Feb 9 06:43:01.554709 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Feb 9 06:43:01.554722 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 06:43:01.554730 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 06:43:01.554734 kernel: BIOS-provided physical RAM map: Feb 9 06:43:01.554738 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 06:43:01.554741 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 06:43:01.554746 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 06:43:01.554750 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 06:43:01.554754 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 06:43:01.554758 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000061f6efff] usable Feb 9 06:43:01.554762 kernel: BIOS-e820: [mem 0x0000000061f6f000-0x0000000061f6ffff] ACPI NVS Feb 9 06:43:01.554766 kernel: BIOS-e820: [mem 0x0000000061f70000-0x0000000061f70fff] reserved Feb 9 06:43:01.554770 kernel: BIOS-e820: [mem 0x0000000061f71000-0x000000006c0c4fff] usable Feb 9 06:43:01.554774 kernel: BIOS-e820: [mem 0x000000006c0c5000-0x000000006d1a7fff] reserved Feb 9 06:43:01.554779 kernel: BIOS-e820: [mem 0x000000006d1a8000-0x000000006d330fff] usable Feb 9 06:43:01.554784 kernel: BIOS-e820: [mem 0x000000006d331000-0x000000006d762fff] ACPI NVS Feb 9 06:43:01.554789 kernel: BIOS-e820: [mem 0x000000006d763000-0x000000006fffefff] reserved Feb 9 06:43:01.554793 kernel: BIOS-e820: [mem 0x000000006ffff000-0x000000006fffffff] usable Feb 9 06:43:01.554797 kernel: BIOS-e820: [mem 0x0000000070000000-0x000000007b7fffff] reserved Feb 9 06:43:01.554801 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 06:43:01.554805 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 06:43:01.554810 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 06:43:01.554814 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 06:43:01.554818 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 06:43:01.554822 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000008837fffff] usable Feb 9 06:43:01.554827 kernel: NX (Execute Disable) protection: active Feb 9 06:43:01.554831 kernel: SMBIOS 3.2.1 present. Feb 9 06:43:01.554835 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Feb 9 06:43:01.554840 kernel: tsc: Detected 3400.000 MHz processor Feb 9 06:43:01.554844 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 06:43:01.554848 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 06:43:01.554853 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 06:43:01.554857 kernel: last_pfn = 0x883800 max_arch_pfn = 0x400000000 Feb 9 06:43:01.554862 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 06:43:01.554866 kernel: last_pfn = 0x70000 max_arch_pfn = 0x400000000 Feb 9 06:43:01.554871 kernel: Using GB pages for direct mapping Feb 9 06:43:01.554876 kernel: ACPI: Early table checksum verification disabled Feb 9 06:43:01.554880 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 06:43:01.554885 kernel: ACPI: XSDT 0x000000006D6440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 06:43:01.554890 kernel: ACPI: FACP 0x000000006D680620 000114 (v06 01072009 AMI 00010013) Feb 9 06:43:01.554896 kernel: ACPI: DSDT 0x000000006D644268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 06:43:01.554900 kernel: ACPI: FACS 0x000000006D762F80 000040 Feb 9 06:43:01.554906 kernel: ACPI: APIC 0x000000006D680738 00012C (v04 01072009 AMI 00010013) Feb 9 06:43:01.554911 kernel: ACPI: FPDT 0x000000006D680868 000044 (v01 01072009 AMI 00010013) Feb 9 06:43:01.554916 kernel: ACPI: FIDT 0x000000006D6808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 06:43:01.554920 kernel: ACPI: MCFG 0x000000006D680950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 06:43:01.554925 kernel: ACPI: SPMI 0x000000006D680990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 06:43:01.554930 kernel: ACPI: SSDT 0x000000006D6809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 06:43:01.554934 kernel: ACPI: SSDT 0x000000006D6824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 06:43:01.554940 kernel: ACPI: SSDT 0x000000006D6856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 06:43:01.554945 kernel: ACPI: HPET 0x000000006D6879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:43:01.554950 kernel: ACPI: SSDT 0x000000006D687A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 06:43:01.554954 kernel: ACPI: SSDT 0x000000006D6889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 06:43:01.554959 kernel: ACPI: UEFI 0x000000006D6892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:43:01.554964 kernel: ACPI: LPIT 0x000000006D689318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:43:01.554968 kernel: ACPI: SSDT 0x000000006D6893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 06:43:01.554973 kernel: ACPI: SSDT 0x000000006D68BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 06:43:01.554978 kernel: ACPI: DBGP 0x000000006D68D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:43:01.554983 kernel: ACPI: DBG2 0x000000006D68D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:43:01.554988 kernel: ACPI: SSDT 0x000000006D68D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 06:43:01.554993 kernel: ACPI: DMAR 0x000000006D68EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Feb 9 06:43:01.554998 kernel: ACPI: SSDT 0x000000006D68ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 06:43:01.555002 kernel: ACPI: TPM2 0x000000006D68EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 06:43:01.555007 kernel: ACPI: SSDT 0x000000006D68EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 06:43:01.555012 kernel: ACPI: WSMT 0x000000006D68FC28 000028 (v01 \xf0a 01072009 AMI 00010013) Feb 9 06:43:01.555017 kernel: ACPI: EINJ 0x000000006D68FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 06:43:01.555022 kernel: ACPI: ERST 0x000000006D68FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 06:43:01.555027 kernel: ACPI: BERT 0x000000006D68FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 06:43:01.555032 kernel: ACPI: HEST 0x000000006D68FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 06:43:01.555037 kernel: ACPI: SSDT 0x000000006D690260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 06:43:01.555041 