.3.2-a-89d14aa977 to /sysroot/etc/hostname Feb 9 10:13:35.761301 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 10:13:35.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:35.767638 systemd[1]: Starting ignition-files.service... Feb 9 10:13:35.796629 kernel: audit: type=1130 audit(1707473615.766:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:35.795684 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 10:13:35.816969 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1010) Feb 9 10:13:35.829118 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:13:35.829152 kernel: BTRFS info (device sda6): using free space tree Feb 9 10:13:35.833678 kernel: BTRFS info (device sda6): has skinny extents Feb 9 10:13:35.839654 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 10:13:35.855044 ignition[1029]: INFO : Ignition 2.14.0 Feb 9 10:13:35.860969 ignition[1029]: INFO : Stage: files Feb 9 10:13:35.860969 ignition[1029]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:13:35.860969 ignition[1029]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:13:35.883497 ignition[1029]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:13:35.883497 ignition[1029]: DEBUG : files: compiled without relabeling support, skipping Feb 9 10:13:35.898788 ignition[1029]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 10:13:35.898788 ignition[1029]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 10:13:35.960891 ignition[1029]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 10:13:35.968524 ignition[1029]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 10:13:35.979731 unknown[1029]: wrote ssh authorized keys file for user: core Feb 9 10:13:35.984978 ignition[1029]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 10:13:35.992213 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 10:13:35.992213 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 9 10:13:36.447785 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 10:13:36.592361 ignition[1029]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 9 10:13:36.607986 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 10:13:36.607986 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 10:13:36.607986 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 10:13:36.727849 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 10:13:36.952484 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 10:13:36.963178 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 10:13:36.963178 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 9 10:13:37.353327 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 10:13:37.562738 ignition[1029]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 9 10:13:37.578474 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 10:13:37.578474 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 10:13:37.578474 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubectl: attempt #1 Feb 9 10:13:37.721106 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 10:13:38.029045 ignition[1029]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 3672fda0beebbbd636a2088f427463cbad32683ea4fbb1df61650552e63846b6a47db803ccb70c3db0a8f24746a23a5632bdc15a3fb78f4f7d833e7f86763c2a Feb 9 10:13:38.045461 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 10:13:38.045461 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:13:38.045461 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 9 10:13:38.080985 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 10:13:38.368826 ignition[1029]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 9 10:13:38.386081 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:13:38.386081 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:13:38.386081 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 9 10:13:38.424869 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 10:13:39.165215 ignition[1029]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 10:13:39.184361 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 10:13:39.423056 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1036) Feb 9 10:13:39.423085 kernel: audit: type=1130 audit(1707473619.283:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.423096 kernel: audit: type=1130 audit(1707473619.356:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.423106 kernel: audit: type=1131 audit(1707473619.356:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.423206 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1995930411" Feb 9 10:13:39.423206 ignition[1029]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1995930411": device or resource busy Feb 9 10:13:39.423206 ignition[1029]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1995930411", trying btrfs: device or resource busy Feb 9 10:13:39.423206 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1995930411" Feb 9 10:13:39.423206 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1995930411" Feb 9 10:13:39.423206 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem1995930411" Feb 9 10:13:39.423206 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem1995930411" Feb 9 10:13:39.423206 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 10:13:39.423206 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 10:13:39.423206 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 10:13:39.423206 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3085018156" Feb 9 10:13:39.423206 ignition[1029]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3085018156": device or resource busy Feb 9 10:13:39.423206 ignition[1029]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3085018156", trying btrfs: device or resource busy Feb 9 10:13:39.423206 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3085018156" Feb 9 10:13:39.683481 kernel: audit: type=1130 audit(1707473619.429:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.683511 kernel: audit: type=1130 audit(1707473619.526:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.683522 kernel: audit: type=1131 audit(1707473619.551:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.683531 kernel: audit: type=1130 audit(1707473619.627:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.235989 systemd[1]: mnt-oem1995930411.mount: Deactivated successfully. Feb 9 10:13:39.693198 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3085018156" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem3085018156" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem3085018156" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(1d): [started] processing unit "prepare-helm.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 10:13:39.693198 ignition[1029]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 10:13:40.020786 kernel: audit: type=1131 audit(1707473619.753:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.020824 kernel: audit: type=1131 audit(1707473619.913:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.020836 kernel: audit: type=1131 audit(1707473619.974:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.271368 systemd[1]: mnt-oem3085018156.mount: Deactivated successfully. Feb 9 10:13:40.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.030670 ignition[1029]: INFO : files: op(1d): [finished] processing unit "prepare-helm.service" Feb 9 10:13:40.030670 ignition[1029]: INFO : files: op(1f): [started] setting preset to enabled for "nvidia.service" Feb 9 10:13:40.030670 ignition[1029]: INFO : files: op(1f): [finished] setting preset to enabled for "nvidia.service" Feb 9 10:13:40.030670 ignition[1029]: INFO : files: op(20): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:13:40.030670 ignition[1029]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:13:40.030670 ignition[1029]: INFO : files: op(21): [started] setting preset to enabled for "prepare-critools.service" Feb 9 10:13:40.030670 ignition[1029]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 10:13:40.030670 ignition[1029]: INFO : files: op(22): [started] setting preset to enabled for "prepare-helm.service" Feb 9 10:13:40.030670 ignition[1029]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 10:13:40.030670 ignition[1029]: INFO : files: op(23): [started] setting preset to enabled for "waagent.service" Feb 9 10:13:40.030670 ignition[1029]: INFO : files: op(23): [finished] setting preset to enabled for "waagent.service" Feb 9 10:13:40.030670 ignition[1029]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:13:40.030670 ignition[1029]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:13:40.030670 ignition[1029]: INFO : files: files passed Feb 9 10:13:40.030670 ignition[1029]: INFO : Ignition finished successfully Feb 9 10:13:40.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.275075 systemd[1]: Finished ignition-files.service. Feb 9 10:13:40.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.249437 initrd-setup-root-after-ignition[1055]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 10:13:39.285200 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 10:13:39.314320 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 10:13:40.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.315252 systemd[1]: Starting ignition-quench.service... Feb 9 10:13:40.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.295000 audit: BPF prog-id=6 op=UNLOAD Feb 9 10:13:39.331199 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 10:13:39.331312 systemd[1]: Finished ignition-quench.service. Feb 9 10:13:39.422939 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 10:13:39.429433 systemd[1]: Reached target ignition-complete.target. Feb 9 10:13:40.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.336298 ignition[1068]: INFO : Ignition 2.14.0 Feb 9 10:13:40.336298 ignition[1068]: INFO : Stage: umount Feb 9 10:13:40.336298 ignition[1068]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:13:40.336298 ignition[1068]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:13:40.336298 ignition[1068]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:13:40.336298 ignition[1068]: INFO : umount: umount passed Feb 9 10:13:40.336298 ignition[1068]: INFO : Ignition finished successfully Feb 9 10:13:40.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.473473 systemd[1]: Starting initrd-parse-etc.service... Feb 9 10:13:40.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.514775 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 10:13:40.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.514900 systemd[1]: Finished initrd-parse-etc.service. Feb 9 10:13:40.447736 kernel: hv_netvsc 002248bb-354b-0022-48bb-354b002248bb eth0: Data path switched from VF: enP65395s1 Feb 9 10:13:40.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.551868 systemd[1]: Reached target initrd-fs.target. Feb 9 10:13:39.581074 systemd[1]: Reached target initrd.target. Feb 9 10:13:39.597142 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 10:13:39.598076 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 10:13:40.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.618331 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 10:13:40.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.671289 systemd[1]: Starting initrd-cleanup.service... Feb 9 10:13:39.701180 systemd[1]: Stopped target nss-lookup.target. Feb 9 10:13:39.709091 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 10:13:39.723795 systemd[1]: Stopped target timers.target. Feb 9 10:13:39.738055 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 10:13:39.738115 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 10:13:39.785428 systemd[1]: Stopped target initrd.target. Feb 9 10:13:39.790787 systemd[1]: Stopped target basic.target. Feb 9 10:13:39.794835 systemd[1]: Stopped target ignition-complete.target. Feb 9 10:13:39.806059 systemd[1]: Stopped target ignition-diskful.target. Feb 9 10:13:39.817365 systemd[1]: Stopped target initrd-root-device.target. Feb 9 10:13:39.822072 systemd[1]: Stopped target remote-fs.target. Feb 9 10:13:39.834266 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 10:13:40.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:39.850241 systemd[1]: Stopped target sysinit.target. Feb 9 10:13:39.854250 systemd[1]: Stopped target local-fs.target. Feb 9 10:13:39.870279 systemd[1]: Stopped target local-fs-pre.target. Feb 9 10:13:39.884453 systemd[1]: Stopped target swap.target. Feb 9 10:13:39.896465 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 10:13:39.896526 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 10:13:39.949773 systemd[1]: Stopped target cryptsetup.target. Feb 9 10:13:39.961830 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 10:13:39.961889 systemd[1]: Stopped dracut-initqueue.service. Feb 9 10:13:39.974446 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 10:13:39.974488 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 10:13:40.009235 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 10:13:40.009280 systemd[1]: Stopped ignition-files.service. Feb 9 10:13:40.025253 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 10:13:40.025295 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 10:13:40.036475 systemd[1]: Stopping ignition-mount.service... Feb 9 10:13:40.048240 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 10:13:40.048307 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 10:13:40.053817 systemd[1]: Stopping sysroot-boot.service... Feb 9 10:13:40.057895 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 10:13:40.057975 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 10:13:40.072239 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 10:13:40.072288 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 10:13:40.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.087180 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 10:13:40.087276 systemd[1]: Finished initrd-cleanup.service. Feb 9 10:13:40.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:40.092502 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 10:13:40.092583 systemd[1]: Stopped ignition-mount.service. Feb 9 10:13:40.106395 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 10:13:40.106443 systemd[1]: Stopped ignition-disks.service. Feb 9 10:13:40.110993 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 10:13:40.111032 systemd[1]: Stopped ignition-kargs.service. Feb 9 10:13:40.122108 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 10:13:40.122189 systemd[1]: Stopped ignition-fetch.service. Feb 9 10:13:40.129130 systemd[1]: Stopped target network.target. Feb 9 10:13:40.140803 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 10:13:40.760517 iscsid[880]: iscsid shutting down. Feb 9 10:13:40.140867 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 10:13:40.153543 systemd[1]: Stopped target paths.target. Feb 9 10:13:40.164565 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 10:13:40.171969 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 10:13:40.188926 systemd[1]: Stopped target slices.target. Feb 9 10:13:40.200230 systemd[1]: Stopped target sockets.target. Feb 9 10:13:40.213988 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 10:13:40.214035 systemd[1]: Closed iscsid.socket. Feb 9 10:13:40.227769 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 10:13:40.227791 systemd[1]: Closed iscsiuio.socket. Feb 9 10:13:40.235672 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 10:13:40.235719 systemd[1]: Stopped ignition-setup.service. Feb 9 10:13:40.245247 systemd[1]: Stopping systemd-networkd.service... Feb 9 10:13:40.253784 systemd[1]: Stopping systemd-resolved.service... Feb 9 10:13:40.268214 systemd-networkd[871]: eth0: DHCPv6 lease lost Feb 9 10:13:40.761021 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 9 10:13:40.759000 audit: BPF prog-id=9 op=UNLOAD Feb 9 10:13:40.269400 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 10:13:40.269501 systemd[1]: Stopped systemd-resolved.service. Feb 9 10:13:40.280147 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 10:13:40.280246 systemd[1]: Stopped systemd-networkd.service. Feb 9 10:13:40.295938 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 10:13:40.296005 systemd[1]: Closed systemd-networkd.socket. Feb 9 10:13:40.310873 systemd[1]: Stopping network-cleanup.service... Feb 9 10:13:40.320601 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 10:13:40.320664 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 10:13:40.331526 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 10:13:40.331584 systemd[1]: Stopped systemd-sysctl.service. Feb 9 10:13:40.344358 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 10:13:40.344403 systemd[1]: Stopped systemd-modules-load.service. Feb 9 10:13:40.349598 systemd[1]: Stopping systemd-udevd.service... Feb 9 10:13:40.358105 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 10:13:40.364194 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 10:13:40.364342 systemd[1]: Stopped systemd-udevd.service. Feb 9 10:13:40.382538 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 10:13:40.382610 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 10:13:40.393394 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 10:13:40.393429 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 10:13:40.402098 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 10:13:40.402144 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 10:13:40.411419 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 10:13:40.411460 systemd[1]: Stopped dracut-cmdline.service. Feb 9 10:13:40.420160 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 10:13:40.420202 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 10:13:40.447162 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 10:13:40.461605 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 10:13:40.461671 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 10:13:40.475518 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 10:13:40.475600 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 10:13:40.556234 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 10:13:40.556337 systemd[1]: Stopped network-cleanup.service. Feb 9 10:13:40.607470 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 10:13:40.674223 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 10:13:40.674320 systemd[1]: Stopped sysroot-boot.service. Feb 9 10:13:40.682493 systemd[1]: Reached target initrd-switch-root.target. Feb 9 10:13:40.692908 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 10:13:40.692968 systemd[1]: Stopped initrd-setup-root.service. Feb 9 10:13:40.703925 systemd[1]: Starting initrd-switch-root.service... Feb 9 10:13:40.720031 systemd[1]: Switching root. Feb 9 10:13:40.762060 systemd-journald[276]: Journal stopped Feb 9 10:13:50.048935 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 10:13:50.048966 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 10:13:50.048978 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 10:13:50.048988 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 10:13:50.048997 kernel: SELinux: policy capability open_perms=1 Feb 9 10:13:50.049006 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 10:13:50.049015 kernel: SELinux: policy capability always_check_network=0 Feb 9 10:13:50.049024 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 10:13:50.049032 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 10:13:50.049041 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 10:13:50.049051 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 10:13:50.049060 systemd[1]: Successfully loaded SELinux policy in 224.821ms. Feb 9 10:13:50.049071 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.719ms. Feb 9 10:13:50.049082 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:13:50.049094 systemd[1]: Detected virtualization microsoft. Feb 9 10:13:50.049103 systemd[1]: Detected architecture arm64. Feb 9 10:13:50.049112 systemd[1]: Detected first boot. Feb 9 10:13:50.049122 systemd[1]: Hostname set to . Feb 9 10:13:50.049132 systemd[1]: Initializing machine ID from random generator. Feb 9 10:13:50.049141 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 10:13:50.049150 kernel: kauditd_printk_skb: 38 callbacks suppressed Feb 9 10:13:50.049160 kernel: audit: type=1400 audit(1707473624.368:86): avc: denied { associate } for pid=1103 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 10:13:50.049172 kernel: audit: type=1300 audit(1707473624.368:86): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458a2 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1086 pid=1103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:50.049182 kernel: audit: type=1327 audit(1707473624.368:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:13:50.049192 kernel: audit: type=1400 audit(1707473624.378:87): avc: denied { associate } for pid=1103 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 10:13:50.049203 kernel: audit: type=1300 audit(1707473624.378:87): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145979 a2=1ed a3=0 items=2 ppid=1086 pid=1103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:50.049212 kernel: audit: type=1307 audit(1707473624.378:87): cwd="/" Feb 9 10:13:50.049223 kernel: audit: type=1302 audit(1707473624.378:87): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:50.049232 kernel: audit: type=1302 audit(1707473624.378:87): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:50.049242 kernel: audit: type=1327 audit(1707473624.378:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:13:50.049252 systemd[1]: Populated /etc with preset unit settings. Feb 9 10:13:50.049261 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:13:50.049271 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:13:50.049282 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:13:50.049292 kernel: audit: type=1334 audit(1707473629.300:88): prog-id=12 op=LOAD Feb 9 10:13:50.049302 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 10:13:50.049311 systemd[1]: Stopped iscsiuio.service. Feb 9 10:13:50.049321 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 10:13:50.049331 systemd[1]: Stopped iscsid.service. Feb 9 10:13:50.049340 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 10:13:50.049352 systemd[1]: Stopped initrd-switch-root.service. Feb 9 10:13:50.049364 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 10:13:50.049374 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 10:13:50.049384 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 10:13:50.049394 systemd[1]: Created slice system-getty.slice. Feb 9 10:13:50.049404 systemd[1]: Created slice system-modprobe.slice. Feb 9 10:13:50.049414 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 10:13:50.049424 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 10:13:50.049435 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 10:13:50.049444 systemd[1]: Created slice user.slice. Feb 9 10:13:50.049455 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:13:50.049465 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 10:13:50.049475 systemd[1]: Set up automount boot.automount. Feb 9 10:13:50.049485 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 10:13:50.049495 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 10:13:50.049505 systemd[1]: Stopped target initrd-fs.target. Feb 9 10:13:50.049515 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 10:13:50.049526 systemd[1]: Reached target integritysetup.target. Feb 9 10:13:50.049536 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:13:50.049545 systemd[1]: Reached target remote-fs.target. Feb 9 10:13:50.049556 systemd[1]: Reached target slices.target. Feb 9 10:13:50.049565 systemd[1]: Reached target swap.target. Feb 9 10:13:50.049575 systemd[1]: Reached target torcx.target. Feb 9 10:13:50.049585 systemd[1]: Reached target veritysetup.target. Feb 9 10:13:50.049596 systemd[1]: Listening on systemd-coredump.socket. Feb 9 10:13:50.049607 systemd[1]: Listening on systemd-initctl.socket. Feb 9 10:13:50.049616 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:13:50.049627 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:13:50.049637 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:13:50.049647 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 10:13:50.049657 systemd[1]: Mounting dev-hugepages.mount... Feb 9 10:13:50.049668 systemd[1]: Mounting dev-mqueue.mount... Feb 9 10:13:50.049678 systemd[1]: Mounting media.mount... Feb 9 10:13:50.049690 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 10:13:50.049700 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 10:13:50.049710 systemd[1]: Mounting tmp.mount... Feb 9 10:13:50.049720 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 10:13:50.049730 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 10:13:50.049740 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:13:50.049750 systemd[1]: Starting modprobe@configfs.service... Feb 9 10:13:50.049761 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 10:13:50.049771 systemd[1]: Starting modprobe@drm.service... Feb 9 10:13:50.049781 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 10:13:50.049790 systemd[1]: Starting modprobe@fuse.service... Feb 9 10:13:50.049800 systemd[1]: Starting modprobe@loop.service... Feb 9 10:13:50.049811 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 10:13:50.049821 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 10:13:50.049830 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 10:13:50.049840 kernel: kauditd_printk_skb: 17 callbacks suppressed Feb 9 10:13:50.049851 kernel: audit: type=1131 audit(1707473629.808:106): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.049861 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 10:13:50.049871 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 10:13:50.049881 kernel: fuse: init (API version 7.34) Feb 9 10:13:50.049891 kernel: audit: type=1131 audit(1707473629.846:107): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.049901 systemd[1]: Stopped systemd-journald.service. Feb 9 10:13:50.049911 kernel: loop: module loaded Feb 9 10:13:50.049920 systemd[1]: systemd-journald.service: Consumed 3.170s CPU time. Feb 9 10:13:50.049932 kernel: audit: type=1130 audit(1707473629.875:108): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.049942 kernel: audit: type=1131 audit(1707473629.875:109): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.049958 systemd[1]: Starting systemd-journald.service... Feb 9 10:13:50.049969 kernel: audit: type=1334 audit(1707473629.898:110): prog-id=18 op=LOAD Feb 9 10:13:50.049978 kernel: audit: type=1334 audit(1707473629.898:111): prog-id=19 op=LOAD Feb 9 10:13:50.049987 kernel: audit: type=1334 audit(1707473629.898:112): prog-id=20 op=LOAD Feb 9 10:13:50.049996 kernel: audit: type=1334 audit(1707473629.898:113): prog-id=16 op=UNLOAD Feb 9 10:13:50.050005 kernel: audit: type=1334 audit(1707473629.898:114): prog-id=17 op=UNLOAD Feb 9 10:13:50.050016 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:13:50.050026 systemd[1]: Starting systemd-network-generator.service... Feb 9 10:13:50.050036 systemd[1]: Starting systemd-remount-fs.service... Feb 9 10:13:50.050047 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:13:50.050057 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 10:13:50.050067 systemd[1]: Stopped verity-setup.service. Feb 9 10:13:50.050077 kernel: audit: type=1131 audit(1707473630.018:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.050087 systemd[1]: Mounted dev-hugepages.mount. Feb 9 10:13:50.050098 systemd[1]: Mounted dev-mqueue.mount. Feb 9 10:13:50.050112 systemd-journald[1209]: Journal started Feb 9 10:13:50.050152 systemd-journald[1209]: Runtime Journal (/run/log/journal/44b9204ec05c4127a3998f8654e3e482) is 8.0M, max 78.6M, 70.6M free. Feb 9 10:13:42.738000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 10:13:43.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:13:43.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:13:43.315000 audit: BPF prog-id=10 op=LOAD Feb 9 10:13:43.315000 audit: BPF prog-id=10 op=UNLOAD Feb 9 10:13:43.315000 audit: BPF prog-id=11 op=LOAD Feb 9 10:13:43.315000 audit: BPF prog-id=11 op=UNLOAD Feb 9 10:13:44.368000 audit[1103]: AVC avc: denied { associate } for pid=1103 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 10:13:44.368000 audit[1103]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458a2 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1086 pid=1103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:44.368000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:13:44.378000 audit[1103]: AVC avc: denied { associate } for pid=1103 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 10:13:44.378000 audit[1103]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145979 a2=1ed a3=0 items=2 ppid=1086 pid=1103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:44.378000 audit: CWD cwd="/" Feb 9 10:13:44.378000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:44.378000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:44.378000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:13:49.300000 audit: BPF prog-id=12 op=LOAD Feb 9 10:13:49.300000 audit: BPF prog-id=3 op=UNLOAD Feb 9 10:13:49.300000 audit: BPF prog-id=13 op=LOAD Feb 9 10:13:49.300000 audit: BPF prog-id=14 op=LOAD Feb 9 10:13:49.300000 audit: BPF prog-id=4 op=UNLOAD Feb 9 10:13:49.300000 audit: BPF prog-id=5 op=UNLOAD Feb 9 10:13:49.301000 audit: BPF prog-id=15 op=LOAD Feb 9 10:13:49.301000 audit: BPF prog-id=12 op=UNLOAD Feb 9 10:13:49.309000 audit: BPF prog-id=16 op=LOAD Feb 9 10:13:49.309000 audit: BPF prog-id=17 op=LOAD Feb 9 10:13:49.309000 audit: BPF prog-id=13 op=UNLOAD Feb 9 10:13:49.309000 audit: BPF prog-id=14 op=UNLOAD Feb 9 10:13:49.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:49.321000 audit: BPF prog-id=15 op=UNLOAD Feb 9 10:13:49.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:49.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:49.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:49.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:49.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:49.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:49.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:49.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:49.898000 audit: BPF prog-id=18 op=LOAD Feb 9 10:13:49.898000 audit: BPF prog-id=19 op=LOAD Feb 9 10:13:49.898000 audit: BPF prog-id=20 op=LOAD Feb 9 10:13:49.898000 audit: BPF prog-id=16 op=UNLOAD Feb 9 10:13:49.898000 audit: BPF prog-id=17 op=UNLOAD Feb 9 10:13:50.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:49.300351 systemd[1]: Queued start job for default target multi-user.target. Feb 9 10:13:44.334557 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:13:49.311077 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 10:13:44.357074 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:13:49.311413 systemd[1]: systemd-journald.service: Consumed 3.170s CPU time. Feb 9 10:13:44.357094 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:13:44.357143 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 10:13:44.357154 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 10:13:44.357196 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 10:13:44.357210 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 10:13:44.357437 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 10:13:44.357471 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:13:44.357483 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:13:44.357851 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 10:13:44.357895 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 10:13:44.357914 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 10:13:44.357928 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 10:13:44.357945 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 10:13:44.357978 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 10:13:48.517406 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:48Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:13:48.517655 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:48Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:13:48.517745 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:48Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:13:48.517896 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:48Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:13:48.517944 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:48Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 10:13:50.046000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 10:13:50.046000 audit[1209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffd996ce60 a2=4000 a3=1 items=0 ppid=1 pid=1209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:50.046000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 10:13:48.518015 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-02-09T10:13:48Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 10:13:50.067456 systemd[1]: Started systemd-journald.service. Feb 9 10:13:50.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.064100 systemd[1]: Mounted media.mount. Feb 9 10:13:50.068046 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 10:13:50.072230 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 10:13:50.076784 systemd[1]: Mounted tmp.mount. Feb 9 10:13:50.080626 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 10:13:50.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.085638 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:13:50.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.090433 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 10:13:50.090716 systemd[1]: Finished modprobe@configfs.service. Feb 9 10:13:50.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.095625 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 10:13:50.095769 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 10:13:50.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.100522 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 10:13:50.100662 systemd[1]: Finished modprobe@drm.service. Feb 9 10:13:50.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.105406 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 10:13:50.105522 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 10:13:50.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.110305 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 10:13:50.110448 systemd[1]: Finished modprobe@fuse.service. Feb 9 10:13:50.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.115039 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 10:13:50.115150 systemd[1]: Finished modprobe@loop.service. Feb 9 10:13:50.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.120034 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:13:50.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.125183 systemd[1]: Finished systemd-network-generator.service. Feb 9 10:13:50.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.130745 systemd[1]: Finished systemd-remount-fs.service. Feb 9 10:13:50.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.136169 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:13:50.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.141630 systemd[1]: Reached target network-pre.target. Feb 9 10:13:50.147363 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 10:13:50.152716 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 10:13:50.156832 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 10:13:50.173266 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 10:13:50.178208 systemd[1]: Starting systemd-journal-flush.service... Feb 9 10:13:50.182421 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 10:13:50.183362 systemd[1]: Starting systemd-random-seed.service... Feb 9 10:13:50.187631 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 10:13:50.188608 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:13:50.193369 systemd[1]: Starting systemd-sysusers.service... Feb 9 10:13:50.198423 systemd[1]: Starting systemd-udev-settle.service... Feb 9 10:13:50.204591 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 10:13:50.209903 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 10:13:50.217052 systemd-journald[1209]: Time spent on flushing to /var/log/journal/44b9204ec05c4127a3998f8654e3e482 is 17.123ms for 1140 entries. Feb 9 10:13:50.217052 systemd-journald[1209]: System Journal (/var/log/journal/44b9204ec05c4127a3998f8654e3e482) is 8.0M, max 2.6G, 2.6G free. Feb 9 10:13:50.289852 systemd-journald[1209]: Received client request to flush runtime journal. Feb 9 10:13:50.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.291094 udevadm[1223]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 10:13:50.238544 systemd[1]: Finished systemd-random-seed.service. Feb 9 10:13:50.243836 systemd[1]: Reached target first-boot-complete.target. Feb 9 10:13:50.265416 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:13:50.290899 systemd[1]: Finished systemd-journal-flush.service. Feb 9 10:13:50.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:50.621991 systemd[1]: Finished systemd-sysusers.service. Feb 9 10:13:50.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:51.260714 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 10:13:51.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:51.265000 audit: BPF prog-id=21 op=LOAD Feb 9 10:13:51.265000 audit: BPF prog-id=22 op=LOAD Feb 9 10:13:51.265000 audit: BPF prog-id=7 op=UNLOAD Feb 9 10:13:51.265000 audit: BPF prog-id=8 op=UNLOAD Feb 9 10:13:51.267031 systemd[1]: Starting systemd-udevd.service... Feb 9 10:13:51.284884 systemd-udevd[1226]: Using default interface naming scheme 'v252'. Feb 9 10:13:51.427514 systemd[1]: Started systemd-udevd.service. Feb 9 10:13:51.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:51.436000 audit: BPF prog-id=23 op=LOAD Feb 9 10:13:51.438461 systemd[1]: Starting systemd-networkd.service... Feb 9 10:13:51.467905 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 10:13:51.518000 audit: BPF prog-id=24 op=LOAD Feb 9 10:13:51.518000 audit: BPF prog-id=25 op=LOAD Feb 9 10:13:51.518000 audit: BPF prog-id=26 op=LOAD Feb 9 10:13:51.519875 systemd[1]: Starting systemd-userdbd.service... Feb 9 10:13:51.516000 audit[1233]: AVC avc: denied { confidentiality } for pid=1233 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 10:13:51.548010 kernel: hv_vmbus: registering driver hv_balloon Feb 9 10:13:51.552546 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 10:13:51.552588 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 10:13:51.552608 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 10:13:51.559820 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 10:13:51.559928 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 10:13:51.573882 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 9 10:13:51.574016 kernel: Console: switching to colour dummy device 80x25 Feb 9 10:13:51.581006 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 10:13:51.516000 audit[1233]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab16c46280 a1=aa2c a2=ffffb86b24b0 a3=aaab16ba5010 items=12 ppid=1226 pid=1233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:51.516000 audit: CWD cwd="/" Feb 9 10:13:51.516000 audit: PATH item=0 name=(null) inode=7250 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:51.516000 audit: PATH item=1 name=(null) inode=10477 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:51.516000 audit: PATH item=2 name=(null) inode=10477 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:51.516000 audit: PATH item=3 name=(null) inode=10478 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:51.516000 audit: PATH item=4 name=(null) inode=10477 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:51.516000 audit: PATH item=5 name=(null) inode=10479 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:51.516000 audit: PATH item=6 name=(null) inode=10477 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:51.516000 audit: PATH item=7 name=(null) inode=10480 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:51.516000 audit: PATH item=8 name=(null) inode=10477 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:51.516000 audit: PATH item=9 name=(null) inode=10481 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:51.516000 audit: PATH item=10 name=(null) inode=10477 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:51.516000 audit: PATH item=11 name=(null) inode=10482 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:13:51.516000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 10:13:51.607512 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 10:13:51.607680 kernel: hv_vmbus: registering driver hv_utils Feb 9 10:13:51.607725 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 10:13:51.607981 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 10:13:51.608028 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 10:13:51.391552 systemd[1]: Started systemd-userdbd.service. Feb 9 10:13:51.453426 systemd-journald[1209]: Time jumped backwards, rotating. Feb 9 10:13:51.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:51.568082 systemd-networkd[1247]: lo: Link UP Feb 9 10:13:51.568093 systemd-networkd[1247]: lo: Gained carrier Feb 9 10:13:51.568485 systemd-networkd[1247]: Enumeration completed Feb 9 10:13:51.568589 systemd[1]: Started systemd-networkd.service. Feb 9 10:13:51.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:51.574360 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 10:13:51.591454 systemd-networkd[1247]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:13:51.609870 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1228) Feb 9 10:13:51.627840 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:13:51.634172 systemd[1]: Finished systemd-udev-settle.service. Feb 9 10:13:51.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:51.640215 systemd[1]: Starting lvm2-activation-early.service... Feb 9 10:13:51.648837 kernel: mlx5_core ff73:00:02.0 enP65395s1: Link up Feb 9 10:13:51.674819 kernel: hv_netvsc 002248bb-354b-0022-48bb-354b002248bb eth0: Data path switched to VF: enP65395s1 Feb 9 10:13:51.675329 systemd-networkd[1247]: enP65395s1: Link UP Feb 9 10:13:51.675494 systemd-networkd[1247]: eth0: Link UP Feb 9 10:13:51.675566 systemd-networkd[1247]: eth0: Gained carrier Feb 9 10:13:51.683038 systemd-networkd[1247]: enP65395s1: Gained carrier Feb 9 10:13:51.696926 systemd-networkd[1247]: eth0: DHCPv4 address 10.200.20.13/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 10:13:51.832517 lvm[1304]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:13:51.868736 systemd[1]: Finished lvm2-activation-early.service. Feb 9 10:13:51.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:51.873713 systemd[1]: Reached target cryptsetup.target. Feb 9 10:13:51.879588 systemd[1]: Starting lvm2-activation.service... Feb 9 10:13:51.883887 lvm[1305]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:13:51.903820 systemd[1]: Finished lvm2-activation.service. Feb 9 10:13:51.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:51.908452 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:13:51.913199 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 10:13:51.913227 systemd[1]: Reached target local-fs.target. Feb 9 10:13:51.917809 systemd[1]: Reached target machines.target. Feb 9 10:13:51.923263 systemd[1]: Starting ldconfig.service... Feb 9 10:13:51.927268 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 10:13:51.927329 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:13:51.928528 systemd[1]: Starting systemd-boot-update.service... Feb 9 10:13:51.933741 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 10:13:51.940847 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 10:13:51.945213 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:13:51.945268 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:13:51.946357 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 10:13:51.977744 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1307 (bootctl) Feb 9 10:13:51.979090 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 10:13:51.991344 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 10:13:51.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:52.666161 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 10:13:52.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:52.667848 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 10:13:52.676882 systemd-tmpfiles[1310]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 10:13:52.733917 systemd-fsck[1315]: fsck.fat 4.2 (2021-01-31) Feb 9 10:13:52.733917 systemd-fsck[1315]: /dev/sda1: 236 files, 113719/258078 clusters Feb 9 10:13:52.736475 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 10:13:52.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:52.743739 systemd[1]: Mounting boot.mount... Feb 9 10:13:52.758649 systemd[1]: Mounted boot.mount. Feb 9 10:13:52.762834 systemd-tmpfiles[1310]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 10:13:52.768962 systemd[1]: Finished systemd-boot-update.service. Feb 9 10:13:52.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:52.820912 systemd-tmpfiles[1310]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 10:13:53.395971 systemd-networkd[1247]: eth0: Gained IPv6LL Feb 9 10:13:53.400695 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 10:13:53.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:53.579463 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 10:13:53.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:53.585685 systemd[1]: Starting audit-rules.service... Feb 9 10:13:53.590585 systemd[1]: Starting clean-ca-certificates.service... Feb 9 10:13:53.596085 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 10:13:53.600000 audit: BPF prog-id=27 op=LOAD Feb 9 10:13:53.602935 systemd[1]: Starting systemd-resolved.service... Feb 9 10:13:53.606000 audit: BPF prog-id=28 op=LOAD Feb 9 10:13:53.608391 systemd[1]: Starting systemd-timesyncd.service... Feb 9 10:13:53.613370 systemd[1]: Starting systemd-update-utmp.service... Feb 9 10:13:53.684699 systemd[1]: Finished clean-ca-certificates.service. Feb 9 10:13:53.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:53.689790 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 10:13:53.690000 audit[1327]: SYSTEM_BOOT pid=1327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 10:13:53.693571 systemd[1]: Finished systemd-update-utmp.service. Feb 9 10:13:53.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:53.714372 systemd[1]: Started systemd-timesyncd.service. Feb 9 10:13:53.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:53.718870 systemd[1]: Reached target time-set.target. Feb 9 10:13:53.784736 systemd-resolved[1325]: Positive Trust Anchors: Feb 9 10:13:53.785065 systemd-resolved[1325]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:13:53.785145 systemd-resolved[1325]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:13:53.836507 systemd-resolved[1325]: Using system hostname 'ci-3510.3.2-a-89d14aa977'. Feb 9 10:13:53.837769 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 10:13:53.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:53.843301 systemd[1]: Started systemd-resolved.service. Feb 9 10:13:53.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:13:53.847686 systemd[1]: Reached target network.target. Feb 9 10:13:53.852029 systemd[1]: Reached target network-online.target. Feb 9 10:13:53.856645 systemd[1]: Reached target nss-lookup.target. Feb 9 10:13:53.859157 systemd-timesyncd[1326]: Contacted time server 155.248.196.28:123 (0.flatcar.pool.ntp.org). Feb 9 10:13:53.859212 systemd-timesyncd[1326]: Initial clock synchronization to Fri 2024-02-09 10:13:53.858340 UTC. Feb 9 10:13:53.946000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 10:13:53.946000 audit[1342]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe5140760 a2=420 a3=0 items=0 ppid=1321 pid=1342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:13:53.946000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 10:13:53.957561 augenrules[1342]: No rules Feb 9 10:13:53.958555 systemd[1]: Finished audit-rules.service. Feb 9 10:13:58.511000 ldconfig[1306]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 10:13:58.527954 systemd[1]: Finished ldconfig.service. Feb 9 10:13:58.533975 systemd[1]: Starting systemd-update-done.service... Feb 9 10:13:58.566839 systemd[1]: Finished systemd-update-done.service. Feb 9 10:13:58.571632 systemd[1]: Reached target sysinit.target. Feb 9 10:13:58.575758 systemd[1]: Started motdgen.path. Feb 9 10:13:58.579414 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 10:13:58.585394 systemd[1]: Started logrotate.timer. Feb 9 10:13:58.589172 systemd[1]: Started mdadm.timer. Feb 9 10:13:58.592589 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 10:13:58.597082 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 10:13:58.597112 systemd[1]: Reached target paths.target. Feb 9 10:13:58.601088 systemd[1]: Reached target timers.target. Feb 9 10:13:58.605583 systemd[1]: Listening on dbus.socket. Feb 9 10:13:58.610394 systemd[1]: Starting docker.socket... Feb 9 10:13:58.616069 systemd[1]: Listening on sshd.socket. Feb 9 10:13:58.620155 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:13:58.620603 systemd[1]: Listening on docker.socket. Feb 9 10:13:58.624757 systemd[1]: Reached target sockets.target. Feb 9 10:13:58.628894 systemd[1]: Reached target basic.target. Feb 9 10:13:58.632847 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:13:58.632873 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:13:58.633894 systemd[1]: Starting containerd.service... Feb 9 10:13:58.638269 systemd[1]: Starting dbus.service... Feb 9 10:13:58.642876 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 10:13:58.647880 systemd[1]: Starting extend-filesystems.service... Feb 9 10:13:58.651945 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 10:13:58.652912 systemd[1]: Starting motdgen.service... Feb 9 10:13:58.657216 systemd[1]: Started nvidia.service. Feb 9 10:13:58.662935 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 10:13:58.668122 systemd[1]: Starting prepare-critools.service... Feb 9 10:13:58.672935 systemd[1]: Starting prepare-helm.service... Feb 9 10:13:58.677511 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 10:13:58.682605 systemd[1]: Starting sshd-keygen.service... Feb 9 10:13:58.690541 systemd[1]: Starting systemd-logind.service... Feb 9 10:13:58.696134 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:13:58.696193 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 10:13:58.696577 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 10:13:58.697193 systemd[1]: Starting update-engine.service... Feb 9 10:13:58.702411 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 10:13:58.709680 jq[1352]: false Feb 9 10:13:58.710009 jq[1371]: true Feb 9 10:13:58.717147 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 10:13:58.717643 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 10:13:58.723642 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 10:13:58.723789 systemd[1]: Finished motdgen.service. Feb 9 10:13:58.731100 