kernel: ACPI: Reserving FACP table memory at [mem 0x6d680620-0x6d680733] Feb 9 06:43:01.555046 kernel: ACPI: Reserving DSDT table memory at [mem 0x6d644268-0x6d68061e] Feb 9 06:43:01.555051 kernel: ACPI: Reserving FACS table memory at [mem 0x6d762f80-0x6d762fbf] Feb 9 06:43:01.555056 kernel: ACPI: Reserving APIC table memory at [mem 0x6d680738-0x6d680863] Feb 9 06:43:01.555060 kernel: ACPI: Reserving FPDT table memory at [mem 0x6d680868-0x6d6808ab] Feb 9 06:43:01.555066 kernel: ACPI: Reserving FIDT table memory at [mem 0x6d6808b0-0x6d68094b] Feb 9 06:43:01.555070 kernel: ACPI: Reserving MCFG table memory at [mem 0x6d680950-0x6d68098b] Feb 9 06:43:01.555075 kernel: ACPI: Reserving SPMI table memory at [mem 0x6d680990-0x6d6809d0] Feb 9 06:43:01.555080 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6809d8-0x6d6824f3] Feb 9 06:43:01.555084 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6824f8-0x6d6856bd] Feb 9 06:43:01.555089 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6856c0-0x6d6879ea] Feb 9 06:43:01.555094 kernel: ACPI: Reserving HPET table memory at [mem 0x6d6879f0-0x6d687a27] Feb 9 06:43:01.555098 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d687a28-0x6d6889d5] Feb 9 06:43:01.555103 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6889d8-0x6d6892ce] Feb 9 06:43:01.555109 kernel: ACPI: Reserving UEFI table memory at [mem 0x6d6892d0-0x6d689311] Feb 9 06:43:01.555113 kernel: ACPI: Reserving LPIT table memory at [mem 0x6d689318-0x6d6893ab] Feb 9 06:43:01.555118 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6893b0-0x6d68bb8d] Feb 9 06:43:01.555123 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68bb90-0x6d68d071] Feb 9 06:43:01.555127 kernel: ACPI: Reserving DBGP table memory at [mem 0x6d68d078-0x6d68d0ab] Feb 9 06:43:01.555132 kernel: ACPI: Reserving DBG2 table memory at [mem 0x6d68d0b0-0x6d68d103] Feb 9 06:43:01.555137 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68d108-0x6d68ec6e] Feb 9 06:43:01.555141 kernel: ACPI: Reserving DMAR table memory at [mem 0x6d68ec70-0x6d68ed17] Feb 9 06:43:01.555146 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ed18-0x6d68ee5b] Feb 9 06:43:01.555152 kernel: ACPI: Reserving TPM2 table memory at [mem 0x6d68ee60-0x6d68ee93] Feb 9 06:43:01.555156 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ee98-0x6d68fc26] Feb 9 06:43:01.555161 kernel: ACPI: Reserving WSMT table memory at [mem 0x6d68fc28-0x6d68fc4f] Feb 9 06:43:01.555166 kernel: ACPI: Reserving EINJ table memory at [mem 0x6d68fc50-0x6d68fd7f] Feb 9 06:43:01.555170 kernel: ACPI: Reserving ERST table memory at [mem 0x6d68fd80-0x6d68ffaf] Feb 9 06:43:01.555175 kernel: ACPI: Reserving BERT table memory at [mem 0x6d68ffb0-0x6d68ffdf] Feb 9 06:43:01.555180 kernel: ACPI: Reserving HEST table memory at [mem 0x6d68ffe0-0x6d69025b] Feb 9 06:43:01.555184 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d690260-0x6d6903c1] Feb 9 06:43:01.555189 kernel: No NUMA configuration found Feb 9 06:43:01.555194 kernel: Faking a node at [mem 0x0000000000000000-0x00000008837fffff] Feb 9 06:43:01.555199 kernel: NODE_DATA(0) allocated [mem 0x8837fa000-0x8837fffff] Feb 9 06:43:01.555204 kernel: Zone ranges: Feb 9 06:43:01.555209 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 06:43:01.555213 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 06:43:01.555218 kernel: Normal [mem 0x0000000100000000-0x00000008837fffff] Feb 9 06:43:01.555223 kernel: Movable zone start for each node Feb 9 06:43:01.555227 kernel: Early memory node ranges Feb 9 06:43:01.555232 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 06:43:01.555238 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 06:43:01.555242 kernel: node 0: [mem 0x0000000040400000-0x0000000061f6efff] Feb 9 06:43:01.555247 kernel: node 0: [mem 0x0000000061f71000-0x000000006c0c4fff] Feb 9 06:43:01.555252 kernel: node 0: [mem 0x000000006d1a8000-0x000000006d330fff] Feb 9 06:43:01.555256 kernel: node 0: [mem 0x000000006ffff000-0x000000006fffffff] Feb 9 06:43:01.555261 kernel: node 0: [mem 0x0000000100000000-0x00000008837fffff] Feb 9 06:43:01.555266 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000008837fffff] Feb 9 06:43:01.555274 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 06:43:01.555280 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 06:43:01.555285 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 06:43:01.555290 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 06:43:01.555296 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Feb 9 06:43:01.555301 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Feb 9 06:43:01.555306 kernel: On node 0, zone Normal: 18432 pages in unavailable ranges Feb 9 06:43:01.555311 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 06:43:01.555316 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 06:43:01.555321 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 06:43:01.555327 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 06:43:01.555332 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 06:43:01.555337 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 06:43:01.555342 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 06:43:01.555347 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 06:43:01.555352 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 06:43:01.555357 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 06:43:01.555362 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 06:43:01.555367 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 06:43:01.555372 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 06:43:01.555378 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 06:43:01.555383 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 06:43:01.555388 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 06:43:01.555393 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 06:43:01.555398 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 06:43:01.555403 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 06:43:01.555408 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 06:43:01.555413 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 06:43:01.555419 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 06:43:01.555424 kernel: TSC deadline timer available Feb 9 06:43:01.555429 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 06:43:01.555434 kernel: [mem 0x7b800000-0xdfffffff] available for PCI devices Feb 9 06:43:01.555439 kernel: Booting paravirtualized kernel on bare hardware Feb 9 06:43:01.555447 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 06:43:01.555452 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 06:43:01.555457 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 06:43:01.555462 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 06:43:01.555468 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 06:43:01.555473 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8190323 Feb 9 06:43:01.555478 kernel: Policy zone: Normal Feb 9 06:43:01.555484 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 06:43:01.555489 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 06:43:01.555494 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 06:43:01.555499 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 06:43:01.555504 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 06:43:01.555510 kernel: Memory: 32555728K/33281940K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 725952K reserved, 0K cma-reserved) Feb 9 06:43:01.555515 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 06:43:01.555521 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 06:43:01.555526 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 06:43:01.555531 kernel: rcu: Hierarchical RCU implementation. Feb 9 06:43:01.555536 kernel: rcu: RCU event tracing is enabled. Feb 9 06:43:01.555541 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 06:43:01.555546 kernel: Rude variant of Tasks RCU enabled. Feb 9 06:43:01.555551 kernel: Tracing variant of Tasks RCU enabled. Feb 9 06:43:01.555557 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 06:43:01.555562 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 06:43:01.555567 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 06:43:01.555572 kernel: random: crng init done Feb 9 06:43:01.555577 kernel: Console: colour dummy device 80x25 Feb 9 06:43:01.555582 kernel: printk: console [tty0] enabled Feb 9 06:43:01.555587 kernel: printk: console [ttyS1] enabled Feb 9 06:43:01.555592 kernel: ACPI: Core revision 20210730 Feb 9 06:43:01.555598 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Feb 9 06:43:01.555604 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 06:43:01.555609 kernel: DMAR: Host address width 39 Feb 9 06:43:01.555614 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Feb 9 06:43:01.555619 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Feb 9 06:43:01.555624 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 06:43:01.555629 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 06:43:01.555634 kernel: DMAR: RMRR base: 0x0000006e011000 end: 0x0000006e25afff Feb 9 06:43:01.555639 kernel: DMAR: RMRR base: 0x00000079000000 end: 0x0000007b7fffff Feb 9 06:43:01.555644 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Feb 9 06:43:01.555650 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 06:43:01.555655 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 06:43:01.555660 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 06:43:01.555665 kernel: x2apic enabled Feb 9 06:43:01.555670 kernel: Switched APIC routing to cluster x2apic. Feb 9 06:43:01.555675 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 06:43:01.555681 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 06:43:01.555686 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 06:43:01.555691 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 06:43:01.555697 kernel: process: using mwait in idle threads Feb 9 06:43:01.555702 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 06:43:01.555707 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 06:43:01.555712 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 06:43:01.555717 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 06:43:01.555722 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 06:43:01.555727 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 06:43:01.555732 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 06:43:01.555737 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 06:43:01.555743 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 06:43:01.555748 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 06:43:01.555753 kernel: TAA: Mitigation: TSX disabled Feb 9 06:43:01.555758 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 06:43:01.555763 kernel: SRBDS: Mitigation: Microcode Feb 9 06:43:01.555768 kernel: GDS: Vulnerable: No microcode Feb 9 06:43:01.555773 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 06:43:01.555778 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 06:43:01.555784 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 06:43:01.555789 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 06:43:01.555794 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 06:43:01.555799 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 06:43:01.555804 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 06:43:01.555809 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 06:43:01.555814 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 06:43:01.555820 kernel: Freeing SMP alternatives memory: 32K Feb 9 06:43:01.555825 kernel: pid_max: default: 32768 minimum: 301 Feb 9 06:43:01.555830 kernel: LSM: Security Framework initializing Feb 9 06:43:01.555835 kernel: SELinux: Initializing. Feb 9 06:43:01.555840 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 06:43:01.555845 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 06:43:01.555850 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 06:43:01.555856 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 06:43:01.555861 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 06:43:01.555866 kernel: ... version: 4 Feb 9 06:43:01.555871 kernel: ... bit width: 48 Feb 9 06:43:01.555876 kernel: ... generic registers: 4 Feb 9 06:43:01.555882 kernel: ... value mask: 0000ffffffffffff Feb 9 06:43:01.555887 kernel: ... max period: 00007fffffffffff