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 10:13:58.731277 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 10:13:58.738429 extend-filesystems[1353]: Found sda Feb 9 10:13:58.743047 extend-filesystems[1353]: Found sda1 Feb 9 10:13:58.743047 extend-filesystems[1353]: Found sda2 Feb 9 10:13:58.743047 extend-filesystems[1353]: Found sda3 Feb 9 10:13:58.743047 extend-filesystems[1353]: Found usr Feb 9 10:13:58.743047 extend-filesystems[1353]: Found sda4 Feb 9 10:13:58.743047 extend-filesystems[1353]: Found sda6 Feb 9 10:13:58.743047 extend-filesystems[1353]: Found sda7 Feb 9 10:13:58.743047 extend-filesystems[1353]: Found sda9 Feb 9 10:13:58.743047 extend-filesystems[1353]: Checking size of /dev/sda9 Feb 9 10:13:58.788350 env[1381]: time="2024-02-09T10:13:58.779433545Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 10:13:58.789290 systemd-logind[1368]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 10:13:58.795684 jq[1380]: true Feb 9 10:13:58.791678 systemd-logind[1368]: New seat seat0. Feb 9 10:13:58.831759 env[1381]: time="2024-02-09T10:13:58.831715379Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 10:13:58.832021 env[1381]: time="2024-02-09T10:13:58.832003249Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:13:58.833112 env[1381]: time="2024-02-09T10:13:58.833081732Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:13:58.833191 env[1381]: time="2024-02-09T10:13:58.833176849Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:13:58.833529 env[1381]: time="2024-02-09T10:13:58.833505757Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:13:58.833826 env[1381]: time="2024-02-09T10:13:58.833789748Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 10:13:58.833927 env[1381]: time="2024-02-09T10:13:58.833910184Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 10:13:58.833995 env[1381]: time="2024-02-09T10:13:58.833981101Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 10:13:58.834125 env[1381]: time="2024-02-09T10:13:58.834109177Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:13:58.834394 env[1381]: time="2024-02-09T10:13:58.834374367Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:13:58.834575 env[1381]: time="2024-02-09T10:13:58.834554601Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:13:58.834642 env[1381]: time="2024-02-09T10:13:58.834629119Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 10:13:58.834751 env[1381]: time="2024-02-09T10:13:58.834733715Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 10:13:58.834842 env[1381]: time="2024-02-09T10:13:58.834826992Z" level=info msg="metadata content store policy set" policy=shared Feb 9 10:13:58.849007 env[1381]: time="2024-02-09T10:13:58.848971703Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 10:13:58.849134 env[1381]: time="2024-02-09T10:13:58.849119498Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 10:13:58.849204 env[1381]: time="2024-02-09T10:13:58.849190016Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 10:13:58.849295 env[1381]: time="2024-02-09T10:13:58.849281213Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 10:13:58.849414 env[1381]: time="2024-02-09T10:13:58.849400009Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 10:13:58.849487 env[1381]: time="2024-02-09T10:13:58.849473726Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 10:13:58.849554 env[1381]: time="2024-02-09T10:13:58.849541324Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 10:13:58.849978 env[1381]: time="2024-02-09T10:13:58.849955469Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 10:13:58.850076 env[1381]: time="2024-02-09T10:13:58.850060906Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 10:13:58.850164 env[1381]: time="2024-02-09T10:13:58.850149103Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 10:13:58.850238 env[1381]: time="2024-02-09T10:13:58.850225340Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 10:13:58.850301 env[1381]: time="2024-02-09T10:13:58.850287938Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 10:13:58.850488 env[1381]: time="2024-02-09T10:13:58.850471492Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 10:13:58.850671 env[1381]: time="2024-02-09T10:13:58.850653765Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 10:13:58.851038 env[1381]: time="2024-02-09T10:13:58.851009753Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 10:13:58.851136 env[1381]: time="2024-02-09T10:13:58.851120269Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 10:13:58.851206 env[1381]: time="2024-02-09T10:13:58.851192787Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 10:13:58.851328 env[1381]: time="2024-02-09T10:13:58.851314062Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 10:13:58.851452 env[1381]: time="2024-02-09T10:13:58.851437858Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 10:13:58.851530 env[1381]: time="2024-02-09T10:13:58.851517695Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 10:13:58.851599 env[1381]: time="2024-02-09T10:13:58.851575133Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 10:13:58.851675 env[1381]: time="2024-02-09T10:13:58.851651491Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 10:13:58.851732 env[1381]: time="2024-02-09T10:13:58.851720088Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 10:13:58.851825 env[1381]: time="2024-02-09T10:13:58.851791126Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 10:13:58.851899 env[1381]: time="2024-02-09T10:13:58.851878843Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 10:13:58.851972 env[1381]: time="2024-02-09T10:13:58.851958400Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 10:13:58.852183 env[1381]: time="2024-02-09T10:13:58.852158633Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 10:13:58.852259 env[1381]: time="2024-02-09T10:13:58.852245270Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 10:13:58.852331 env[1381]: time="2024-02-09T10:13:58.852317428Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 10:13:58.852400 env[1381]: time="2024-02-09T10:13:58.852374186Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 10:13:58.852461 env[1381]: time="2024-02-09T10:13:58.852445943Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 10:13:58.852536 env[1381]: time="2024-02-09T10:13:58.852522741Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 10:13:58.852612 env[1381]: time="2024-02-09T10:13:58.852598538Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 10:13:58.852715 env[1381]: time="2024-02-09T10:13:58.852699935Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 10:13:58.853071 env[1381]: time="2024-02-09T10:13:58.853013324Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 10:13:58.865527 env[1381]: time="2024-02-09T10:13:58.853292954Z" level=info msg="Connect containerd service" Feb 9 10:13:58.865527 env[1381]: time="2024-02-09T10:13:58.853333313Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 10:13:58.865527 env[1381]: time="2024-02-09T10:13:58.854004570Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 10:13:58.865527 env[1381]: time="2024-02-09T10:13:58.854087407Z" level=info msg="Start subscribing containerd event" Feb 9 10:13:58.865527 env[1381]: time="2024-02-09T10:13:58.854125565Z" level=info msg="Start recovering state" Feb 9 10:13:58.865527 env[1381]: time="2024-02-09T10:13:58.854188443Z" level=info msg="Start event monitor" Feb 9 10:13:58.865527 env[1381]: time="2024-02-09T10:13:58.854206523Z" level=info msg="Start snapshots syncer" Feb 9 10:13:58.865527 env[1381]: time="2024-02-09T10:13:58.854215242Z" level=info msg="Start cni network conf syncer for default" Feb 9 10:13:58.865527 env[1381]: time="2024-02-09T10:13:58.854234562Z" level=info msg="Start streaming server" Feb 9 10:13:58.865527 env[1381]: time="2024-02-09T10:13:58.854595549Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 10:13:58.865527 env[1381]: time="2024-02-09T10:13:58.854647307Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 10:13:58.865527 env[1381]: time="2024-02-09T10:13:58.856754075Z" level=info msg="containerd successfully booted in 0.077973s" Feb 9 10:13:58.854789 systemd[1]: Started containerd.service. Feb 9 10:13:58.889848 bash[1420]: Updated "/home/core/.ssh/authorized_keys" Feb 9 10:13:58.890789 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 10:13:58.916497 extend-filesystems[1353]: Old size kept for /dev/sda9 Feb 9 10:13:58.921605 extend-filesystems[1353]: Found sr0 Feb 9 10:13:58.921673 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 10:13:58.921854 systemd[1]: Finished extend-filesystems.service. Feb 9 10:13:58.949866 tar[1377]: ./ Feb 9 10:13:58.949866 tar[1377]: ./macvlan Feb 9 10:13:58.951713 tar[1379]: linux-arm64/helm Feb 9 10:13:58.952862 dbus-daemon[1351]: [system] SELinux support is enabled Feb 9 10:13:58.953012 systemd[1]: Started dbus.service. Feb 9 10:13:58.958356 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 10:13:58.958385 systemd[1]: Reached target system-config.target. Feb 9 10:13:58.965883 tar[1378]: crictl Feb 9 10:13:58.966151 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 10:13:58.966178 systemd[1]: Reached target user-config.target. Feb 9 10:13:58.973771 dbus-daemon[1351]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 10:13:58.973902 systemd[1]: Started systemd-logind.service. Feb 9 10:13:58.993729 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 10:13:59.070866 tar[1377]: ./static Feb 9 10:13:59.131429 tar[1377]: ./vlan Feb 9 10:13:59.209271 tar[1377]: ./portmap Feb 9 10:13:59.289771 tar[1377]: ./host-local Feb 9 10:13:59.319133 update_engine[1369]: I0209 10:13:59.306569 1369 main.cc:92] Flatcar Update Engine starting Feb 9 10:13:59.361154 systemd[1]: Started update-engine.service. Feb 9 10:13:59.367205 systemd[1]: Started locksmithd.service. Feb 9 10:13:59.371950 update_engine[1369]: I0209 10:13:59.371615 1369 update_check_scheduler.cc:74] Next update check in 11m8s Feb 9 10:13:59.372037 tar[1377]: ./vrf Feb 9 10:13:59.450164 tar[1377]: ./bridge Feb 9 10:13:59.527776 systemd[1]: Finished prepare-critools.service. Feb 9 10:13:59.533397 tar[1377]: ./tuning Feb 9 10:13:59.588645 tar[1377]: ./firewall Feb 9 10:13:59.648992 tar[1377]: ./host-device Feb 9 10:13:59.705919 tar[1377]: ./sbr Feb 9 10:13:59.726268 tar[1379]: linux-arm64/LICENSE Feb 9 10:13:59.726482 tar[1379]: linux-arm64/README.md Feb 9 10:13:59.731239 systemd[1]: Finished prepare-helm.service. Feb 9 10:13:59.749222 tar[1377]: ./loopback Feb 9 10:13:59.776072 tar[1377]: ./dhcp Feb 9 10:13:59.850136 tar[1377]: ./ptp Feb 9 10:13:59.882403 tar[1377]: ./ipvlan Feb 9 10:13:59.914091 tar[1377]: ./bandwidth Feb 9 10:13:59.978923 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 10:14:00.745054 locksmithd[1459]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 10:14:03.311891 sshd_keygen[1373]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 10:14:03.328303 systemd[1]: Finished sshd-keygen.service. Feb 9 10:14:03.334634 systemd[1]: Starting issuegen.service... Feb 9 10:14:03.339404 systemd[1]: Started waagent.service. Feb 9 10:14:03.344036 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 10:14:03.344199 systemd[1]: Finished issuegen.service. Feb 9 10:14:03.349732 systemd[1]: Starting systemd-user-sessions.service... Feb 9 10:14:03.371977 systemd[1]: Finished systemd-user-sessions.service. Feb 9 10:14:03.378812 systemd[1]: Started getty@tty1.service. Feb 9 10:14:03.384431 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 10:14:03.389203 systemd[1]: Reached target getty.target. Feb 9 10:14:03.393282 systemd[1]: Reached target multi-user.target. Feb 9 10:14:03.399050 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 10:14:03.410305 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 10:14:03.410454 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 10:14:03.417450 systemd[1]: Startup finished in 725ms (kernel) + 14.758s (initrd) + 21.256s (userspace) = 36.740s. Feb 9 10:14:03.934765 login[1482]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 10:14:03.950471 login[1481]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 10:14:04.015983 systemd[1]: Created slice user-500.slice. Feb 9 10:14:04.017146 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 10:14:04.026040 systemd-logind[1368]: New session 1 of user core. Feb 9 10:14:04.301013 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 10:14:04.302389 systemd[1]: Starting user@500.service... Feb 9 10:14:04.623228 (systemd)[1485]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:04.800965 systemd[1485]: Queued start job for default target default.target. Feb 9 10:14:04.802191 systemd[1485]: Reached target paths.target. Feb 9 10:14:04.802308 systemd[1485]: Reached target sockets.target. Feb 9 10:14:04.802384 systemd[1485]: Reached target timers.target. Feb 9 10:14:04.802449 systemd[1485]: Reached target basic.target. Feb 9 10:14:04.802603 systemd[1]: Started user@500.service. Feb 9 10:14:04.803422 systemd[1]: Started session-1.scope. Feb 9 10:14:04.804050 systemd[1485]: Reached target default.target. Feb 9 10:14:04.804096 systemd[1485]: Startup finished in 174ms. Feb 9 10:14:04.936160 login[1482]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 10:14:04.940690 systemd[1]: Started session-2.scope. Feb 9 10:14:04.941082 systemd-logind[1368]: New session 2 of user core. Feb 9 10:14:09.608239 waagent[1479]: 2024-02-09T10:14:09.608123Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 10:14:09.637760 waagent[1479]: 2024-02-09T10:14:09.637667Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 10:14:09.642501 waagent[1479]: 2024-02-09T10:14:09.642430Z INFO Daemon Daemon Python: 3.9.16 Feb 9 10:14:09.647001 waagent[1479]: 2024-02-09T10:14:09.646925Z INFO Daemon Daemon Run daemon Feb 9 10:14:09.651370 waagent[1479]: 2024-02-09T10:14:09.651295Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 10:14:09.676598 waagent[1479]: 2024-02-09T10:14:09.676455Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 10:14:09.692622 waagent[1479]: 2024-02-09T10:14:09.692489Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 10:14:09.702728 waagent[1479]: 2024-02-09T10:14:09.702639Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 10:14:09.707946 waagent[1479]: 2024-02-09T10:14:09.707862Z INFO Daemon Daemon Using waagent for provisioning Feb 9 10:14:09.713759 waagent[1479]: 2024-02-09T10:14:09.713685Z INFO Daemon Daemon Activate resource disk Feb 9 10:14:09.718600 waagent[1479]: 2024-02-09T10:14:09.718529Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 10:14:09.733416 waagent[1479]: 2024-02-09T10:14:09.733321Z INFO Daemon Daemon Found device: None Feb 9 10:14:09.738393 waagent[1479]: 2024-02-09T10:14:09.738308Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 10:14:09.747264 waagent[1479]: 2024-02-09T10:14:09.747183Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 10:14:09.759477 waagent[1479]: 2024-02-09T10:14:09.759404Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 10:14:09.765641 waagent[1479]: 2024-02-09T10:14:09.765570Z INFO Daemon Daemon Running default provisioning handler Feb 9 10:14:09.778611 waagent[1479]: 2024-02-09T10:14:09.778487Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 10:14:09.793659 waagent[1479]: 2024-02-09T10:14:09.793531Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 10:14:09.803660 waagent[1479]: 2024-02-09T10:14:09.803572Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 10:14:09.809243 waagent[1479]: 2024-02-09T10:14:09.809141Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 10:14:09.833332 waagent[1479]: 2024-02-09T10:14:09.833209Z INFO Daemon Daemon Successfully mounted dvd Feb 9 10:14:09.979625 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 10:14:10.006776 waagent[1479]: 2024-02-09T10:14:10.006632Z INFO Daemon Daemon Detect protocol endpoint Feb 9 10:14:10.011727 waagent[1479]: 2024-02-09T10:14:10.011653Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 10:14:10.017640 waagent[1479]: 2024-02-09T10:14:10.017574Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 10:14:10.024179 waagent[1479]: 2024-02-09T10:14:10.024118Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 10:14:10.030136 waagent[1479]: 2024-02-09T10:14:10.030070Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 10:14:10.035431 waagent[1479]: 2024-02-09T10:14:10.035367Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 10:14:10.132429 waagent[1479]: 2024-02-09T10:14:10.132361Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 10:14:10.140395 waagent[1479]: 2024-02-09T10:14:10.140345Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 10:14:10.146308 waagent[1479]: 2024-02-09T10:14:10.146239Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 10:14:11.213050 waagent[1479]: 2024-02-09T10:14:11.212906Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 10:14:11.229182 waagent[1479]: 2024-02-09T10:14:11.229108Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 10:14:11.235427 waagent[1479]: 2024-02-09T10:14:11.235359Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 10:14:11.310348 waagent[1479]: 2024-02-09T10:14:11.310224Z INFO Daemon Daemon Found private key matching thumbprint A2F7CD8052EA0689D15733EBAE078351EFE8A67B Feb 9 10:14:11.319429 waagent[1479]: 2024-02-09T10:14:11.319343Z INFO Daemon Daemon Certificate with thumbprint EB8877E10D40B7DD73A4E0F8B7B6AE0A92120135 has no matching private key. Feb 9 10:14:11.329342 waagent[1479]: 2024-02-09T10:14:11.329256Z INFO Daemon Daemon Fetch goal state completed Feb 9 10:14:11.380245 waagent[1479]: 2024-02-09T10:14:11.380188Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 89f63479-73d9-4e9c-8b5f-5f47fdade7fc New eTag: 5251068705070777042] Feb 9 10:14:11.390951 waagent[1479]: 2024-02-09T10:14:11.390872Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 10:14:11.406588 waagent[1479]: 2024-02-09T10:14:11.406522Z INFO Daemon Daemon Starting provisioning Feb 9 10:14:11.411657 waagent[1479]: 2024-02-09T10:14:11.411589Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 10:14:11.416715 waagent[1479]: 2024-02-09T10:14:11.416651Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-89d14aa977] Feb 9 10:14:11.456092 waagent[1479]: 2024-02-09T10:14:11.455959Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-89d14aa977] Feb 9 10:14:11.463179 waagent[1479]: 2024-02-09T10:14:11.463049Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 10:14:11.469876 waagent[1479]: 2024-02-09T10:14:11.469772Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 10:14:11.485890 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 10:14:11.486052 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 10:14:11.486112 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 10:14:11.486390 systemd[1]: Stopping systemd-networkd.service... Feb 9 10:14:11.489868 systemd-networkd[1247]: eth0: DHCPv6 lease lost Feb 9 10:14:11.491185 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 10:14:11.491360 systemd[1]: Stopped systemd-networkd.service. Feb 9 10:14:11.493379 systemd[1]: Starting systemd-networkd.service... Feb 9 10:14:11.521428 systemd-networkd[1527]: enP65395s1: Link UP Feb 9 10:14:11.521698 systemd-networkd[1527]: enP65395s1: Gained carrier Feb 9 10:14:11.522704 systemd-networkd[1527]: eth0: Link UP Feb 9 10:14:11.522791 systemd-networkd[1527]: eth0: Gained carrier Feb 9 10:14:11.523199 systemd-networkd[1527]: lo: Link UP Feb 9 10:14:11.523266 systemd-networkd[1527]: lo: Gained carrier Feb 9 10:14:11.523562 systemd-networkd[1527]: eth0: Gained IPv6LL Feb 9 10:14:11.523874 systemd-networkd[1527]: Enumeration completed Feb 9 10:14:11.524537 systemd[1]: Started systemd-networkd.service. Feb 9 10:14:11.526277 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 10:14:11.532753 waagent[1479]: 2024-02-09T10:14:11.526302Z INFO Daemon Daemon Create user account if not exists Feb 9 10:14:11.533771 waagent[1479]: 2024-02-09T10:14:11.533657Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 10:14:11.533912 systemd-networkd[1527]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:14:11.541276 waagent[1479]: 2024-02-09T10:14:11.541163Z INFO Daemon Daemon Configure sudoer Feb 9 10:14:11.546886 waagent[1479]: 2024-02-09T10:14:11.546751Z INFO Daemon Daemon Configure sshd Feb 9 10:14:11.552896 waagent[1479]: 2024-02-09T10:14:11.552795Z INFO Daemon Daemon Deploy ssh public key. Feb 9 10:14:11.562888 systemd-networkd[1527]: eth0: DHCPv4 address 10.200.20.13/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 10:14:11.565336 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 10:14:11.594245 waagent[1479]: 2024-02-09T10:14:11.594107Z INFO Daemon Daemon Decode custom data Feb 9 10:14:11.599109 waagent[1479]: 2024-02-09T10:14:11.599035Z INFO Daemon Daemon Save custom data Feb 9 10:14:12.775217 waagent[1479]: 2024-02-09T10:14:12.775141Z INFO Daemon Daemon Provisioning complete Feb 9 10:14:12.793618 waagent[1479]: 2024-02-09T10:14:12.793550Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 10:14:12.800677 waagent[1479]: 2024-02-09T10:14:12.800579Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 10:14:12.811917 waagent[1479]: 2024-02-09T10:14:12.811829Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 10:14:13.123549 waagent[1536]: 2024-02-09T10:14:13.123390Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 10:14:13.124719 waagent[1536]: 2024-02-09T10:14:13.124652Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:14:13.125036 waagent[1536]: 2024-02-09T10:14:13.124981Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:14:13.137900 waagent[1536]: 2024-02-09T10:14:13.137790Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 10:14:13.138247 waagent[1536]: 2024-02-09T10:14:13.138191Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 10:14:13.210416 waagent[1536]: 2024-02-09T10:14:13.210273Z INFO ExtHandler ExtHandler Found private key matching thumbprint A2F7CD8052EA0689D15733EBAE078351EFE8A67B Feb 9 10:14:13.210880 waagent[1536]: 2024-02-09T10:14:13.210751Z INFO ExtHandler ExtHandler Certificate with thumbprint EB8877E10D40B7DD73A4E0F8B7B6AE0A92120135 has no matching private key. Feb 9 10:14:13.211283 waagent[1536]: 2024-02-09T10:14:13.211222Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 10:14:13.227940 waagent[1536]: 2024-02-09T10:14:13.227875Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 4163cbb7-7ad9-43df-866f-2c0d31fa6e5e New eTag: 5251068705070777042] Feb 9 10:14:13.228771 waagent[1536]: 2024-02-09T10:14:13.228700Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 10:14:13.289485 waagent[1536]: 2024-02-09T10:14:13.289335Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 10:14:13.300348 waagent[1536]: 2024-02-09T10:14:13.300256Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1536 Feb 9 10:14:13.304536 waagent[1536]: 2024-02-09T10:14:13.304456Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 10:14:13.306144 waagent[1536]: 2024-02-09T10:14:13.306075Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 10:14:13.386876 waagent[1536]: 2024-02-09T10:14:13.386742Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 10:14:13.387470 waagent[1536]: 2024-02-09T10:14:13.387408Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 10:14:13.395593 waagent[1536]: 2024-02-09T10:14:13.395526Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 10:14:13.396135 waagent[1536]: 2024-02-09T10:14:13.396073Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 10:14:13.397301 waagent[1536]: 2024-02-09T10:14:13.397235Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 10:14:13.398711 waagent[1536]: 2024-02-09T10:14:13.398636Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 10:14:13.399225 waagent[1536]: 2024-02-09T10:14:13.399159Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:14:13.399504 waagent[1536]: 2024-02-09T10:14:13.399451Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:14:13.400228 waagent[1536]: 2024-02-09T10:14:13.400151Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 10:14:13.400818 waagent[1536]: 2024-02-09T10:14:13.400734Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:14:13.401054 waagent[1536]: 2024-02-09T10:14:13.400925Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 10:14:13.401287 waagent[1536]: 2024-02-09T10:14:13.401226Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:14:13.402121 waagent[1536]: 2024-02-09T10:14:13.402052Z INFO EnvHandler ExtHandler Configure routes Feb 9 10:14:13.402388 waagent[1536]: 2024-02-09T10:14:13.402307Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 10:14:13.402388 waagent[1536]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 10:14:13.402388 waagent[1536]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 10:14:13.402388 waagent[1536]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 10:14:13.402388 waagent[1536]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:14:13.402388 waagent[1536]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:14:13.402388 waagent[1536]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:14:13.402575 waagent[1536]: 2024-02-09T10:14:13.402495Z INFO EnvHandler ExtHandler Gateway:None Feb 9 10:14:13.402669 waagent[1536]: 2024-02-09T10:14:13.402614Z INFO EnvHandler ExtHandler Routes:None Feb 9 10:14:13.406017 waagent[1536]: 2024-02-09T10:14:13.405864Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 10:14:13.406266 waagent[1536]: 2024-02-09T10:14:13.406168Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 10:14:13.407129 waagent[1536]: 2024-02-09T10:14:13.407047Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 10:14:13.407364 waagent[1536]: 2024-02-09T10:14:13.407268Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 10:14:13.407656 waagent[1536]: 2024-02-09T10:14:13.407591Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 10:14:13.420041 waagent[1536]: 2024-02-09T10:14:13.419959Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 10:14:13.421059 waagent[1536]: 2024-02-09T10:14:13.420980Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 10:14:13.422386 waagent[1536]: 2024-02-09T10:14:13.422303Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 10:14:13.457705 waagent[1536]: 2024-02-09T10:14:13.457553Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1527' Feb 9 10:14:13.472554 waagent[1536]: 2024-02-09T10:14:13.472475Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 10:14:13.514344 waagent[1536]: 2024-02-09T10:14:13.514197Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 10:14:13.514344 waagent[1536]: Executing ['ip', '-a', '-o', 'link']: Feb 9 10:14:13.514344 waagent[1536]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 10:14:13.514344 waagent[1536]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bb:35:4b brd ff:ff:ff:ff:ff:ff Feb 9 10:14:13.514344 waagent[1536]: 3: enP65395s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bb:35:4b brd ff:ff:ff:ff:ff:ff\ altname enP65395p0s2 Feb 9 10:14:13.514344 waagent[1536]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 10:14:13.514344 waagent[1536]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 10:14:13.514344 waagent[1536]: 2: eth0 inet 10.200.20.13/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 10:14:13.514344 waagent[1536]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 10:14:13.514344 waagent[1536]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 10:14:13.514344 waagent[1536]: 2: eth0 inet6 fe80::222:48ff:febb:354b/64 scope link \ valid_lft forever preferred_lft forever Feb 9 10:14:13.622450 waagent[1536]: 2024-02-09T10:14:13.622379Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 10:14:13.815736 waagent[1479]: 2024-02-09T10:14:13.815606Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 10:14:13.819436 waagent[1479]: 2024-02-09T10:14:13.819380Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 10:14:14.971112 waagent[1565]: 2024-02-09T10:14:14.971004Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 10:14:14.972221 waagent[1565]: 2024-02-09T10:14:14.972154Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 10:14:14.972490 waagent[1565]: 2024-02-09T10:14:14.972438Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 10:14:14.981192 waagent[1565]: 2024-02-09T10:14:14.981080Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 10:14:14.981728 waagent[1565]: 2024-02-09T10:14:14.981667Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:14:14.982036 waagent[1565]: 2024-02-09T10:14:14.981978Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:14:14.995215 waagent[1565]: 2024-02-09T10:14:14.995137Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 10:14:15.006986 waagent[1565]: 2024-02-09T10:14:15.006917Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 10:14:15.008255 waagent[1565]: 2024-02-09T10:14:15.008185Z INFO ExtHandler Feb 9 10:14:15.008533 waagent[1565]: 2024-02-09T10:14:15.008476Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: b56d0224-0f23-4d50-815e-9417752ada41 eTag: 5251068705070777042 source: Fabric] Feb 9 10:14:15.009443 waagent[1565]: 2024-02-09T10:14:15.009374Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 10:14:15.010907 waagent[1565]: 2024-02-09T10:14:15.010838Z INFO ExtHandler Feb 9 10:14:15.011170 waagent[1565]: 2024-02-09T10:14:15.011115Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 10:14:15.020154 waagent[1565]: 2024-02-09T10:14:15.020093Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 10:14:15.020840 waagent[1565]: 2024-02-09T10:14:15.020758Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 10:14:15.049241 waagent[1565]: 2024-02-09T10:14:15.049172Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 10:14:15.123552 waagent[1565]: 2024-02-09T10:14:15.123400Z INFO ExtHandler Downloaded certificate {'thumbprint': 'EB8877E10D40B7DD73A4E0F8B7B6AE0A92120135', 'hasPrivateKey': False} Feb 9 10:14:15.124942 waagent[1565]: 2024-02-09T10:14:15.124870Z INFO ExtHandler Downloaded certificate {'thumbprint': 'A2F7CD8052EA0689D15733EBAE078351EFE8A67B', 'hasPrivateKey': True} Feb 9 10:14:15.126231 waagent[1565]: 2024-02-09T10:14:15.126158Z INFO ExtHandler Fetch goal state completed Feb 9 10:14:15.151896 waagent[1565]: 2024-02-09T10:14:15.151780Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1565 Feb 9 10:14:15.155708 waagent[1565]: 2024-02-09T10:14:15.155632Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 10:14:15.157430 waagent[1565]: 2024-02-09T10:14:15.157361Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 10:14:15.163387 waagent[1565]: 2024-02-09T10:14:15.163330Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 10:14:15.163989 waagent[1565]: 2024-02-09T10:14:15.163923Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 10:14:15.172310 waagent[1565]: 2024-02-09T10:14:15.172245Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 10:14:15.172795 waagent[1565]: 2024-02-09T10:14:15.172733Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 10:14:15.179691 waagent[1565]: 2024-02-09T10:14:15.179568Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 9 10:14:15.183411 waagent[1565]: 2024-02-09T10:14:15.183347Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 10:14:15.185031 waagent[1565]: 2024-02-09T10:14:15.184952Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 10:14:15.185587 waagent[1565]: 2024-02-09T10:14:15.185520Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:14:15.185917 waagent[1565]: 2024-02-09T10:14:15.185856Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:14:15.186637 waagent[1565]: 2024-02-09T10:14:15.186567Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 10:14:15.187124 waagent[1565]: 2024-02-09T10:14:15.187057Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 10:14:15.187124 waagent[1565]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 10:14:15.187124 waagent[1565]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 10:14:15.187124 waagent[1565]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 10:14:15.187124 waagent[1565]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:14:15.187124 waagent[1565]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:14:15.187124 waagent[1565]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:14:15.189916 waagent[1565]: 2024-02-09T10:14:15.189749Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 10:14:15.193187 waagent[1565]: 2024-02-09T10:14:15.192998Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 10:14:15.193594 waagent[1565]: 2024-02-09T10:14:15.193496Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:14:15.193757 waagent[1565]: 2024-02-09T10:14:15.193665Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 10:14:15.194615 waagent[1565]: 2024-02-09T10:14:15.194543Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:14:15.195406 waagent[1565]: 2024-02-09T10:14:15.195330Z INFO EnvHandler ExtHandler Configure routes Feb 9 10:14:15.196075 waagent[1565]: 2024-02-09T10:14:15.195997Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 10:14:15.196190 waagent[1565]: 2024-02-09T10:14:15.196138Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 10:14:15.199136 waagent[1565]: 2024-02-09T10:14:15.198972Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 10:14:15.200311 waagent[1565]: 2024-02-09T10:14:15.200225Z INFO EnvHandler ExtHandler Gateway:None Feb 9 10:14:15.201294 waagent[1565]: 2024-02-09T10:14:15.201217Z INFO EnvHandler ExtHandler Routes:None Feb 9 10:14:15.202523 waagent[1565]: 2024-02-09T10:14:15.202449Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 10:14:15.202523 waagent[1565]: Executing ['ip', '-a', '-o', 'link']: Feb 9 10:14:15.202523 waagent[1565]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 10:14:15.202523 waagent[1565]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bb:35:4b brd ff:ff:ff:ff:ff:ff Feb 9 10:14:15.202523 waagent[1565]: 3: enP65395s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bb:35:4b brd ff:ff:ff:ff:ff:ff\ altname enP65395p0s2 Feb 9 10:14:15.202523 waagent[1565]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 10:14:15.202523 waagent[1565]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 10:14:15.202523 waagent[1565]: 2: eth0 inet 10.200.20.13/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 10:14:15.202523 waagent[1565]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 10:14:15.202523 waagent[1565]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 10:14:15.202523 waagent[1565]: 2: eth0 inet6 fe80::222:48ff:febb:354b/64 scope link \ valid_lft forever preferred_lft forever Feb 9 10:14:15.218654 waagent[1565]: 2024-02-09T10:14:15.218555Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 10:14:15.218965 waagent[1565]: 2024-02-09T10:14:15.218896Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 10:14:15.259137 waagent[1565]: 2024-02-09T10:14:15.259021Z INFO ExtHandler ExtHandler Feb 9 10:14:15.264433 waagent[1565]: 2024-02-09T10:14:15.264253Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: bfcac903-983c-40f2-8140-d4458c3f704d correlation c0a577a3-6710-4173-b385-983477f8096d created: 2024-02-09T10:12:46.796585Z] Feb 9 10:14:15.266254 waagent[1565]: 2024-02-09T10:14:15.266156Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 10:14:15.273350 waagent[1565]: 2024-02-09T10:14:15.273176Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 14 ms] Feb 9 10:14:15.309407 waagent[1565]: 2024-02-09T10:14:15.309323Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 10:14:15.332036 waagent[1565]: 2024-02-09T10:14:15.331639Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: A3394AA0-C8F2-4A82-89F6-E3473DC7F831;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 10:14:15.427955 waagent[1565]: 2024-02-09T10:14:15.427780Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 9 10:14:15.427955 waagent[1565]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:14:15.427955 waagent[1565]: pkts bytes target prot opt in out source destination Feb 9 10:14:15.427955 waagent[1565]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:14:15.427955 waagent[1565]: pkts bytes target prot opt in out source destination Feb 9 10:14:15.427955 waagent[1565]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:14:15.427955 waagent[1565]: pkts bytes target prot opt in out source destination Feb 9 10:14:15.427955 waagent[1565]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 10:14:15.427955 waagent[1565]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 10:14:15.427955 waagent[1565]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 10:14:15.436633 waagent[1565]: 2024-02-09T10:14:15.436509Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 10:14:15.436633 waagent[1565]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:14:15.436633 waagent[1565]: pkts bytes target prot opt in out source destination Feb 9 10:14:15.436633 waagent[1565]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:14:15.436633 waagent[1565]: pkts bytes target prot opt in out source destination Feb 9 10:14:15.436633 waagent[1565]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:14:15.436633 waagent[1565]: pkts bytes target prot opt in out source destination Feb 9 10:14:15.436633 waagent[1565]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 10:14:15.436633 waagent[1565]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 10:14:15.436633 waagent[1565]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 10:14:15.437623 waagent[1565]: 2024-02-09T10:14:15.437565Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 10:14:39.462815 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 9 10:14:44.710615 update_engine[1369]: I0209 10:14:44.710559 1369 update_attempter.cc:509] Updating boot flags... Feb 9 10:14:54.076857 systemd[1]: Created slice system-sshd.slice. Feb 9 10:14:54.077934 systemd[1]: Started sshd@0-10.200.20.13:22-10.200.12.6:43056.service. Feb 9 10:14:54.622924 sshd[1684]: Accepted publickey for core from 10.200.12.6 port 43056 ssh2: RSA SHA256:qENxkfeCE2EA44FBhPE1ZaBU1zsllXfxSm/fBQgR9NE Feb 9 10:14:54.636896 sshd[1684]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:54.641382 systemd[1]: Started session-3.scope. Feb 9 10:14:54.641875 systemd-logind[1368]: New session 3 of user core. Feb 9 10:14:54.964381 systemd[1]: Started sshd@1-10.200.20.13:22-10.200.12.6:43062.service. Feb 9 10:14:55.352112 sshd[1689]: Accepted publickey for core from 10.200.12.6 port 43062 ssh2: RSA SHA256:qENxkfeCE2EA44FBhPE1ZaBU1zsllXfxSm/fBQgR9NE Feb 9 10:14:55.353619 sshd[1689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:55.357585 systemd[1]: Started session-4.scope. Feb 9 10:14:55.358845 systemd-logind[1368]: New session 4 of user core. Feb 9 10:14:55.637588 sshd[1689]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:55.640195 systemd-logind[1368]: Session 4 logged out. Waiting for processes to exit. Feb 9 10:14:55.640198 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 10:14:55.641032 systemd[1]: sshd@1-10.200.20.13:22-10.200.12.6:43062.service: Deactivated successfully. Feb 9 10:14:55.641988 systemd-logind[1368]: Removed session 4. Feb 9 10:14:55.704522 systemd[1]: Started sshd@2-10.200.20.13:22-10.200.12.6:43076.service. Feb 9 10:14:56.083578 sshd[1695]: Accepted publickey for core from 10.200.12.6 port 43076 ssh2: RSA SHA256:qENxkfeCE2EA44FBhPE1ZaBU1zsllXfxSm/fBQgR9NE Feb 9 10:14:56.084764 sshd[1695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:56.088903 systemd[1]: Started session-5.scope. Feb 9 10:14:56.089216 systemd-logind[1368]: New session 5 of user core. Feb 9 10:14:56.358576 sshd[1695]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:56.361116 systemd[1]: sshd@2-10.200.20.13:22-10.200.12.6:43076.service: Deactivated successfully. Feb 9 10:14:56.361745 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 10:14:56.362288 systemd-logind[1368]: Session 5 logged out. Waiting for processes to exit. Feb 9 10:14:56.363178 systemd-logind[1368]: Removed session 5. Feb 9 10:14:56.427593 systemd[1]: Started sshd@3-10.200.20.13:22-10.200.12.6:43086.service. Feb 9 10:14:56.841967 sshd[1701]: Accepted publickey for core from 10.200.12.6 port 43086 ssh2: RSA SHA256:qENxkfeCE2EA44FBhPE1ZaBU1zsllXfxSm/fBQgR9NE Feb 9 10:14:56.843146 sshd[1701]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:56.846851 systemd-logind[1368]: New session 6 of user core. Feb 9 10:14:56.847373 systemd[1]: Started session-6.scope. Feb 9 10:14:57.144098 sshd[1701]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:57.146551 systemd[1]: sshd@3-10.200.20.13:22-10.200.12.6:43086.service: Deactivated successfully. Feb 9 10:14:57.147222 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 10:14:57.147740 systemd-logind[1368]: Session 6 logged out. Waiting for processes to exit. Feb 9 10:14:57.148510 systemd-logind[1368]: Removed session 6. Feb 9 10:14:57.207632 systemd[1]: Started sshd@4-10.200.20.13:22-10.200.12.6:50162.service. Feb 9 10:14:57.586265 sshd[1707]: Accepted publickey for core from 10.200.12.6 port 50162 ssh2: RSA SHA256:qENxkfeCE2EA44FBhPE1ZaBU1zsllXfxSm/fBQgR9NE Feb 9 10:14:57.587741 sshd[1707]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:57.591659 systemd[1]: Started session-7.scope. Feb 9 10:14:57.592278 systemd-logind[1368]: New session 7 of user core. Feb 9 10:14:57.979629 sudo[1710]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 10:14:57.979845 sudo[1710]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:14:58.010721 dbus-daemon[1351]: avc: received setenforce notice (enforcing=1) Feb 9 10:14:58.010875 sudo[1710]: pam_unix(sudo:session): session closed for user root Feb 9 10:14:58.081537 sshd[1707]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:58.084372 systemd[1]: sshd@4-10.200.20.13:22-10.200.12.6:50162.service: Deactivated successfully. Feb 9 10:14:58.085171 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 10:14:58.085671 systemd-logind[1368]: Session 7 logged out. Waiting for processes to exit. Feb 9 10:14:58.086360 systemd-logind[1368]: Removed session 7. Feb 9 10:14:58.144872 systemd[1]: Started sshd@5-10.200.20.13:22-10.200.12.6:50164.service. Feb 9 10:14:58.524669 sshd[1714]: Accepted publickey for core from 10.200.12.6 port 50164 ssh2: RSA SHA256:qENxkfeCE2EA44FBhPE1ZaBU1zsllXfxSm/fBQgR9NE Feb 9 10:14:58.525929 sshd[1714]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:58.529982 systemd[1]: Started session-8.scope. Feb 9 10:14:58.530274 systemd-logind[1368]: New session 8 of user core. Feb 9 10:14:58.745253 sudo[1718]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 10:14:58.745454 sudo[1718]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:14:58.747885 sudo[1718]: pam_unix(sudo:session): session closed for user root Feb 9 10:14:58.751694 sudo[1717]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 10:14:58.751927 sudo[1717]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:14:58.759779 systemd[1]: Stopping audit-rules.service... Feb 9 10:14:58.759000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:14:58.764759 kernel: kauditd_printk_skb: 74 callbacks suppressed Feb 9 10:14:58.764827 kernel: audit: type=1305 audit(1707473698.759:171): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:14:58.759000 audit[1721]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe1cdf5b0 a2=420 a3=0 items=0 ppid=1 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:58.775220 auditctl[1721]: No rules Feb 9 10:14:58.779828 kernel: audit: type=1300 audit(1707473698.759:171): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe1cdf5b0 a2=420 a3=0 items=0 ppid=1 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:58.775683 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 10:14:58.775869 systemd[1]: Stopped audit-rules.service. Feb 9 10:14:58.777431 systemd[1]: Starting audit-rules.service... Feb 9 10:14:58.759000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:14:58.805715 kernel: audit: type=1327 audit(1707473698.759:171): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:14:58.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:58.815942 augenrules[1738]: No rules Feb 9 10:14:58.816851 systemd[1]: Finished audit-rules.service. Feb 9 10:14:58.821894 kernel: audit: type=1131 audit(1707473698.775:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:58.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:58.822943 sudo[1717]: pam_unix(sudo:session): session closed for user root Feb 9 10:14:58.838169 kernel: audit: type=1130 audit(1707473698.816:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:58.822000 audit[1717]: USER_END pid=1717 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:14:58.856630 kernel: audit: type=1106 audit(1707473698.822:174): pid=1717 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:14:58.822000 audit[1717]: CRED_DISP pid=1717 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:14:58.873154 kernel: audit: type=1104 audit(1707473698.822:175): pid=1717 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:14:58.896989 sshd[1714]: pam_unix(sshd:session): session closed for user core Feb 9 10:14:58.897000 audit[1714]: USER_END pid=1714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:14:58.899966 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 10:14:58.900629 systemd-logind[1368]: Session 8 logged out. Waiting for processes to exit. Feb 9 10:14:58.901316 systemd[1]: sshd@5-10.200.20.13:22-10.200.12.6:50164.service: Deactivated successfully. Feb 9 10:14:58.902513 systemd-logind[1368]: Removed session 8. Feb 9 10:14:58.897000 audit[1714]: CRED_DISP pid=1714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:14:58.937119 kernel: audit: type=1106 audit(1707473698.897:176): pid=1714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:14:58.937177 kernel: audit: type=1104 audit(1707473698.897:177): pid=1714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:14:58.937203 kernel: audit: type=1131 audit(1707473698.897:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.13:22-10.200.12.6:50164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:58.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.13:22-10.200.12.6:50164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:58.960468 systemd[1]: Started sshd@6-10.200.20.13:22-10.200.12.6:50176.service. Feb 9 10:14:58.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.13:22-10.200.12.6:50176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:14:59.339000 audit[1744]: USER_ACCT pid=1744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:14:59.340154 sshd[1744]: Accepted publickey for core from 10.200.12.6 port 50176 ssh2: RSA SHA256:qENxkfeCE2EA44FBhPE1ZaBU1zsllXfxSm/fBQgR9NE Feb 9 10:14:59.340000 audit[1744]: CRED_ACQ pid=1744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:14:59.340000 audit[1744]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3554d80 a2=3 a3=1 items=0 ppid=1 pid=1744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:14:59.340000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:14:59.341630 sshd[1744]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:14:59.345285 systemd-logind[1368]: New session 9 of user core. Feb 9 10:14:59.345670 systemd[1]: Started session-9.scope. Feb 9 10:14:59.348000 audit[1744]: USER_START pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:14:59.350000 audit[1746]: CRED_ACQ pid=1746 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:14:59.559000 audit[1747]: USER_ACCT pid=1747 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:14:59.559000 audit[1747]: CRED_REFR pid=1747 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:14:59.560467 sudo[1747]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 10:14:59.560661 sudo[1747]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:14:59.561000 audit[1747]: USER_START pid=1747 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:15:00.234266 systemd[1]: Starting docker.service... Feb 9 10:15:00.264629 env[1762]: time="2024-02-09T10:15:00.264569327Z" level=info msg="Starting up" Feb 9 10:15:00.266404 env[1762]: time="2024-02-09T10:15:00.266377690Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 10:15:00.266498 env[1762]: time="2024-02-09T10:15:00.266485154Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 10:15:00.266565 env[1762]: time="2024-02-09T10:15:00.266550434Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 10:15:00.266623 env[1762]: time="2024-02-09T10:15:00.266611070Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 10:15:00.268597 env[1762]: time="2024-02-09T10:15:00.268573766Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 10:15:00.268673 env[1762]: time="2024-02-09T10:15:00.268660498Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 10:15:00.268731 env[1762]: time="2024-02-09T10:15:00.268717172Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 10:15:00.268788 env[1762]: time="2024-02-09T10:15:00.268776287Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 10:15:00.389109 env[1762]: time="2024-02-09T10:15:00.389066043Z" level=info msg="Loading containers: start." Feb 9 10:15:00.573000 audit[1790]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.573000 audit[1790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff37b36a0 a2=0 a3=1 items=0 ppid=1762 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.573000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 10:15:00.575000 audit[1792]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.575000 audit[1792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffea4678d0 a2=0 a3=1 items=0 ppid=1762 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.575000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 10:15:00.576000 audit[1794]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.576000 audit[1794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd8b17e60 a2=0 a3=1 items=0 ppid=1762 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.576000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 10:15:00.579000 audit[1796]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.579000 audit[1796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe11349e0 a2=0 a3=1 items=0 ppid=1762 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.579000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 10:15:00.580000 audit[1798]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.580000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc7f6f660 a2=0 a3=1 items=0 ppid=1762 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.580000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 10:15:00.582000 audit[1800]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.582000 audit[1800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdea69c40 a2=0 a3=1 items=0 ppid=1762 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.582000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 10:15:00.599000 audit[1802]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.599000 audit[1802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffec0c2c50 a2=0 a3=1 items=0 ppid=1762 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.599000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 10:15:00.601000 audit[1804]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.601000 audit[1804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffdd8446b0 a2=0 a3=1 items=0 ppid=1762 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.601000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 10:15:00.603000 audit[1806]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.603000 audit[1806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff412ea00 