Feb 9 06:43:01.555892 kernel: ... fixed-purpose events: 3 Feb 9 06:43:01.555897 kernel: ... event mask: 000000070000000f Feb 9 06:43:01.555902 kernel: signal: max sigframe size: 2032 Feb 9 06:43:01.555907 kernel: rcu: Hierarchical SRCU implementation. Feb 9 06:43:01.555912 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 06:43:01.555917 kernel: smp: Bringing up secondary CPUs ... Feb 9 06:43:01.555922 kernel: x86: Booting SMP configuration: Feb 9 06:43:01.555928 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 06:43:01.555933 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 06:43:01.555938 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 06:43:01.555943 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 06:43:01.555948 kernel: smpboot: Max logical packages: 1 Feb 9 06:43:01.555953 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 06:43:01.555958 kernel: devtmpfs: initialized Feb 9 06:43:01.555963 kernel: x86/mm: Memory block size: 128MB Feb 9 06:43:01.555968 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x61f6f000-0x61f6ffff] (4096 bytes) Feb 9 06:43:01.555974 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6d331000-0x6d762fff] (4399104 bytes) Feb 9 06:43:01.555979 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 06:43:01.555998 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 06:43:01.556003 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 06:43:01.556008 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 06:43:01.556012 kernel: audit: initializing netlink subsys (disabled) Feb 9 06:43:01.556017 kernel: audit: type=2000 audit(1707460976.110:1): state=initialized audit_enabled=0 res=1 Feb 9 06:43:01.556022 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 06:43:01.556028 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 06:43:01.556033 kernel: cpuidle: using governor menu Feb 9 06:43:01.556037 kernel: ACPI: bus type PCI registered Feb 9 06:43:01.556042 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 06:43:01.556047 kernel: dca service started, version 1.12.1 Feb 9 06:43:01.556052 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 06:43:01.556057 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 06:43:01.556061 kernel: PCI: Using configuration type 1 for base access Feb 9 06:43:01.556066 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 06:43:01.556072 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 06:43:01.556077 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 06:43:01.556081 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 06:43:01.556086 kernel: ACPI: Added _OSI(Module Device) Feb 9 06:43:01.556091 kernel: ACPI: Added _OSI(Processor Device) Feb 9 06:43:01.556096 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 06:43:01.556101 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 06:43:01.556105 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 06:43:01.556110 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 06:43:01.556116 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 06:43:01.556121 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 06:43:01.556125 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:43:01.556130 kernel: ACPI: SSDT 0xFFFF91EC40214F00 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 06:43:01.556135 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 06:43:01.556140 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:43:01.556145 kernel: ACPI: SSDT 0xFFFF91EC41CEB800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 06:43:01.556149 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:43:01.556154 kernel: ACPI: SSDT 0xFFFF91EC41C5A800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 06:43:01.556159 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:43:01.556164 kernel: ACPI: SSDT 0xFFFF91EC41C59000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 06:43:01.556169 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:43:01.556174 kernel: ACPI: SSDT 0xFFFF91EC40149000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 06:43:01.556179 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:43:01.556183 kernel: ACPI: SSDT 0xFFFF91EC41CEAC00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 06:43:01.556188 kernel: ACPI: Interpreter enabled Feb 9 06:43:01.556193 kernel: ACPI: PM: (supports S0 S5) Feb 9 06:43:01.556198 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 06:43:01.556203 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 06:43:01.556208 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 06:43:01.556213 kernel: HEST: Table parsing has been initialized. Feb 9 06:43:01.556218 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 06:43:01.556222 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 06:43:01.556227 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 06:43:01.556232 kernel: ACPI: PM: Power Resource [USBC] Feb 9 06:43:01.556237 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 06:43:01.556242 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 06:43:01.556246 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 06:43:01.556252 kernel: ACPI: PM: Power Resource [WRST] Feb 9 06:43:01.556257 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 9 06:43:01.556261 kernel: ACPI: PM: Power Resource [FN00] Feb 9 06:43:01.556266 kernel: ACPI: PM: Power Resource [FN01] Feb 9 06:43:01.556271 kernel: ACPI: PM: Power Resource [FN02] Feb 9 06:43:01.556276 kernel: ACPI: PM: Power Resource [FN03] Feb 9 06:43:01.556280 kernel: ACPI: PM: Power Resource [FN04] Feb 9 06:43:01.556285 kernel: ACPI: PM: Power Resource [PIN] Feb 9 06:43:01.556290 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 06:43:01.556353 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 06:43:01.556399 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 06:43:01.556439 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 06:43:01.556464 kernel: PCI host bridge to bus 0000:00 Feb 9 06:43:01.556522 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 06:43:01.556559 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 06:43:01.556594 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 06:43:01.556631 kernel: pci_bus 0000:00: root