a2=0 a3=1 items=0 ppid=1762 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.603000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:15:00.620000 audit[1810]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.620000 audit[1810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffffb1e0260 a2=0 a3=1 items=0 ppid=1762 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.620000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:15:00.621000 audit[1811]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.621000 audit[1811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff2e51660 a2=0 a3=1 items=0 ppid=1762 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.621000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:15:00.644822 kernel: Initializing XFRM netlink socket Feb 9 10:15:00.671381 env[1762]: time="2024-02-09T10:15:00.671346701Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 10:15:00.724000 audit[1819]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.724000 audit[1819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffd86286e0 a2=0 a3=1 items=0 ppid=1762 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.724000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 10:15:00.752000 audit[1822]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.752000 audit[1822]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc7416050 a2=0 a3=1 items=0 ppid=1762 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.752000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 10:15:00.755000 audit[1825]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.755000 audit[1825]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd2070390 a2=0 a3=1 items=0 ppid=1762 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 10:15:00.757000 audit[1827]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.757000 audit[1827]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffeaf41ee0 a2=0 a3=1 items=0 ppid=1762 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.757000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 10:15:00.758000 audit[1829]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.758000 audit[1829]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffc5587430 a2=0 a3=1 items=0 ppid=1762 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.758000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 10:15:00.760000 audit[1831]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.760000 audit[1831]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffefc81170 a2=0 a3=1 items=0 ppid=1762 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.760000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 10:15:00.762000 audit[1833]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.762000 audit[1833]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffdda44880 a2=0 a3=1 items=0 ppid=1762 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 10:15:00.763000 audit[1835]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.763000 audit[1835]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffc71bdbc0 a2=0 a3=1 items=0 ppid=1762 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.763000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 10:15:00.765000 audit[1837]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1837 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.765000 audit[1837]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffce9ec600 a2=0 a3=1 items=0 ppid=1762 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.765000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 10:15:00.766000 audit[1839]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.766000 audit[1839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe3f5b0f0 a2=0 a3=1 items=0 ppid=1762 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.766000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 10:15:00.768000 audit[1841]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.768000 audit[1841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe70b2400 a2=0 a3=1 items=0 ppid=1762 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.768000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 10:15:00.769733 systemd-networkd[1527]: docker0: Link UP Feb 9 10:15:00.790000 audit[1845]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.790000 audit[1845]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc75b0380 a2=0 a3=1 items=0 ppid=1762 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:15:00.791000 audit[1846]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:00.791000 audit[1846]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc8ca3470 a2=0 a3=1 items=0 ppid=1762 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:00.791000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:15:00.792315 env[1762]: time="2024-02-09T10:15:00.792290969Z" level=info msg="Loading containers: done." Feb 9 10:15:00.802232 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1475378915-merged.mount: Deactivated successfully. Feb 9 10:15:00.842418 env[1762]: time="2024-02-09T10:15:00.842325309Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 10:15:00.842756 env[1762]: time="2024-02-09T10:15:00.842738076Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 10:15:00.842964 env[1762]: time="2024-02-09T10:15:00.842949563Z" level=info msg="Daemon has completed initialization" Feb 9 10:15:00.875337 systemd[1]: Started docker.service. Feb 9 10:15:00.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:00.880721 env[1762]: time="2024-02-09T10:15:00.880644309Z" level=info msg="API listen on /run/docker.sock" Feb 9 10:15:00.898068 systemd[1]: Reloading. Feb 9 10:15:00.955249 /usr/lib/systemd/system-generators/torcx-generator[1893]: time="2024-02-09T10:15:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:15:00.955279 /usr/lib/systemd/system-generators/torcx-generator[1893]: time="2024-02-09T10:15:00Z" level=info msg="torcx already run" Feb 9 10:15:01.024394 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:15:01.024412 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:15:01.039365 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:15:01.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.105000 audit: BPF prog-id=35 op=LOAD Feb 9 10:15:01.105000 audit: BPF prog-id=24 op=UNLOAD Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit: BPF prog-id=36 op=LOAD Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.106000 audit: BPF prog-id=37 op=LOAD Feb 9 10:15:01.106000 audit: BPF prog-id=25 op=UNLOAD Feb 9 10:15:01.106000 audit: BPF prog-id=26 op=UNLOAD Feb 9 10:15:01.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.107000 audit: BPF prog-id=38 op=LOAD Feb 9 10:15:01.107000 audit: BPF prog-id=34 op=UNLOAD Feb 9 10:15:01.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.108000 audit: BPF prog-id=39 op=LOAD Feb 9 10:15:01.108000 audit: BPF prog-id=32 op=UNLOAD Feb 9 10:15:01.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.109000 audit: BPF prog-id=40 op=LOAD Feb 9 10:15:01.109000 audit: BPF prog-id=27 op=UNLOAD Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit: BPF prog-id=41 op=LOAD Feb 9 10:15:01.110000 audit: BPF prog-id=18 op=UNLOAD Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit: BPF prog-id=42 op=LOAD Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit: BPF prog-id=43 op=LOAD Feb 9 10:15:01.110000 audit: BPF prog-id=19 op=UNLOAD Feb 9 10:15:01.110000 audit: BPF prog-id=20 op=UNLOAD Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.110000 audit: BPF prog-id=44 op=LOAD Feb 9 10:15:01.110000 audit: BPF prog-id=28 op=UNLOAD Feb 9 10:15:01.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.111000 audit: BPF prog-id=45 op=LOAD Feb 9 10:15:01.111000 audit: BPF prog-id=29 op=UNLOAD Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit: BPF prog-id=46 op=LOAD Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit: BPF prog-id=47 op=LOAD Feb 9 10:15:01.112000 audit: BPF prog-id=30 op=UNLOAD Feb 9 10:15:01.112000 audit: BPF prog-id=31 op=UNLOAD Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit: BPF prog-id=48 op=LOAD Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:01.112000 audit: BPF prog-id=49 op=LOAD Feb 9 10:15:01.112000 audit: BPF prog-id=21 op=UNLOAD Feb 9 10:15:01.112000 audit: BPF prog-id=22 op=UNLOAD Feb 9 10:15:01.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:01.119261 systemd[1]: Started kubelet.service. Feb 9 10:15:01.176547 kubelet[1952]: E0209 10:15:01.176496 1952 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 10:15:01.178673 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:15:01.178795 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:15:01.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:15:05.375567 env[1381]: time="2024-02-09T10:15:05.375521415Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 10:15:06.098284 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1986974277.mount: Deactivated successfully. Feb 9 10:15:08.379184 env[1381]: time="2024-02-09T10:15:08.379139567Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:08.388078 env[1381]: time="2024-02-09T10:15:08.388037480Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:08.394210 env[1381]: time="2024-02-09T10:15:08.394173586Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:08.399473 env[1381]: time="2024-02-09T10:15:08.399440395Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:08.400251 env[1381]: time="2024-02-09T10:15:08.400222291Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88\"" Feb 9 10:15:08.408543 env[1381]: time="2024-02-09T10:15:08.408508550Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 10:15:10.808107 env[1381]: time="2024-02-09T10:15:10.808047879Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:10.816162 env[1381]: time="2024-02-09T10:15:10.816107625Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:10.822324 env[1381]: time="2024-02-09T10:15:10.822298762Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:10.827113 env[1381]: time="2024-02-09T10:15:10.827074014Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:10.827866 env[1381]: time="2024-02-09T10:15:10.827839162Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2\"" Feb 9 10:15:10.836713 env[1381]: time="2024-02-09T10:15:10.836686747Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 10:15:11.264520 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 10:15:11.270668 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 9 10:15:11.270735 kernel: audit: type=1130 audit(1707473711.263:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:11.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:11.264700 systemd[1]: Stopped kubelet.service. Feb 9 10:15:11.266188 systemd[1]: Started kubelet.service. Feb 9 10:15:11.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:11.301224 kernel: audit: type=1131 audit(1707473711.263:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:11.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:11.316551 kernel: audit: type=1130 audit(1707473711.265:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:11.354437 kubelet[1979]: E0209 10:15:11.354389 1979 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 10:15:11.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:15:11.357684 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:15:11.357820 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:15:11.377833 kernel: audit: type=1131 audit(1707473711.357:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:15:12.379260 env[1381]: time="2024-02-09T10:15:12.379218932Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:12.390898 env[1381]: time="2024-02-09T10:15:12.390867874Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:12.396239 env[1381]: time="2024-02-09T10:15:12.396214139Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:12.403337 env[1381]: time="2024-02-09T10:15:12.403299193Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:12.403946 env[1381]: time="2024-02-09T10:15:12.403915139Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a\"" Feb 9 10:15:12.412143 env[1381]: time="2024-02-09T10:15:12.412111953Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 10:15:13.708166 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2022492415.mount: Deactivated successfully. Feb 9 10:15:14.368826 env[1381]: time="2024-02-09T10:15:14.368769019Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:14.374867 env[1381]: time="2024-02-09T10:15:14.374840101Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:14.384079 env[1381]: time="2024-02-09T10:15:14.384038862Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:14.389212 env[1381]: time="2024-02-09T10:15:14.389187647Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:14.389687 env[1381]: time="2024-02-09T10:15:14.389657239Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 9 10:15:14.398630 env[1381]: time="2024-02-09T10:15:14.398602656Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 10:15:14.974218 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3222253619.mount: Deactivated successfully. Feb 9 10:15:15.003897 env[1381]: time="2024-02-09T10:15:15.003846425Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:15.011947 env[1381]: time="2024-02-09T10:15:15.011922001Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:15.016671 env[1381]: time="2024-02-09T10:15:15.016637758Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:15.024176 env[1381]: time="2024-02-09T10:15:15.024144348Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:15.024681 env[1381]: time="2024-02-09T10:15:15.024654711Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 10:15:15.032885 env[1381]: time="2024-02-09T10:15:15.032858778Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 10:15:16.040687 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2888344491.mount: Deactivated successfully. Feb 9 10:15:19.789519 env[1381]: time="2024-02-09T10:15:19.789462016Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:19.796884 env[1381]: time="2024-02-09T10:15:19.796856469Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:19.801846 env[1381]: time="2024-02-09T10:15:19.801823492Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:19.807160 env[1381]: time="2024-02-09T10:15:19.807006952Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:19.807719 env[1381]: time="2024-02-09T10:15:19.807692838Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb\"" Feb 9 10:15:19.815706 env[1381]: time="2024-02-09T10:15:19.815676023Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 10:15:20.545363 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2882580413.mount: Deactivated successfully. Feb 9 10:15:21.052154 env[1381]: time="2024-02-09T10:15:21.052111019Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:21.063171 env[1381]: time="2024-02-09T10:15:21.063134778Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:21.068426 env[1381]: time="2024-02-09T10:15:21.068402014Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:21.074948 env[1381]: time="2024-02-09T10:15:21.074913355Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:21.075564 env[1381]: time="2024-02-09T10:15:21.075535007Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0\"" Feb 9 10:15:21.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:21.427060 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 10:15:21.427277 systemd[1]: Stopped kubelet.service. Feb 9 10:15:21.434409 systemd[1]: Started kubelet.service. Feb 9 10:15:21.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:21.465278 kernel: audit: type=1130 audit(1707473721.426:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:21.465341 kernel: audit: type=1131 audit(1707473721.426:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:21.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:21.484685 kernel: audit: type=1130 audit(1707473721.431:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:21.514972 kubelet[2012]: E0209 10:15:21.514927 2012 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 10:15:21.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:15:21.517211 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:15:21.517331 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:15:21.535100 kernel: audit: type=1131 audit(1707473721.516:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:15:25.082543 systemd[1]: Stopped kubelet.service. Feb 9 10:15:25.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:25.100821 kernel: audit: type=1130 audit(1707473725.082:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:25.100924 kernel: audit: type=1131 audit(1707473725.082:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:25.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:25.133170 systemd[1]: Reloading. Feb 9 10:15:25.202942 /usr/lib/systemd/system-generators/torcx-generator[2091]: time="2024-02-09T10:15:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:15:25.202973 /usr/lib/systemd/system-generators/torcx-generator[2091]: time="2024-02-09T10:15:25Z" level=info msg="torcx already run" Feb 9 10:15:25.278782 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:15:25.278971 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:15:25.294219 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:15:25.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.405806 kernel: audit: type=1400 audit(1707473725.369:397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.405908 kernel: audit: type=1400 audit(1707473725.375:398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.423912 kernel: audit: type=1400 audit(1707473725.375:399): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.424010 kernel: audit: type=1400 audit(1707473725.375:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.386000 audit: BPF prog-id=50 op=LOAD Feb 9 10:15:25.387000 audit: BPF prog-id=35 op=UNLOAD Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit: BPF prog-id=51 op=LOAD Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit: BPF prog-id=52 op=LOAD Feb 9 10:15:25.387000 audit: BPF prog-id=36 op=UNLOAD Feb 9 10:15:25.387000 audit: BPF prog-id=37 op=UNLOAD Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.405000 audit: BPF prog-id=53 op=LOAD Feb 9 10:15:25.405000 audit: BPF prog-id=38 op=UNLOAD Feb 9 10:15:25.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.423000 audit: BPF prog-id=54 op=LOAD Feb 9 10:15:25.423000 audit: BPF prog-id=39 op=UNLOAD Feb 9 10:15:25.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit: BPF prog-id=55 op=LOAD Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit: BPF prog-id=56 op=LOAD Feb 9 10:15:25.440000 audit: BPF prog-id=41 op=UNLOAD Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit: BPF prog-id=42 op=UNLOAD Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.440000 audit: BPF prog-id=59 op=LOAD Feb 9 10:15:25.440000 audit: BPF prog-id=44 op=UNLOAD Feb 9 10:15:25.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.441000 audit: BPF prog-id=60 op=LOAD Feb 9 10:15:25.442000 audit: BPF prog-id=45 op=UNLOAD Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit: BPF prog-id=61 op=LOAD Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit: BPF prog-id=62 op=LOAD Feb 9 10:15:25.442000 audit: BPF prog-id=46 op=UNLOAD Feb 9 10:15:25.442000 audit: BPF prog-id=47 op=UNLOAD Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit: BPF prog-id=63 op=LOAD Feb 9 10:15:25.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:25.442000 audit: BPF prog-id=48 op=UNLOAD Feb 9 10:15:25.461111 systemd[1]: Started kubelet.service. Feb 9 10:15:25.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:25.515580 kubelet[2150]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:15:25.515922 kubelet[2150]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:15:25.516057 kubelet[2150]: I0209 10:15:25.516023 2150 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:15:25.517262 kubelet[2150]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:15:25.517345 kubelet[2150]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:15:26.035599 kubelet[2150]: I0209 10:15:26.035573 2150 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 10:15:26.035764 kubelet[2150]: I0209 10:15:26.035753 2150 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:15:26.036067 kubelet[2150]: I0209 10:15:26.036051 2150 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 10:15:26.042602 kubelet[2150]: W0209 10:15:26.042583 2150 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 10:15:26.043041 kubelet[2150]: I0209 10:15:26.043012 2150 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:15:26.043221 kubelet[2150]: I0209 10:15:26.043196 2150 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:15:26.043285 kubelet[2150]: I0209 10:15:26.043264 2150 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 10:15:26.043369 kubelet[2150]: I0209 10:15:26.043287 2150 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 10:15:26.043369 kubelet[2150]: I0209 10:15:26.043298 2150 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 10:15:26.043418 kubelet[2150]: I0209 10:15:26.043380 2150 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:15:26.043530 kubelet[2150]: E0209 10:15:26.043515 2150 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.13:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:26.043613 kubelet[2150]: I0209 10:15:26.043602 2150 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:15:26.045907 kubelet[2150]: I0209 10:15:26.045883 2150 kubelet.go:398] "Attempting to sync node with API server" Feb 9 10:15:26.045907 kubelet[2150]: I0209 10:15:26.045909 2150 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:15:26.046013 kubelet[2150]: I0209 10:15:26.045935 2150 kubelet.go:297] "Adding apiserver pod source" Feb 9 10:15:26.046013 kubelet[2150]: I0209 10:15:26.045945 2150 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:15:26.048161 kubelet[2150]: I0209 10:15:26.048146 2150 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:15:26.048485 kubelet[2150]: W0209 10:15:26.048470 2150 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 10:15:26.048913 kubelet[2150]: I0209 10:15:26.048895 2150 server.go:1186] "Started kubelet" Feb 9 10:15:26.049118 kubelet[2150]: W0209 10:15:26.049086 2150 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-89d14aa977&limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:26.049195 kubelet[2150]: E0209 10:15:26.049184 2150 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-89d14aa977&limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:26.049912 kubelet[2150]: I0209 10:15:26.049891 2150 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:15:26.051042 kubelet[2150]: I0209 10:15:26.051015 2150 server.go:451] "Adding debug handlers to kubelet server" Feb 9 10:15:26.053136 kubelet[2150]: W0209 10:15:26.053086 2150 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.13:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:26.053136 kubelet[2150]: E0209 10:15:26.053137 2150 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.13:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:26.051000 audit[2150]: AVC avc: denied { mac_admin } for pid=2150 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:26.051000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:15:26.051000 audit[2150]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b55290 a1=40009fcbb8 a2=4000b55260 a3=25 items=0 ppid=1 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.051000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:15:26.054023 kubelet[2150]: E0209 10:15:26.053854 2150 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:15:26.054023 kubelet[2150]: E0209 10:15:26.053878 2150 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:15:26.054023 kubelet[2150]: E0209 10:15:26.053938 2150 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-89d14aa977.17b22a4ea874b4a4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-89d14aa977", UID:"ci-3510.3.2-a-89d14aa977", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-89d14aa977"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 48875684, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 48875684, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.20.13:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.13:6443: connect: connection refused'(may retry after sleeping) Feb 9 10:15:26.054233 kubelet[2150]: I0209 10:15:26.054210 2150 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:15:26.052000 audit[2150]: AVC avc: denied { mac_admin } for pid=2150 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:26.052000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:15:26.052000 audit[2150]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b707e0 a1=40009fcbd0 a2=4000b55320 a3=25 items=0 ppid=1 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.052000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:15:26.054907 kubelet[2150]: I0209 10:15:26.054873 2150 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:15:26.055076 kubelet[2150]: I0209 10:15:26.055062 2150 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:15:26.059355 kubelet[2150]: I0209 10:15:26.059332 2150 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 10:15:26.060344 kubelet[2150]: E0209 10:15:26.060318 2150 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.200.20.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-89d14aa977?timeout=10s": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:26.059000 audit[2161]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.059000 audit[2161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc5861d40 a2=0 a3=1 items=0 ppid=2150 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:15:26.061514 kubelet[2150]: I0209 10:15:26.061497 2150 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 10:15:26.060000 audit[2162]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.060000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd52851e0 a2=0 a3=1 items=0 ppid=2150 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:15:26.062000 audit[2164]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.062000 audit[2164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff0b1ac10 a2=0 a3=1 items=0 ppid=2150 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:15:26.065047 kubelet[2150]: W0209 10:15:26.065002 2150 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:26.065114 kubelet[2150]: E0209 10:15:26.065051 2150 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:26.063000 audit[2166]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.063000 audit[2166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffdf2e290 a2=0 a3=1 items=0 ppid=2150 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.063000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:15:26.103000 audit[2172]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.103000 audit[2172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff8e6f980 a2=0 a3=1 items=0 ppid=2150 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 10:15:26.105000 audit[2173]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.105000 audit[2173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff4951870 a2=0 a3=1 items=0 ppid=2150 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 10:15:26.111931 kubelet[2150]: I0209 10:15:26.111908 2150 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:15:26.111931 kubelet[2150]: I0209 10:15:26.111928 2150 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:15:26.112040 kubelet[2150]: I0209 10:15:26.111945 2150 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:15:26.119343 kubelet[2150]: I0209 10:15:26.119323 2150 policy_none.go:49] "None policy: Start" Feb 9 10:15:26.119924 kubelet[2150]: I0209 10:15:26.119905 2150 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:15:26.119974 kubelet[2150]: I0209 10:15:26.119932 2150 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:15:26.127422 systemd[1]: Created slice kubepods.slice. Feb 9 10:15:26.131219 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 10:15:26.134229 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 10:15:26.140426 kubelet[2150]: I0209 10:15:26.140411 2150 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:15:26.139000 audit[2150]: AVC avc: denied { mac_admin } for pid=2150 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:26.139000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:15:26.139000 audit[2150]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f40c00 a1=4000f6b338 a2=4000f40bd0 a3=25 items=0 ppid=1 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.139000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:15:26.140912 kubelet[2150]: I0209 10:15:26.140898 2150 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:15:26.142105 kubelet[2150]: I0209 10:15:26.142090 2150 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:15:26.142709 kubelet[2150]: E0209 10:15:26.142694 2150 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-89d14aa977\" not found" Feb 9 10:15:26.160963 kubelet[2150]: I0209 10:15:26.160944 2150 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.161284 kubelet[2150]: E0209 10:15:26.161266 2150 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.13:6443/api/v1/nodes\": dial tcp 10.200.20.13:6443: connect: connection refused" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.176000 audit[2177]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.176000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff26645f0 a2=0 a3=1 items=0 ppid=2150 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 10:15:26.215000 audit[2180]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.215000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffe33bb350 a2=0 a3=1 items=0 ppid=2150 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 10:15:26.217000 audit[2181]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.217000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffed79be90 a2=0 a3=1 items=0 ppid=2150 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 10:15:26.218000 audit[2182]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.218000 audit[2182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2575280 a2=0 a3=1 items=0 ppid=2150 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:15:26.219000 audit[2184]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.219000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc0742ed0 a2=0 a3=1 items=0 ppid=2150 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 10:15:26.221000 audit[2186]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.221000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffe9b75770 a2=0 a3=1 items=0 ppid=2150 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:15:26.223000 audit[2188]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_rule pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.223000 audit[2188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=fffffba73e40 a2=0 a3=1 items=0 ppid=2150 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 10:15:26.225000 audit[2190]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.225000 audit[2190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffce6cbfa0 a2=0 a3=1 items=0 ppid=2150 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 10:15:26.227000 audit[2192]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.227000 audit[2192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffdd3a15a0 a2=0 a3=1 items=0 ppid=2150 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 10:15:26.228756 kubelet[2150]: I0209 10:15:26.228739 2150 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 10:15:26.228000 audit[2193]: NETFILTER_CFG table=mangle:44 family=10 entries=2 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.228000 audit[2193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdcf67c80 a2=0 a3=1 items=0 ppid=2150 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:15:26.228000 audit[2194]: NETFILTER_CFG table=mangle:45 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.228000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcfc645f0 a2=0 a3=1 items=0 ppid=2150 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:15:26.229000 audit[2195]: NETFILTER_CFG table=nat:46 family=2 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.229000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd485c30 a2=0 a3=1 items=0 ppid=2150 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:15:26.230000 audit[2196]: NETFILTER_CFG table=nat:47 family=10 entries=2 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.230000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffcb203b00 a2=0 a3=1 items=0 ppid=2150 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 10:15:26.230000 audit[2197]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:15:26.230000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffee4c36a0 a2=0 a3=1 items=0 ppid=2150 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:15:26.232000 audit[2199]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.232000 audit[2199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff38e8af0 a2=0 a3=1 items=0 ppid=2150 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 10:15:26.233000 audit[2200]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.233000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffffbed08a0 a2=0 a3=1 items=0 ppid=2150 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:15:26.235000 audit[2202]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.235000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffcab4d6b0 a2=0 a3=1 items=0 ppid=2150 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 10:15:26.235000 audit[2203]: NETFILTER_CFG table=nat:52 family=10 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.235000 audit[2203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffec5a0b30 a2=0 a3=1 items=0 ppid=2150 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 10:15:26.236000 audit[2204]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.236000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeaff2c90 a2=0 a3=1 items=0 ppid=2150 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:15:26.238000 audit[2206]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.238000 audit[2206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcb547750 a2=0 a3=1 items=0 ppid=2150 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 10:15:26.240000 audit[2208]: NETFILTER_CFG table=nat:55 family=10 entries=2 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.240000 audit[2208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffca03a350 a2=0 a3=1 items=0 ppid=2150 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.240000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:15:26.242000 audit[2210]: NETFILTER_CFG table=nat:56 family=10 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.242000 audit[2210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffedd98db0 a2=0 a3=1 items=0 ppid=2150 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 10:15:26.243000 audit[2212]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.243000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=fffffee95f00 a2=0 a3=1 items=0 ppid=2150 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 10:15:26.261139 kubelet[2150]: E0209 10:15:26.261107 2150 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.200.20.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-89d14aa977?timeout=10s": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:26.289000 audit[2214]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.289000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=ffffc2ef1900 a2=0 a3=1 items=0 ppid=2150 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.290832 kubelet[2150]: I0209 10:15:26.290815 2150 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 10:15:26.290944 kubelet[2150]: I0209 10:15:26.290934 2150 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 10:15:26.291125 kubelet[2150]: I0209 10:15:26.291115 2150 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 10:15:26.291237 kubelet[2150]: E0209 10:15:26.291228 2150 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 10:15:26.292158 kubelet[2150]: W0209 10:15:26.292108 2150 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:26.292270 kubelet[2150]: E0209 10:15:26.292260 2150 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:26.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 10:15:26.292000 audit[2215]: NETFILTER_CFG table=mangle:59 family=10 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.292000 audit[2215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffff18df80 a2=0 a3=1 items=0 ppid=2150 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:15:26.294000 audit[2216]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.294000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd919f500 a2=0 a3=1 items=0 ppid=2150 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:15:26.295000 audit[2217]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:15:26.295000 audit[2217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeb4378d0 a2=0 a3=1 items=0 ppid=2150 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:26.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:15:26.363483 kubelet[2150]: I0209 10:15:26.363463 2150 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.364005 kubelet[2150]: E0209 10:15:26.363992 2150 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.13:6443/api/v1/nodes\": dial tcp 10.200.20.13:6443: connect: connection refused" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.392151 kubelet[2150]: I0209 10:15:26.392129 2150 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:15:26.393446 kubelet[2150]: I0209 10:15:26.393429 2150 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:15:26.394748 kubelet[2150]: I0209 10:15:26.394731 2150 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:15:26.395830 kubelet[2150]: I0209 10:15:26.395651 2150 status_manager.go:698] "Failed to get status for pod" podUID=edfa3640357251eab6b489224f2366e8 pod="kube-system/kube-apiserver-ci-3510.3.2-a-89d14aa977" err="Get \"https://10.200.20.13:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-a-89d14aa977\": dial tcp 10.200.20.13:6443: connect: connection refused" Feb 9 10:15:26.397853 kubelet[2150]: I0209 10:15:26.397525 2150 status_manager.go:698] "Failed to get status for pod" podUID=cf677be2cb6b8bd1ba2070159f4b4d87 pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" err="Get \"https://10.200.20.13:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-a-89d14aa977\": dial tcp 10.200.20.13:6443: connect: connection refused" Feb 9 10:15:26.398911 systemd[1]: Created slice kubepods-burstable-podedfa3640357251eab6b489224f2366e8.slice. Feb 9 10:15:26.401197 kubelet[2150]: I0209 10:15:26.401181 2150 status_manager.go:698] "Failed to get status for pod" podUID=88dfc74926a182c0e6606c906bab0840 pod="kube-system/kube-scheduler-ci-3510.3.2-a-89d14aa977" err="Get \"https://10.200.20.13:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-a-89d14aa977\": dial tcp 10.200.20.13:6443: connect: connection refused" Feb 9 10:15:26.411618 systemd[1]: Created slice kubepods-burstable-podcf677be2cb6b8bd1ba2070159f4b4d87.slice. Feb 9 10:15:26.415440 systemd[1]: Created slice kubepods-burstable-pod88dfc74926a182c0e6606c906bab0840.slice. Feb 9 10:15:26.463326 kubelet[2150]: I0209 10:15:26.463300 2150 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/cf677be2cb6b8bd1ba2070159f4b4d87-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-89d14aa977\" (UID: \"cf677be2cb6b8bd1ba2070159f4b4d87\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.463495 kubelet[2150]: I0209 10:15:26.463484 2150 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/cf677be2cb6b8bd1ba2070159f4b4d87-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-89d14aa977\" (UID: \"cf677be2cb6b8bd1ba2070159f4b4d87\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.463604 kubelet[2150]: I0209 10:15:26.463593 2150 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/edfa3640357251eab6b489224f2366e8-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-89d14aa977\" (UID: \"edfa3640357251eab6b489224f2366e8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.463708 kubelet[2150]: I0209 10:15:26.463698 2150 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/edfa3640357251eab6b489224f2366e8-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-89d14aa977\" (UID: \"edfa3640357251eab6b489224f2366e8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.463814 kubelet[2150]: I0209 10:15:26.463793 2150 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/cf677be2cb6b8bd1ba2070159f4b4d87-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-89d14aa977\" (UID: \"cf677be2cb6b8bd1ba2070159f4b4d87\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.463902 kubelet[2150]: I0209 10:15:26.463894 2150 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/cf677be2cb6b8bd1ba2070159f4b4d87-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-89d14aa977\" (UID: \"cf677be2cb6b8bd1ba2070159f4b4d87\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.464012 kubelet[2150]: I0209 10:15:26.464002 2150 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/cf677be2cb6b8bd1ba2070159f4b4d87-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-89d14aa977\" (UID: \"cf677be2cb6b8bd1ba2070159f4b4d87\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.464110 kubelet[2150]: I0209 10:15:26.464100 2150 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/88dfc74926a182c0e6606c906bab0840-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-89d14aa977\" (UID: \"88dfc74926a182c0e6606c906bab0840\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.464204 kubelet[2150]: I0209 10:15:26.464195 2150 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/edfa3640357251eab6b489224f2366e8-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-89d14aa977\" (UID: \"edfa3640357251eab6b489224f2366e8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.663279 kubelet[2150]: E0209 10:15:26.662254 2150 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.200.20.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-89d14aa977?timeout=10s": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:26.711194 env[1381]: time="2024-02-09T10:15:26.711155373Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-89d14aa977,Uid:edfa3640357251eab6b489224f2366e8,Namespace:kube-system,Attempt:0,}" Feb 9 10:15:26.715220 env[1381]: time="2024-02-09T10:15:26.715113724Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-89d14aa977,Uid:cf677be2cb6b8bd1ba2070159f4b4d87,Namespace:kube-system,Attempt:0,}" Feb 9 10:15:26.717962 env[1381]: time="2024-02-09T10:15:26.717929812Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-89d14aa977,Uid:88dfc74926a182c0e6606c906bab0840,Namespace:kube-system,Attempt:0,}" Feb 9 10:15:26.766006 kubelet[2150]: I0209 10:15:26.765980 2150 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:26.766287 kubelet[2150]: E0209 10:15:26.766264 2150 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.13:6443/api/v1/nodes\": dial tcp 10.200.20.13:6443: connect: connection refused" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:27.243500 kubelet[2150]: W0209 10:15:27.243443 2150 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:27.243500 kubelet[2150]: E0209 10:15:27.243479 2150 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:27.342263 kubelet[2150]: W0209 10:15:27.342203 2150 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-89d14aa977&limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:27.342263 kubelet[2150]: E0209 10:15:27.342261 2150 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-89d14aa977&limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:27.413172 kubelet[2150]: W0209 10:15:27.413135 2150 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.13:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:27.413172 kubelet[2150]: E0209 10:15:27.413175 2150 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.13:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:27.435556 kubelet[2150]: W0209 10:15:27.435532 2150 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:27.435606 kubelet[2150]: E0209 10:15:27.435561 2150 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:27.464069 kubelet[2150]: E0209 10:15:27.464045 2150 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.200.20.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-89d14aa977?timeout=10s": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:27.567919 kubelet[2150]: I0209 10:15:27.567890 2150 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:27.568244 kubelet[2150]: E0209 10:15:27.568227 2150 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.13:6443/api/v1/nodes\": dial tcp 10.200.20.13:6443: connect: connection refused" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:27.578710 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1973800982.mount: Deactivated successfully. Feb 9 10:15:27.605997 env[1381]: time="2024-02-09T10:15:27.605954422Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:27.623346 env[1381]: time="2024-02-09T10:15:27.623303999Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:27.632849 env[1381]: time="2024-02-09T10:15:27.632794987Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:27.637911 env[1381]: time="2024-02-09T10:15:27.637878841Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:27.644246 env[1381]: time="2024-02-09T10:15:27.644216702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:27.654155 env[1381]: time="2024-02-09T10:15:27.654130015Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:27.657461 env[1381]: time="2024-02-09T10:15:27.657436346Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:27.659932 env[1381]: time="2024-02-09T10:15:27.659909112Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:27.663237 env[1381]: time="2024-02-09T10:15:27.663210722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:27.671068 env[1381]: time="2024-02-09T10:15:27.671041863Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:27.675517 env[1381]: time="2024-02-09T10:15:27.675480847Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:27.682163 env[1381]: time="2024-02-09T10:15:27.682135442Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:15:27.752294 env[1381]: time="2024-02-09T10:15:27.752226472Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:15:27.752591 env[1381]: time="2024-02-09T10:15:27.752296653Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:15:27.752591 env[1381]: time="2024-02-09T10:15:27.752324541Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:15:27.752790 env[1381]: time="2024-02-09T10:15:27.752740823Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a215e1852d0cc7e5814fd551ad881008002c3f1e4c7764e81d203145f0f378f4 pid=2226 runtime=io.containerd.runc.v2 Feb 9 10:15:27.766515 systemd[1]: Started cri-containerd-a215e1852d0cc7e5814fd551ad881008002c3f1e4c7764e81d203145f0f378f4.scope. Feb 9 10:15:27.782982 env[1381]: time="2024-02-09T10:15:27.782897523Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:15:27.782982 env[1381]: time="2024-02-09T10:15:27.782947737Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:15:27.783138 env[1381]: time="2024-02-09T10:15:27.782958781Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:15:27.783427 env[1381]: time="2024-02-09T10:15:27.783391588Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c14d38a6676a51d128b239533fd9cb2d224c87e3c44a8c7b1ab127d661bef73d pid=2256 runtime=io.containerd.runc.v2 Feb 9 10:15:27.789392 kernel: kauditd_printk_skb: 335 callbacks suppressed Feb 9 10:15:27.789484 kernel: audit: type=1400 audit(1707473727.783:578): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.807511 env[1381]: time="2024-02-09T10:15:27.807437132Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:15:27.807627 env[1381]: time="2024-02-09T10:15:27.807515835Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:15:27.807627 env[1381]: time="2024-02-09T10:15:27.807552525Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:15:27.807734 env[1381]: time="2024-02-09T10:15:27.807698288Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c89b950e320dd56454d447dd28a598d51dcffe59e1039beee2b47fd217adaf7f pid=2271 runtime=io.containerd.runc.v2 Feb 9 10:15:27.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.827606 kernel: audit: type=1400 audit(1707473727.783:579): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.831684 systemd[1]: Started cri-containerd-c14d38a6676a51d128b239533fd9cb2d224c87e3c44a8c7b1ab127d661bef73d.scope. Feb 9 10:15:27.838223 systemd[1]: Started cri-containerd-c89b950e320dd56454d447dd28a598d51dcffe59e1039beee2b47fd217adaf7f.scope. Feb 9 10:15:27.851030 kernel: audit: type=1400 audit(1707473727.783:580): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.851141 kernel: audit: type=1400 audit(1707473727.783:581): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.871886 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 10:15:27.871988 kernel: audit: type=1400 audit(1707473727.783:582): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.894345 kernel: audit: audit_lost=29 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 10:15:27.900215 kernel: audit: backlog limit exceeded Feb 9 10:15:27.900314 kernel: audit: type=1400 audit(1707473727.783:583): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.915814 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 10:15:27.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit: BPF prog-id=65 op=LOAD Feb 9 10:15:27.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit[2237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2226 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:27.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132313565313835326430636337653538313466643535316164383831 Feb 9 10:15:27.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit[2237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2226 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:27.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132313565313835326430636337653538313466643535316164383831 Feb 9 10:15:27.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.788000 audit: BPF prog-id=66 op=LOAD Feb 9 10:15:27.788000 audit[2237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2226 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:27.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132313565313835326430636337653538313466643535316164383831 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit: BPF prog-id=67 op=LOAD Feb 9 10:15:27.805000 audit[2237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2226 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:27.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132313565313835326430636337653538313466643535316164383831 Feb 9 10:15:27.805000 audit: BPF prog-id=67 op=UNLOAD Feb 9 10:15:27.805000 audit: BPF prog-id=66 op=UNLOAD Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.805000 audit: BPF prog-id=68 op=LOAD Feb 9 10:15:27.805000 audit[2237]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2226 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:27.