bus resource [mem 0x7b800000-0xdfffffff window] Feb 9 06:43:01.556666 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 06:43:01.556701 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 06:43:01.556748 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 06:43:01.556798 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 06:43:01.556840 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 06:43:01.556887 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Feb 9 06:43:01.556930 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Feb 9 06:43:01.556975 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Feb 9 06:43:01.557017 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x7c000000-0x7cffffff 64bit] Feb 9 06:43:01.557058 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Feb 9 06:43:01.557098 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Feb 9 06:43:01.557145 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 06:43:01.557187 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x7e51f000-0x7e51ffff 64bit] Feb 9 06:43:01.557230 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 06:43:01.557270 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x7e51e000-0x7e51efff 64bit] Feb 9 06:43:01.557313 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 06:43:01.557354 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x7e500000-0x7e50ffff 64bit] Feb 9 06:43:01.557397 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 06:43:01.557444 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 06:43:01.557522 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x7e512000-0x7e513fff 64bit] Feb 9 06:43:01.557562 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x7e51d000-0x7e51dfff 64bit] Feb 9 06:43:01.557606 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 06:43:01.557647 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 06:43:01.557690 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 06:43:01.557734 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 06:43:01.557777 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 06:43:01.557818 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x7e51a000-0x7e51afff 64bit] Feb 9 06:43:01.557859 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 06:43:01.557909 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 06:43:01.557952 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x7e519000-0x7e519fff 64bit] Feb 9 06:43:01.557993 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 06:43:01.558037 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 06:43:01.558077 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x7e518000-0x7e518fff 64bit] Feb 9 06:43:01.558118 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 06:43:01.558160 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 06:43:01.558201 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x7e510000-0x7e511fff] Feb 9 06:43:01.558240 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x7e517000-0x7e5170ff] Feb 9 06:43:01.558282 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Feb 9 06:43:01.558323 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Feb 9 06:43:01.558362 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Feb 9 06:43:01.558403 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x7e516000-0x7e5167ff] Feb 9 06:43:01.558445 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 06:43:01.558527 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 06:43:01.558571 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 06:43:01.558619 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 06:43:01.558661 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 06:43:01.558706 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 06:43:01.558749 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 06:43:01.558793 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 06:43:01.558834 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 06:43:01.558879 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Feb 9 06:43:01.558920 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Feb 9 06:43:01.558963 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 06:43:01.559005 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 06:43:01.559055 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 06:43:01.559098 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 06:43:01.559140 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x7e514000-0x7e5140ff 64bit] Feb 9 06:43:01.559180 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 06:43:01.559224 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 06:43:01.559265 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 06:43:01.559307 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 06:43:01.559354 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 06:43:01.559396 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 06:43:01.559438 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x7e200000-0x7e2fffff pref] Feb 9 06:43:01.559523 kernel: pci 0000:02:00.0: PME# supported from D3cold Feb 9 06:43:01.559566 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 06:43:01.559607 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 06:43:01.559656 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 06:43:01.559698 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 06:43:01.559741 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x7e100000-0x7e1fffff pref] Feb 9 06:43:01.559782 kernel: pci 0000:02:00.1: PME# supported from D3cold Feb 9 06:43:01.559825 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 06:43:01.559867 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 06:43:01.559908 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 06:43:01.559951 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Feb 9 06:43:01.559991 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 06:43:01.560032 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 06:43:01.560077 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 06:43:01.560120 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x7e400000-0x7e47ffff] Feb 9 06:43:01.560161 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 