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132313565313835326430636337653538313466643535316164383831 Feb 9 10:15:27.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.921000 audit: BPF prog-id=73 op=LOAD Feb 9 10:15:27.931526 env[1381]: time="2024-02-09T10:15:27.931473610Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-89d14aa977,Uid:cf677be2cb6b8bd1ba2070159f4b4d87,Namespace:kube-system,Attempt:0,} returns sandbox id \"a215e1852d0cc7e5814fd551ad881008002c3f1e4c7764e81d203145f0f378f4\"" Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2256 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:27.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331346433386136363736613531643132386232333935333366643963 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2256 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:27.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331346433386136363736613531643132386232333935333366643963 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit: BPF prog-id=74 op=LOAD Feb 9 10:15:27.931000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2256 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:27.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331346433386136363736613531643132386232333935333366643963 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit: BPF prog-id=75 op=LOAD Feb 9 10:15:27.931000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2256 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:27.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331346433386136363736613531643132386232333935333366643963 Feb 9 10:15:27.931000 audit: BPF prog-id=75 op=UNLOAD Feb 9 10:15:27.931000 audit: BPF prog-id=74 op=UNLOAD Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:27.931000 audit: BPF prog-id=76 op=LOAD Feb 9 10:15:27.931000 audit[2285]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2256 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:27.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331346433386136363736613531643132386232333935333366643963 Feb 9 10:15:27.936154 env[1381]: time="2024-02-09T10:15:27.936121295Z" level=info msg="CreateContainer within sandbox \"a215e1852d0cc7e5814fd551ad881008002c3f1e4c7764e81d203145f0f378f4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 10:15:27.951839 env[1381]: time="2024-02-09T10:15:27.951785297Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-89d14aa977,Uid:edfa3640357251eab6b489224f2366e8,Namespace:kube-system,Attempt:0,} returns sandbox id \"c89b950e320dd56454d447dd28a598d51dcffe59e1039beee2b47fd217adaf7f\"" Feb 9 10:15:27.958405 env[1381]: time="2024-02-09T10:15:27.958363549Z" level=info msg="CreateContainer within sandbox \"c89b950e320dd56454d447dd28a598d51dcffe59e1039beee2b47fd217adaf7f\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 10:15:27.960115 env[1381]: time="2024-02-09T10:15:27.960084054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-89d14aa977,Uid:88dfc74926a182c0e6606c906bab0840,Namespace:kube-system,Attempt:0,} returns sandbox id \"c14d38a6676a51d128b239533fd9cb2d224c87e3c44a8c7b1ab127d661bef73d\"" Feb 9 10:15:27.962414 env[1381]: time="2024-02-09T10:15:27.962369046Z" level=info msg="CreateContainer within sandbox \"c14d38a6676a51d128b239533fd9cb2d224c87e3c44a8c7b1ab127d661bef73d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 10:15:28.003169 env[1381]: time="2024-02-09T10:15:28.003100755Z" level=info msg="CreateContainer within sandbox \"a215e1852d0cc7e5814fd551ad881008002c3f1e4c7764e81d203145f0f378f4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"26a8987e77702f82b48747db1f8815169319b3b795fbe1019847da2b021fa0dd\"" Feb 9 10:15:28.003747 env[1381]: time="2024-02-09T10:15:28.003724334Z" level=info msg="StartContainer for \"26a8987e77702f82b48747db1f8815169319b3b795fbe1019847da2b021fa0dd\"" Feb 9 10:15:28.017286 systemd[1]: Started cri-containerd-26a8987e77702f82b48747db1f8815169319b3b795fbe1019847da2b021fa0dd.scope. Feb 9 10:15:28.034763 env[1381]: time="2024-02-09T10:15:28.034700936Z" level=info msg="CreateContainer within sandbox \"c89b950e320dd56454d447dd28a598d51dcffe59e1039beee2b47fd217adaf7f\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"0d007544e6aa9fde6a3ea6d4edb24198ff020b981db8b75c8c735e1444a27a9a\"" Feb 9 10:15:28.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.036000 audit: BPF prog-id=77 op=LOAD Feb 9 10:15:28.037743 env[1381]: time="2024-02-09T10:15:28.037708478Z" level=info msg="StartContainer for \"0d007544e6aa9fde6a3ea6d4edb24198ff020b981db8b75c8c735e1444a27a9a\"" Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2226 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613839383765373737303266383262343837343764623166383831 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2226 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613839383765373737303266383262343837343764623166383831 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit: BPF prog-id=78 op=LOAD Feb 9 10:15:28.038000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2226 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613839383765373737303266383262343837343764623166383831 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit: BPF prog-id=79 op=LOAD Feb 9 10:15:28.038000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2226 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613839383765373737303266383262343837343764623166383831 Feb 9 10:15:28.038000 audit: BPF prog-id=79 op=UNLOAD Feb 9 10:15:28.038000 audit: BPF prog-id=78 op=UNLOAD Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.038000 audit: BPF prog-id=80 op=LOAD Feb 9 10:15:28.038000 audit[2355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2226 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236613839383765373737303266383262343837343764623166383831 Feb 9 10:15:28.052337 env[1381]: time="2024-02-09T10:15:28.052167384Z" level=info msg="CreateContainer within sandbox \"c14d38a6676a51d128b239533fd9cb2d224c87e3c44a8c7b1ab127d661bef73d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"afcb312c72f6ae6cb0a2c58daeab5283b72fef0f5cb69fee3070bcd6d6d6f795\"" Feb 9 10:15:28.052809 env[1381]: time="2024-02-09T10:15:28.052768156Z" level=info msg="StartContainer for \"afcb312c72f6ae6cb0a2c58daeab5283b72fef0f5cb69fee3070bcd6d6d6f795\"" Feb 9 10:15:28.063220 systemd[1]: Started cri-containerd-0d007544e6aa9fde6a3ea6d4edb24198ff020b981db8b75c8c735e1444a27a9a.scope. Feb 9 10:15:28.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.074000 audit: BPF prog-id=81 op=LOAD Feb 9 10:15:28.074000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.074000 audit[2377]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2271 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064303037353434653661613966646536613365613664346564623234 Feb 9 10:15:28.074000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.074000 audit[2377]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2271 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064303037353434653661613966646536613365613664346564623234 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit: BPF prog-id=82 op=LOAD Feb 9 10:15:28.075000 audit[2377]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2271 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064303037353434653661613966646536613365613664346564623234 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit: BPF prog-id=83 op=LOAD Feb 9 10:15:28.075000 audit[2377]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2271 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064303037353434653661613966646536613365613664346564623234 Feb 9 10:15:28.075000 audit: BPF prog-id=83 op=UNLOAD Feb 9 10:15:28.075000 audit: BPF prog-id=82 op=UNLOAD Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.075000 audit: BPF prog-id=84 op=LOAD Feb 9 10:15:28.075000 audit[2377]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2271 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064303037353434653661613966646536613365613664346564623234 Feb 9 10:15:28.086846 systemd[1]: Started cri-containerd-afcb312c72f6ae6cb0a2c58daeab5283b72fef0f5cb69fee3070bcd6d6d6f795.scope. Feb 9 10:15:28.096521 env[1381]: time="2024-02-09T10:15:28.096466006Z" level=info msg="StartContainer for \"26a8987e77702f82b48747db1f8815169319b3b795fbe1019847da2b021fa0dd\" returns successfully" Feb 9 10:15:28.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.112000 audit: BPF prog-id=85 op=LOAD Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2256 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636233313263373266366165366362306132633538646165616235 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2256 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636233313263373266366165366362306132633538646165616235 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit: BPF prog-id=86 op=LOAD Feb 9 10:15:28.113000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2256 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636233313263373266366165366362306132633538646165616235 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit: BPF prog-id=87 op=LOAD Feb 9 10:15:28.113000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2256 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636233313263373266366165366362306132633538646165616235 Feb 9 10:15:28.113000 audit: BPF prog-id=87 op=UNLOAD Feb 9 10:15:28.113000 audit: BPF prog-id=86 op=UNLOAD Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:28.113000 audit: BPF prog-id=88 op=LOAD Feb 9 10:15:28.113000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2256 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:28.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636233313263373266366165366362306132633538646165616235 Feb 9 10:15:28.121249 env[1381]: time="2024-02-09T10:15:28.121204259Z" level=info msg="StartContainer for \"0d007544e6aa9fde6a3ea6d4edb24198ff020b981db8b75c8c735e1444a27a9a\" returns successfully" Feb 9 10:15:28.148109 env[1381]: time="2024-02-09T10:15:28.148050677Z" level=info msg="StartContainer for \"afcb312c72f6ae6cb0a2c58daeab5283b72fef0f5cb69fee3070bcd6d6d6f795\" returns successfully" Feb 9 10:15:28.154405 kubelet[2150]: E0209 10:15:28.154358 2150 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.13:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.13:6443: connect: connection refused Feb 9 10:15:29.169848 kubelet[2150]: I0209 10:15:29.169824 2150 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:30.554000 audit[2400]: AVC avc: denied { watch } for pid=2400 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c758,c883 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:30.554000 audit[2400]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=400aa04cc0 a2=fc6 a3=0 items=0 ppid=2271 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c758,c883 key=(null) Feb 9 10:15:30.554000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:15:30.554000 audit[2400]: AVC avc: denied { watch } for pid=2400 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c758,c883 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:30.554000 audit[2400]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=4002a41ba0 a2=fc6 a3=0 items=0 ppid=2271 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c758,c883 key=(null) Feb 9 10:15:30.554000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:15:30.555000 audit[2400]: AVC avc: denied { watch } for pid=2400 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c758,c883 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:30.555000 audit[2400]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=400aa04de0 a2=fc6 a3=0 items=0 ppid=2271 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c758,c883 key=(null) Feb 9 10:15:30.555000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:15:30.571000 audit[2400]: AVC avc: denied { watch } for pid=2400 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521267 scontext=system_u:system_r:svirt_lxc_net_t:s0:c758,c883 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:30.571000 audit[2400]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=400aa05890 a2=fc6 a3=0 items=0 ppid=2271 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c758,c883 key=(null) Feb 9 10:15:30.571000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:15:30.669000 audit[2400]: AVC avc: denied { watch } for pid=2400 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c758,c883 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:30.669000 audit[2400]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4001aa4ec0 a2=fc6 a3=0 items=0 ppid=2271 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c758,c883 key=(null) Feb 9 10:15:30.669000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:15:30.669000 audit[2400]: AVC avc: denied { watch } for pid=2400 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c758,c883 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:30.669000 audit[2400]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=400ba321e0 a2=fc6 a3=0 items=0 ppid=2271 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c758,c883 key=(null) Feb 9 10:15:30.669000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:15:30.912223 kubelet[2150]: E0209 10:15:30.912134 2150 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-89d14aa977\" not found" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:30.912757 kubelet[2150]: I0209 10:15:30.912710 2150 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:31.024000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:31.024000 audit[2365]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c00090 a2=fc6 a3=0 items=0 ppid=2226 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c516 key=(null) Feb 9 10:15:31.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:15:31.025000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:31.025000 audit[2365]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c1a040 a2=fc6 a3=0 items=0 ppid=2226 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c516 key=(null) Feb 9 10:15:31.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:15:31.046367 kubelet[2150]: E0209 10:15:31.046284 2150 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-89d14aa977.17b22a4ea874b4a4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-89d14aa977", UID:"ci-3510.3.2-a-89d14aa977", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-89d14aa977"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 48875684, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 48875684, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:15:31.054727 kubelet[2150]: I0209 10:15:31.054700 2150 apiserver.go:52] "Watching apiserver" Feb 9 10:15:31.062152 kubelet[2150]: I0209 10:15:31.062131 2150 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 10:15:31.091481 kubelet[2150]: I0209 10:15:31.091456 2150 reconciler.go:41] "Reconciler: start to sync state" Feb 9 10:15:31.192531 kubelet[2150]: E0209 10:15:31.192362 2150 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-89d14aa977.17b22a4ea8c0e47b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-89d14aa977", UID:"ci-3510.3.2-a-89d14aa977", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-89d14aa977"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 53868667, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 53868667, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:15:31.286472 kubelet[2150]: E0209 10:15:31.286366 2150 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-89d14aa977.17b22a4eac2edca4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-89d14aa977", UID:"ci-3510.3.2-a-89d14aa977", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-89d14aa977 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-89d14aa977"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 111407268, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 111407268, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:15:31.379856 kubelet[2150]: E0209 10:15:31.379740 2150 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-89d14aa977.17b22a4eac2ef236", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-89d14aa977", UID:"ci-3510.3.2-a-89d14aa977", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.2-a-89d14aa977 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-89d14aa977"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 111412790, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 111412790, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:15:31.449758 kubelet[2150]: E0209 10:15:31.449591 2150 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-89d14aa977.17b22a4eac2efdef", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-89d14aa977", UID:"ci-3510.3.2-a-89d14aa977", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.2-a-89d14aa977 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-89d14aa977"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 111415791, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 111415791, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:15:31.539108 kubelet[2150]: E0209 10:15:31.539057 2150 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-89d14aa977\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:31.540095 kubelet[2150]: E0209 10:15:31.539994 2150 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-89d14aa977.17b22a4eae0c0ebb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-89d14aa977", UID:"ci-3510.3.2-a-89d14aa977", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-89d14aa977"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 142680763, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 142680763, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:15:31.595929 kubelet[2150]: E0209 10:15:31.595831 2150 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-89d14aa977.17b22a4eac2edca4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-89d14aa977", UID:"ci-3510.3.2-a-89d14aa977", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-89d14aa977 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-89d14aa977"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 111407268, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 160902328, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:15:31.652554 kubelet[2150]: E0209 10:15:31.652440 2150 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-89d14aa977.17b22a4eac2ef236", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-89d14aa977", UID:"ci-3510.3.2-a-89d14aa977", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.2-a-89d14aa977 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-89d14aa977"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 111412790, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 160913251, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:15:31.708927 kubelet[2150]: E0209 10:15:31.708749 2150 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-89d14aa977.17b22a4eac2efdef", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-89d14aa977", UID:"ci-3510.3.2-a-89d14aa977", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.2-a-89d14aa977 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-89d14aa977"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 111415791, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 160917292, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:15:31.765838 kubelet[2150]: E0209 10:15:31.765686 2150 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-89d14aa977.17b22a4eac2edca4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-89d14aa977", UID:"ci-3510.3.2-a-89d14aa977", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-89d14aa977 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-89d14aa977"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 111407268, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 15, 26, 363430136, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 10:15:33.651085 systemd[1]: Reloading. Feb 9 10:15:33.723025 /usr/lib/systemd/system-generators/torcx-generator[2476]: time="2024-02-09T10:15:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:15:33.723569 /usr/lib/systemd/system-generators/torcx-generator[2476]: time="2024-02-09T10:15:33Z" level=info msg="torcx already run" Feb 9 10:15:33.796577 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:15:33.796737 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:15:33.814164 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:15:33.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.901273 kernel: kauditd_printk_skb: 422 callbacks suppressed Feb 9 10:15:33.901329 kernel: audit: type=1400 audit(1707473733.895:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.938917 kernel: audit: type=1400 audit(1707473733.895:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.939039 kernel: audit: type=1400 audit(1707473733.895:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.978319 kernel: audit: type=1400 audit(1707473733.895:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.978403 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 10:15:33.978427 kernel: audit: type=1400 audit(1707473733.895:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.995356 kernel: audit: audit_lost=67 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 10:15:33.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.018458 kernel: audit: type=1400 audit(1707473733.895:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.018579 kernel: audit: backlog limit exceeded Feb 9 10:15:33.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.039562 kernel: audit: type=1400 audit(1707473733.895:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.901000 audit: BPF prog-id=89 op=LOAD Feb 9 10:15:33.901000 audit: BPF prog-id=77 op=UNLOAD Feb 9 10:15:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.918000 audit: BPF prog-id=90 op=LOAD Feb 9 10:15:33.918000 audit: BPF prog-id=69 op=UNLOAD Feb 9 10:15:33.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.919000 audit: BPF prog-id=91 op=LOAD Feb 9 10:15:33.919000 audit: BPF prog-id=65 op=UNLOAD Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit: BPF prog-id=92 op=LOAD Feb 9 10:15:33.920000 audit: BPF prog-id=50 op=UNLOAD Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.938000 audit: BPF prog-id=93 op=LOAD Feb 9 10:15:33.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:33.955000 audit: BPF prog-id=94 op=LOAD Feb 9 10:15:33.955000 audit: BPF prog-id=51 op=UNLOAD Feb 9 10:15:34.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit: BPF prog-id=98 op=LOAD Feb 9 10:15:34.042000 audit: BPF prog-id=55 op=UNLOAD Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit: BPF prog-id=99 op=LOAD Feb 9 10:15:34.043000 audit: BPF prog-id=56 op=UNLOAD Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit: BPF prog-id=100 op=LOAD Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit: BPF prog-id=101 op=LOAD Feb 9 10:15:34.043000 audit: BPF prog-id=57 op=UNLOAD Feb 9 10:15:34.043000 audit: BPF prog-id=58 op=UNLOAD Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.043000 audit: BPF prog-id=102 op=LOAD Feb 9 10:15:34.043000 audit: BPF prog-id=59 op=UNLOAD Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit: BPF prog-id=103 op=LOAD Feb 9 10:15:34.044000 audit: BPF prog-id=60 op=UNLOAD Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit: BPF prog-id=104 op=LOAD Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit: BPF prog-id=105 op=LOAD Feb 9 10:15:34.044000 audit: BPF prog-id=61 op=UNLOAD Feb 9 10:15:34.044000 audit: BPF prog-id=62 op=UNLOAD Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit: BPF prog-id=106 op=LOAD Feb 9 10:15:34.045000 audit: BPF prog-id=81 op=UNLOAD Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit: BPF prog-id=107 op=LOAD Feb 9 10:15:34.045000 audit: BPF prog-id=73 op=UNLOAD Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.046000 audit: BPF prog-id=108 op=LOAD Feb 9 10:15:34.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.046000 audit: BPF prog-id=109 op=LOAD Feb 9 10:15:34.046000 audit: BPF prog-id=63 op=UNLOAD Feb 9 10:15:34.046000 audit: BPF prog-id=64 op=UNLOAD Feb 9 10:15:34.061406 kubelet[2150]: I0209 10:15:34.060991 2150 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:15:34.061224 systemd[1]: Stopping kubelet.service... Feb 9 10:15:34.079153 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 10:15:34.079464 systemd[1]: Stopped kubelet.service. Feb 9 10:15:34.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:34.082068 systemd[1]: Started kubelet.service. Feb 9 10:15:34.