06:43:01.560203 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x7e480000-0x7e483fff] Feb 9 06:43:01.560281 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 06:43:01.560348 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 06:43:01.560390 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 06:43:01.560433 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Feb 9 06:43:01.560505 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Feb 9 06:43:01.560548 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x7e300000-0x7e37ffff] Feb 9 06:43:01.560591 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 06:43:01.560632 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x7e380000-0x7e383fff] Feb 9 06:43:01.560676 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Feb 9 06:43:01.560717 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 06:43:01.560758 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 06:43:01.560798 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Feb 9 06:43:01.560840 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 06:43:01.560885 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 06:43:01.560928 kernel: pci 0000:07:00.0: enabling Extended Tags Feb 9 06:43:01.560970 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 06:43:01.561014 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 06:43:01.561055 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 06:43:01.561094 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 06:43:01.561135 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 06:43:01.561180 kernel: pci_bus 0000:08: extended config space not accessible Feb 9 06:43:01.561228 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 06:43:01.561273 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x7d000000-0x7dffffff] Feb 9 06:43:01.561319 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x7e000000-0x7e01ffff] Feb 9 06:43:01.561362 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 06:43:01.561406 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 06:43:01.561452 kernel: pci 0000:08:00.0: supports D1 D2 Feb 9 06:43:01.561541 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 06:43:01.561584 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 06:43:01.561627 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 06:43:01.561671 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 06:43:01.561678 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 06:43:01.561684 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 06:43:01.561689 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 06:43:01.561694 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 06:43:01.561700 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 06:43:01.561705 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 06:43:01.561710 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 06:43:01.561715 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 06:43:01.561722 kernel: iommu: Default domain type: Translated Feb 9 06:43:01.561727 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 06:43:01.561771 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Feb 9 06:43:01.561815 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 06:43:01.561859 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Feb 9 06:43:01.561866 kernel: vgaarb: loaded Feb 9 06:43:01.561872 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 06:43:01.561877 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 06:43:01.561882 kernel: PTP clock support registered Feb 9 06:43:01.561889 kernel: PCI: Using ACPI for IRQ routing Feb 9 06:43:01.561894 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 06:43:01.561899 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 06:43:01.561904 kernel: e820: reserve RAM buffer [mem 0x61f6f000-0x63ffffff] Feb 9 06:43:01.561909 kernel: e820: reserve RAM buffer [mem 0x6c0c5000-0x6fffffff] Feb 9 06:43:01.561914 kernel: e820: reserve RAM buffer [mem 0x6d331000-0x6fffffff] Feb 9 06:43:01.561919 kernel: e820: reserve RAM buffer [mem 0x883800000-0x883ffffff] Feb 9 06:43:01.561924 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 9 06:43:01.561929 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Feb 9 06:43:01.561935 kernel: clocksource: Switched to clocksource tsc-early Feb 9 06:43:01.561940 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 06:43:01.561945 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 06:43:01.561951 kernel: pnp: PnP ACPI init Feb 9 06:43:01.561993 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 06:43:01.562036 kernel: pnp 00:02: [dma 0 disabled] Feb 9 06:43:01.562076 kernel: pnp 00:03: [dma 0 disabled] Feb 9 06:43:01.562116 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 06:43:01.562154 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 06:43:01.562193 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 06:43:01.562233 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 06:43:01.562270 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 06:43:01.562307 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 06:43:01.562343 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 06:43:01.562383 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 06:43:01.562419 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 06:43:01.562480 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 06:43:01.562538 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 06:43:01.562576 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 06:43:01.562614 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 06:43:01.562652 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 06:43:01.562689 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 06:43:01.562724 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 06:43:01.562759 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 06:43:01.562797 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 06:43:01.562836 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 06:43:01.562843 kernel: pnp: PnP ACPI: found 10 devices Feb 9 06:43:01.562849 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 06:43:01.562855 kernel: NET: Registered PF_INET protocol family Feb 9 06:43:01.562860 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 06:43:01.562866 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 06:43:01.562871 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 06:43:01.562876 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 06:43:01.562881 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 06:43:01.562886 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 06:43:01.562892 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 06:43:01.562898 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 06:43:01.562903 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 06:43:01.562908 kernel: NET: Registered PF_XDP protocol family Feb 9 06:43:01.562949 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7b800000-0x7b800fff 64bit] Feb 9 06:43:01.562990 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7b801000-0x7b801fff 64bit] Feb 9 06:43:01.563031 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7b802000-0x7b802fff 64bit] Feb 9 06:43:01.563072 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 06:43:01.563115 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 06:43:01.563157 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 06:43:01.563201 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 06:43:01.563244 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 06:43:01.563285 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 06:43:01.563327 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Feb 9 06:43:01.563369 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 06:43:01.563410 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 06:43:01.563453 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 06:43:01.563539 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 06:43:01.563580 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Feb 9 06:43:01.563620 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 06:43:01.563662 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 06:43:01.563703 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Feb 9 06:43:01.563743 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 06:43:01.563787 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 06:43:01.563830 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 06:43:01.563873 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 06:43:01.563914 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 06:43:01.563954 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 06:43:01.563993 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 06:43:01.564031 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 06:43:01.564067 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 06:43:01.564105 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 06:43:01.564140 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 06:43:01.564176 kernel: pci_bus 0000:00: resource 7 [mem 0x7b800000-0xdfffffff window] Feb 9 06:43:01.564211 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 06:43:01.564254 kernel: pci_bus 0000:02: resource 1 [mem 0x7e100000-0x7e2fffff] Feb 9 06:43:01.564293 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 06:43:01.564333 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Feb 9 06:43:01.564373 kernel: pci_bus 0000:04: resource 1 [mem 0x7e400000-0x7e4fffff] Feb 9 06:43:01.564414 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Feb 9 06:43:01.564455 kernel: pci_bus 0000:05: resource 1 [mem 0x7e300000-0x7e3fffff] Feb 9 06:43:01.564541 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 06:43:01.564578 kernel: pci_bus 0000:07: resource 1 [mem 0x7d000000-0x7e0fffff] Feb 9 06:43:01.564619 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Feb 9 06:43:01.564658 kernel: pci_bus 0000:08: resource 1 [mem 0x7d000000-0x7e0fffff] Feb 9 06:43:01.564666 kernel: PCI: CLS 64 bytes, default 64 Feb 9 06:43:01.564672 kernel: DMAR: No ATSR found Feb 9 06:43:01.564677 kernel: DMAR: No SATC found Feb 9 06:43:01.564682 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Feb 9 06:43:01.564687 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Feb 9 06:43:01.564692 kernel: DMAR: IOMMU feature nwfs inconsistent Feb 9 06:43:01.564697 kernel: DMAR: IOMMU feature pasid inconsistent Feb 9 06:43:01.564703 kernel: DMAR: IOMMU feature eafs inconsistent Feb 9 06:43:01.564708 kernel: DMAR: IOMMU feature prs inconsistent Feb 9 06:43:01.564714 kernel: DMAR: IOMMU feature nest inconsistent Feb 9 06:43:01.564719 kernel: DMAR: IOMMU feature mts inconsistent Feb 9 06:43:01.564724 kernel: DMAR: IOMMU feature sc_support inconsistent Feb 9 06:43:01.564729 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Feb 9 06:43:01.564734 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 06:43:01.564739 kernel: DMAR: dmar1: Using Queued invalidation Feb 9 06:43:01.564780 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 06:43:01.564822 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 06:43:01.564864 kernel: pci 0000:00:01.1: Adding to iommu group 1 Feb 9 06:43:01.564907 kernel: pci 0000:00:02.0: Adding to iommu group 2 Feb 9 06:43:01.564947 kernel: pci 0000:00:08.0: Adding to iommu group 3 Feb 9 06:43:01.564987 kernel: pci 0000:00:12.0: Adding to iommu group 4 Feb 9 06:43:01.565027 kernel: pci 0000:00:14.0: Adding to iommu group 5 Feb 9 06:43:01.565068 kernel: pci 0000:00:14.2: Adding to iommu group 5 Feb 9 06:43:01.565107 kernel: pci 0000:00:15.0: Adding to iommu group 6 Feb 9 06:43:01.565148 kernel: pci 0000:00:15.1: Adding to iommu group 6 Feb 9 06:43:01.565188 kernel: pci 0000:00:16.0: Adding to iommu group 7 Feb 9 06:43:01.565231 kernel: pci 0000:00:16.1: Adding to iommu group 7 Feb 9 06:43:01.565270 kernel: pci 0000:00:16.4: Adding to iommu group 7 Feb 9 06:43:01.565310 kernel: pci 0000:00:17.0: Adding to iommu group 8 Feb 9 06:43:01.565351 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Feb 9 06:43:01.565392 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Feb 9 06:43:01.565433 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Feb 9 06:43:01.565499 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Feb 9 06:43:01.565560 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Feb 