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:34.153016 kubelet[2535]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:15:34.153306 kubelet[2535]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:15:34.153434 kubelet[2535]: I0209 10:15:34.153407 2535 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:15:34.154730 kubelet[2535]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:15:34.154895 kubelet[2535]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:15:34.158003 kubelet[2535]: I0209 10:15:34.157977 2535 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 10:15:34.158003 kubelet[2535]: I0209 10:15:34.158001 2535 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:15:34.158235 kubelet[2535]: I0209 10:15:34.158214 2535 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 10:15:34.159578 kubelet[2535]: I0209 10:15:34.159554 2535 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 10:15:34.160319 kubelet[2535]: I0209 10:15:34.160306 2535 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:15:34.162491 kubelet[2535]: W0209 10:15:34.162472 2535 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 10:15:34.163145 kubelet[2535]: I0209 10:15:34.163110 2535 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:15:34.163353 kubelet[2535]: I0209 10:15:34.163339 2535 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:15:34.163422 kubelet[2535]: I0209 10:15:34.163407 2535 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 10:15:34.163492 kubelet[2535]: I0209 10:15:34.163433 2535 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 10:15:34.163492 kubelet[2535]: I0209 10:15:34.163445 2535 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 10:15:34.163492 kubelet[2535]: I0209 10:15:34.163471 2535 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:15:34.167430 kubelet[2535]: I0209 10:15:34.167414 2535 kubelet.go:398] "Attempting to sync node with API server" Feb 9 10:15:34.168007 kubelet[2535]: I0209 10:15:34.167993 2535 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:15:34.168109 kubelet[2535]: I0209 10:15:34.168100 2535 kubelet.go:297] "Adding apiserver pod source" Feb 9 10:15:34.168175 kubelet[2535]: I0209 10:15:34.168166 2535 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:15:34.186486 kubelet[2535]: I0209 10:15:34.181304 2535 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:15:34.186486 kubelet[2535]: I0209 10:15:34.184721 2535 server.go:1186] "Started kubelet" Feb 9 10:15:34.190000 audit[2535]: AVC avc: denied { mac_admin } for pid=2535 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.190000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:15:34.190000 audit[2535]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400099db60 a1=40008e9878 a2=400099db30 a3=25 items=0 ppid=1 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:34.190000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:15:34.190000 audit[2535]: AVC avc: denied { mac_admin } for pid=2535 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.190000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:15:34.190000 audit[2535]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d178c0 a1=40008e9890 a2=400099dbf0 a3=25 items=0 ppid=1 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:34.190000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:15:34.193720 kubelet[2535]: I0209 10:15:34.191146 2535 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:15:34.193720 kubelet[2535]: I0209 10:15:34.191193 2535 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:15:34.193720 kubelet[2535]: I0209 10:15:34.191215 2535 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:15:34.195668 kubelet[2535]: I0209 10:15:34.193910 2535 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:15:34.195668 kubelet[2535]: I0209 10:15:34.194764 2535 server.go:451] "Adding debug handlers to kubelet server" Feb 9 10:15:34.196655 kubelet[2535]: I0209 10:15:34.196632 2535 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 10:15:34.198018 kubelet[2535]: I0209 10:15:34.197681 2535 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 10:15:34.203515 kubelet[2535]: E0209 10:15:34.203492 2535 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:15:34.203515 kubelet[2535]: E0209 10:15:34.203517 2535 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:15:34.248816 kubelet[2535]: I0209 10:15:34.248779 2535 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 10:15:34.265314 kubelet[2535]: I0209 10:15:34.265291 2535 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 10:15:34.265460 kubelet[2535]: I0209 10:15:34.265450 2535 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 10:15:34.265521 kubelet[2535]: I0209 10:15:34.265513 2535 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 10:15:34.265613 kubelet[2535]: E0209 10:15:34.265605 2535 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 10:15:34.288285 kubelet[2535]: I0209 10:15:34.288264 2535 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:15:34.288412 kubelet[2535]: I0209 10:15:34.288402 2535 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:15:34.288551 kubelet[2535]: I0209 10:15:34.288541 2535 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:15:34.288753 kubelet[2535]: I0209 10:15:34.288743 2535 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 10:15:34.288836 kubelet[2535]: I0209 10:15:34.288827 2535 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 10:15:34.288899 kubelet[2535]: I0209 10:15:34.288891 2535 policy_none.go:49] "None policy: Start" Feb 9 10:15:34.289396 kubelet[2535]: I0209 10:15:34.289383 2535 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:15:34.289492 kubelet[2535]: I0209 10:15:34.289483 2535 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:15:34.289651 kubelet[2535]: I0209 10:15:34.289640 2535 state_mem.go:75] "Updated machine memory state" Feb 9 10:15:34.292843 kubelet[2535]: I0209 10:15:34.292828 2535 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:15:34.292000 audit[2535]: AVC avc: denied { mac_admin } for pid=2535 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:34.292000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:15:34.292000 audit[2535]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40014273b0 a1=40014a0cc0 a2=4001427380 a3=25 items=0 ppid=1 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:34.292000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:15:34.293192 kubelet[2535]: I0209 10:15:34.293179 2535 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:15:34.297894 kubelet[2535]: I0209 10:15:34.297878 2535 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:15:34.304961 kubelet[2535]: I0209 10:15:34.304943 2535 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:34.320797 kubelet[2535]: I0209 10:15:34.318913 2535 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:34.320797 kubelet[2535]: I0209 10:15:34.318990 2535 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-89d14aa977" Feb 9 10:15:34.366300 kubelet[2535]: I0209 10:15:34.366260 2535 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:15:34.366533 kubelet[2535]: I0209 10:15:34.366520 2535 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:15:34.366628 kubelet[2535]: I0209 10:15:34.366618 2535 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:15:34.377956 kubelet[2535]: E0209 10:15:34.377933 2535 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-89d14aa977\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:34.398537 kubelet[2535]: I0209 10:15:34.398512 2535 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/edfa3640357251eab6b489224f2366e8-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-89d14aa977\" (UID: \"edfa3640357251eab6b489224f2366e8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:34.398720 kubelet[2535]: I0209 10:15:34.398708 2535 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/cf677be2cb6b8bd1ba2070159f4b4d87-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-89d14aa977\" (UID: \"cf677be2cb6b8bd1ba2070159f4b4d87\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:34.398829 kubelet[2535]: I0209 10:15:34.398818 2535 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/cf677be2cb6b8bd1ba2070159f4b4d87-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-89d14aa977\" (UID: \"cf677be2cb6b8bd1ba2070159f4b4d87\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:34.398925 kubelet[2535]: I0209 10:15:34.398915 2535 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/cf677be2cb6b8bd1ba2070159f4b4d87-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-89d14aa977\" (UID: \"cf677be2cb6b8bd1ba2070159f4b4d87\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:34.399011 kubelet[2535]: I0209 10:15:34.399002 2535 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/88dfc74926a182c0e6606c906bab0840-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-89d14aa977\" (UID: \"88dfc74926a182c0e6606c906bab0840\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:34.399102 kubelet[2535]: I0209 10:15:34.399093 2535 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/edfa3640357251eab6b489224f2366e8-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-89d14aa977\" (UID: \"edfa3640357251eab6b489224f2366e8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:34.399192 kubelet[2535]: I0209 10:15:34.399183 2535 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/edfa3640357251eab6b489224f2366e8-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-89d14aa977\" (UID: \"edfa3640357251eab6b489224f2366e8\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:34.399270 kubelet[2535]: I0209 10:15:34.399261 2535 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/cf677be2cb6b8bd1ba2070159f4b4d87-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-89d14aa977\" (UID: \"cf677be2cb6b8bd1ba2070159f4b4d87\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:34.399350 kubelet[2535]: I0209 10:15:34.399342 2535 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/cf677be2cb6b8bd1ba2070159f4b4d87-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-89d14aa977\" (UID: \"cf677be2cb6b8bd1ba2070159f4b4d87\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:35.176637 kubelet[2535]: I0209 10:15:35.176598 2535 apiserver.go:52] "Watching apiserver" Feb 9 10:15:35.197885 kubelet[2535]: I0209 10:15:35.197838 2535 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 10:15:35.204089 kubelet[2535]: I0209 10:15:35.204041 2535 reconciler.go:41] "Reconciler: start to sync state" Feb 9 10:15:35.443307 kubelet[2535]: E0209 10:15:35.443197 2535 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-89d14aa977\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" Feb 9 10:15:35.966006 sudo[1747]: pam_unix(sudo:session): session closed for user root Feb 9 10:15:35.965000 audit[1747]: USER_END pid=1747 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:15:35.965000 audit[1747]: CRED_DISP pid=1747 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:15:36.037856 sshd[1744]: pam_unix(sshd:session): session closed for user core Feb 9 10:15:36.038000 audit[1744]: USER_END pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:15:36.038000 audit[1744]: CRED_DISP pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:15:36.040758 systemd-logind[1368]: Session 9 logged out. Waiting for processes to exit. Feb 9 10:15:36.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.13:22-10.200.12.6:50176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:15:36.041632 systemd[1]: sshd@6-10.200.20.13:22-10.200.12.6:50176.service: Deactivated successfully. Feb 9 10:15:36.042358 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 10:15:36.042529 systemd[1]: session-9.scope: Consumed 4.537s CPU time. Feb 9 10:15:36.043586 systemd-logind[1368]: Removed session 9. Feb 9 10:15:36.173748 kubelet[2535]: I0209 10:15:36.173703 2535 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-89d14aa977" podStartSLOduration=2.173648448 pod.CreationTimestamp="2024-02-09 10:15:34 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:15:36.172844777 +0000 UTC m=+2.084612293" watchObservedRunningTime="2024-02-09 10:15:36.173648448 +0000 UTC m=+2.085415964" Feb 9 10:15:36.173937 kubelet[2535]: I0209 10:15:36.173820 2535 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-89d14aa977" podStartSLOduration=4.173789962 pod.CreationTimestamp="2024-02-09 10:15:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:15:35.802930293 +0000 UTC m=+1.714697809" watchObservedRunningTime="2024-02-09 10:15:36.173789962 +0000 UTC m=+2.085557438" Feb 9 10:15:38.611643 kubelet[2535]: I0209 10:15:38.611606 2535 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-89d14aa977" podStartSLOduration=4.611572725 pod.CreationTimestamp="2024-02-09 10:15:34 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:15:36.573796001 +0000 UTC m=+2.485563517" watchObservedRunningTime="2024-02-09 10:15:38.611572725 +0000 UTC m=+4.523340241" Feb 9 10:15:51.389655 systemd[1]: cri-containerd-26a8987e77702f82b48747db1f8815169319b3b795fbe1019847da2b021fa0dd.scope: Deactivated successfully. Feb 9 10:15:51.389965 systemd[1]: cri-containerd-26a8987e77702f82b48747db1f8815169319b3b795fbe1019847da2b021fa0dd.scope: Consumed 2.151s CPU time. Feb 9 10:15:51.392000 audit: BPF prog-id=80 op=UNLOAD Feb 9 10:15:51.399068 kernel: kauditd_printk_skb: 317 callbacks suppressed Feb 9 10:15:51.399163 kernel: audit: type=1334 audit(1707473751.392:907): prog-id=80 op=UNLOAD Feb 9 10:15:51.392000 audit: BPF prog-id=89 op=UNLOAD Feb 9 10:15:51.411524 kernel: audit: type=1334 audit(1707473751.392:908): prog-id=89 op=UNLOAD Feb 9 10:15:51.422220 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-26a8987e77702f82b48747db1f8815169319b3b795fbe1019847da2b021fa0dd-rootfs.mount: Deactivated successfully. Feb 9 10:15:51.446408 env[1381]: time="2024-02-09T10:15:51.446359246Z" level=info msg="shim disconnected" id=26a8987e77702f82b48747db1f8815169319b3b795fbe1019847da2b021fa0dd Feb 9 10:15:51.446408 env[1381]: time="2024-02-09T10:15:51.446406894Z" level=warning msg="cleaning up after shim disconnected" id=26a8987e77702f82b48747db1f8815169319b3b795fbe1019847da2b021fa0dd namespace=k8s.io Feb 9 10:15:51.446781 env[1381]: time="2024-02-09T10:15:51.446417336Z" level=info msg="cleaning up dead shim" Feb 9 10:15:51.452885 env[1381]: time="2024-02-09T10:15:51.452842852Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:15:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2615 runtime=io.containerd.runc.v2\n" Feb 9 10:15:52.301615 kubelet[2535]: I0209 10:15:52.301585 2535 scope.go:115] "RemoveContainer" containerID="26a8987e77702f82b48747db1f8815169319b3b795fbe1019847da2b021fa0dd" Feb 9 10:15:52.304165 env[1381]: time="2024-02-09T10:15:52.304128862Z" level=info msg="CreateContainer within sandbox \"a215e1852d0cc7e5814fd551ad881008002c3f1e4c7764e81d203145f0f378f4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 10:15:52.326477 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount855991383.mount: Deactivated successfully. Feb 9 10:15:52.331425 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1116709914.mount: Deactivated successfully. Feb 9 10:15:52.349008 env[1381]: time="2024-02-09T10:15:52.348943938Z" level=info msg="CreateContainer within sandbox \"a215e1852d0cc7e5814fd551ad881008002c3f1e4c7764e81d203145f0f378f4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"a800630aef3c43ac143f41c7c771dd1d981e989d08e950aa9e010bd1e1504362\"" Feb 9 10:15:52.349494 env[1381]: time="2024-02-09T10:15:52.349472988Z" level=info msg="StartContainer for \"a800630aef3c43ac143f41c7c771dd1d981e989d08e950aa9e010bd1e1504362\"" Feb 9 10:15:52.362605 systemd[1]: Started cri-containerd-a800630aef3c43ac143f41c7c771dd1d981e989d08e950aa9e010bd1e1504362.scope. Feb 9 10:15:52.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410908 kernel: audit: type=1400 audit(1707473752.376:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.411045 kernel: audit: type=1400 audit(1707473752.376:910): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.431928 kernel: audit: type=1400 audit(1707473752.376:911): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.454987 kernel: audit: type=1400 audit(1707473752.376:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.472792 kernel: audit: type=1400 audit(1707473752.376:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.489830 kernel: audit: type=1400 audit(1707473752.376:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.506713 kernel: audit: type=1400 audit(1707473752.376:915): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.511836 kernel: audit: type=1400 audit(1707473752.376:916): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.393000 audit: BPF prog-id=110 op=LOAD Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2226 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:52.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303036333061656633633433616331343366343163376337373164 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2226 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:52.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303036333061656633633433616331343366343163376337373164 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit: BPF prog-id=111 op=LOAD Feb 9 10:15:52.410000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2226 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:52.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303036333061656633633433616331343366343163376337373164 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit: BPF prog-id=112 op=LOAD Feb 9 10:15:52.410000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2226 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:52.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303036333061656633633433616331343366343163376337373164 Feb 9 10:15:52.410000 audit: BPF prog-id=112 op=UNLOAD Feb 9 10:15:52.410000 audit: BPF prog-id=111 op=UNLOAD Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:52.410000 audit: BPF prog-id=113 op=LOAD Feb 9 10:15:52.410000 audit[2634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2226 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:52.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303036333061656633633433616331343366343163376337373164 Feb 9 10:15:52.531946 env[1381]: time="2024-02-09T10:15:52.531904910Z" level=info msg="StartContainer for \"a800630aef3c43ac143f41c7c771dd1d981e989d08e950aa9e010bd1e1504362\" returns successfully" Feb 9 10:15:53.205746 kubelet[2535]: E0209 10:15:53.205717 2535 controller.go:189] failed to update lease, error: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.13:40784->10.200.20.10:2379: read: connection timed out Feb 9 10:15:53.212717 systemd[1]: cri-containerd-afcb312c72f6ae6cb0a2c58daeab5283b72fef0f5cb69fee3070bcd6d6d6f795.scope: Deactivated successfully. Feb 9 10:15:53.213033 systemd[1]: cri-containerd-afcb312c72f6ae6cb0a2c58daeab5283b72fef0f5cb69fee3070bcd6d6d6f795.scope: Consumed 1.450s CPU time. Feb 9 10:15:53.216000 audit: BPF prog-id=88 op=UNLOAD Feb 9 10:15:53.216000 audit: BPF prog-id=95 op=UNLOAD Feb 9 10:15:53.232470 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-afcb312c72f6ae6cb0a2c58daeab5283b72fef0f5cb69fee3070bcd6d6d6f795-rootfs.mount: Deactivated successfully. Feb 9 10:15:53.263642 env[1381]: time="2024-02-09T10:15:53.263591777Z" level=info msg="shim disconnected" id=afcb312c72f6ae6cb0a2c58daeab5283b72fef0f5cb69fee3070bcd6d6d6f795 Feb 9 10:15:53.263943 env[1381]: time="2024-02-09T10:15:53.263923793Z" level=warning msg="cleaning up after shim disconnected" id=afcb312c72f6ae6cb0a2c58daeab5283b72fef0f5cb69fee3070bcd6d6d6f795 namespace=k8s.io Feb 9 10:15:53.264033 env[1381]: time="2024-02-09T10:15:53.264019969Z" level=info msg="cleaning up dead shim" Feb 9 10:15:53.272094 env[1381]: time="2024-02-09T10:15:53.272051952Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:15:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2674 runtime=io.containerd.runc.v2\n" Feb 9 10:15:53.306710 kubelet[2535]: I0209 10:15:53.306363 2535 scope.go:115] "RemoveContainer" containerID="afcb312c72f6ae6cb0a2c58daeab5283b72fef0f5cb69fee3070bcd6d6d6f795" Feb 9 10:15:53.308543 env[1381]: time="2024-02-09T10:15:53.308506807Z" level=info msg="CreateContainer within sandbox \"c14d38a6676a51d128b239533fd9cb2d224c87e3c44a8c7b1ab127d661bef73d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 10:15:53.335401 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3479817018.mount: Deactivated successfully. Feb 9 10:15:53.357355 env[1381]: time="2024-02-09T10:15:53.357309887Z" level=info msg="CreateContainer within sandbox \"c14d38a6676a51d128b239533fd9cb2d224c87e3c44a8c7b1ab127d661bef73d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"08377c30f3da3f2edcfe5a4c95e416cc6e335305299c6c15b66e14676b198b11\"" Feb 9 10:15:53.358098 env[1381]: time="2024-02-09T10:15:53.358065773Z" level=info msg="StartContainer for \"08377c30f3da3f2edcfe5a4c95e416cc6e335305299c6c15b66e14676b198b11\"" Feb 9 10:15:53.376904 systemd[1]: Started cri-containerd-08377c30f3da3f2edcfe5a4c95e416cc6e335305299c6c15b66e14676b198b11.scope. Feb 9 10:15:53.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.390000 audit: BPF prog-id=114 op=LOAD Feb 9 10:15:53.391000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.391000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2256 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:53.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333737633330663364613366326564636665356134633935653431 Feb 9 10:15:53.391000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.391000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2256 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:53.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333737633330663364613366326564636665356134633935653431 Feb 9 10:15:53.391000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.391000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.391000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.391000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.391000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.391000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.391000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.391000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.391000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.391000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.391000 audit: BPF prog-id=115 op=LOAD Feb 9 10:15:53.391000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2256 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:53.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333737633330663364613366326564636665356134633935653431 Feb 9 10:15:53.392000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.392000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.392000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.392000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.392000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.392000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.392000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.392000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.392000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.392000 audit: BPF prog-id=116 op=LOAD Feb 9 10:15:53.392000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2256 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:53.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333737633330663364613366326564636665356134633935653431 Feb 9 10:15:53.393000 audit: BPF prog-id=116 op=UNLOAD Feb 9 10:15:53.393000 audit: BPF prog-id=115 op=UNLOAD Feb 9 10:15:53.393000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.393000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.393000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.393000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.393000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.393000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.393000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.393000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.393000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.393000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:15:53.393000 audit: BPF prog-id=117 op=LOAD Feb 9 10:15:53.393000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2256 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:15:53.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038333737633330663364613366326564636665356134633935653431 Feb 9 10:15:53.422600 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1914050069.mount: Deactivated successfully. Feb 9 10:15:53.444725 env[1381]: time="2024-02-09T10:15:53.444675854Z" level=info msg="StartContainer for \"08377c30f3da3f2edcfe5a4c95e416cc6e335305299c6c15b66e14676b198b11\" returns successfully" Feb 9 10:15:54.675000 audit[2645]: AVC avc: denied { watch } for pid=2645 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:54.675000 audit[2645]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000050450 a2=fc6 a3=0 items=0 ppid=2226 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c516 key=(null) Feb 9 10:15:54.675000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:15:54.675000 audit[2645]: AVC avc: denied { watch } for pid=2645 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:15:54.675000 audit[2645]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400102c040 a2=fc6 a3=0 items=0 ppid=2226 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c516 key=(null) Feb 9 10:15:54.675000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:15:59.348759 kubelet[2535]: E0209 10:15:59.348648 2535 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-89d14aa977.17b22a53fb079db7", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-89d14aa977", UID:"edfa3640357251eab6b489224f2366e8", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Startup probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-89d14aa977"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 15, 48, 909071799, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 15, 48, 909071799, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.13:40606->10.200.20.10:2379: read: connection timed out' (will not retry!) Feb 9 10:16:03.207128 kubelet[2535]: E0209 10:16:03.207099 2535 controller.go:189] failed to update lease, error: the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io ci-3510.3.2-a-89d14aa977) Feb 9 10:16:13.208548 kubelet[2535]: E0209 10:16:13.208520 2535 controller.go:189] failed to update lease, error: the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io ci-3510.3.2-a-89d14aa977)