9 06:43:01.565601 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Feb 9 06:43:01.565643 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Feb 9 06:43:01.565683 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Feb 9 06:43:01.565723 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Feb 9 06:43:01.565765 kernel: pci 0000:02:00.0: Adding to iommu group 1 Feb 9 06:43:01.565806 kernel: pci 0000:02:00.1: Adding to iommu group 1 Feb 9 06:43:01.565849 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 06:43:01.565892 kernel: pci 0000:05:00.0: Adding to iommu group 17 Feb 9 06:43:01.565937 kernel: pci 0000:07:00.0: Adding to iommu group 18 Feb 9 06:43:01.565980 kernel: pci 0000:08:00.0: Adding to iommu group 18 Feb 9 06:43:01.565988 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 06:43:01.565993 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 06:43:01.565998 kernel: software IO TLB: mapped [mem 0x00000000680c5000-0x000000006c0c5000] (64MB) Feb 9 06:43:01.566004 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Feb 9 06:43:01.566009 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 06:43:01.566014 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 06:43:01.566021 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 06:43:01.566026 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Feb 9 06:43:01.566072 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 06:43:01.566080 kernel: Initialise system trusted keyrings Feb 9 06:43:01.566085 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 06:43:01.566090 kernel: Key type asymmetric registered Feb 9 06:43:01.566095 kernel: Asymmetric key parser 'x509' registered Feb 9 06:43:01.566100 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 06:43:01.566107 kernel: io scheduler mq-deadline registered Feb 9 06:43:01.566112 kernel: io scheduler kyber registered Feb 9 06:43:01.566117 kernel: io scheduler bfq registered Feb 9 06:43:01.566157 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Feb 9 06:43:01.566199 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Feb 9 06:43:01.566239 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Feb 9 06:43:01.566279 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Feb 9 06:43:01.566320 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Feb 9 06:43:01.566362 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Feb 9 06:43:01.566403 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Feb 9 06:43:01.566451 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 06:43:01.566483 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 06:43:01.566489 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 06:43:01.566494 kernel: pstore: Registered erst as persistent store backend Feb 9 06:43:01.566499 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 06:43:01.566504 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 06:43:01.566531 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 06:43:01.566536 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 06:43:01.566578 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 06:43:01.566586 kernel: i8042: PNP: No PS/2 controller found. Feb 9 06:43:01.566622 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 06:43:01.566660 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 06:43:01.566697 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T06:43:00 UTC (1707460980) Feb 9 06:43:01.566734 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 06:43:01.566742 kernel: fail to initialize ptp_kvm Feb 9 06:43:01.566747 kernel: intel_pstate: Intel P-state driver initializing Feb 9 06:43:01.566753 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 06:43:01.566758 kernel: intel_pstate: HWP enabled Feb 9 06:43:01.566763 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 06:43:01.566768 kernel: vesafb: scrolling: redraw Feb 9 06:43:01.566773 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 06:43:01.566778 kernel: vesafb: framebuffer at 0x7d000000, mapped to 0x00000000688d174d, using 768k, total 768k Feb 9 06:43:01.566784 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 06:43:01.566790 kernel: fb0: VESA VGA frame buffer device Feb 9 06:43:01.566795 kernel: NET: Registered PF_INET6 protocol family Feb 9 06:43:01.566800 kernel: Segment Routing with IPv6 Feb 9 06:43:01.566805 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 06:43:01.566810 kernel: NET: Registered PF_PACKET protocol family Feb 9 06:43:01.566815 kernel: Key type dns_resolver registered Feb 9 06:43:01.566820 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 06:43:01.566825 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 06:43:01.566830 kernel: IPI shorthand broadcast: enabled Feb 9 06:43:01.566836 kernel: sched_clock: Marking stable (1837761144, 1353739324)->(4615750458, -1424249990) Feb 9 06:43:01.566842 kernel: registered taskstats version 1 Feb 9 06:43:01.566847 kernel: Loading compiled-in X.509 certificates Feb 9 06:43:01.566852 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 06:43:01.566857 kernel: Key type .fscrypt registered Feb 9 06:43:01.566863 kernel: Key type fscrypt-provisioning registered Feb 9 06:43:01.566868 kernel: pstore: Using crash dump compression: deflate Feb 9 06:43:01.566873 kernel: ima: Allocated hash algorithm: sha1 Feb 9 06:43:01.566879 kernel: ima: No architecture policies found Feb 9 06:43:01.566884 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 06:43:01.566889 kernel: Write protecting the kernel read-only data: 28672k Feb 9 06:43:01.566894 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 06:43:01.566900 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 06:43:01.566905 kernel: Run /init as init process Feb 9 06:43:01.566910 kernel: with arguments: Feb 9 06:43:01.566915 kernel: /init Feb 9 06:43:01.566920 kernel: with environment: Feb 9 06:43:01.566926 kernel: HOME=/ Feb 9 06:43:01.566931 kernel: TERM=linux Feb 9 06:43:01.566936 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 06:43:01.566942 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 06:43:01.566949 systemd[1]: Detected architecture x86-64. Feb 9 06:43:01.566954 systemd[1]: Running in initrd. Feb 9 06:43:01.566960 systemd[1]: No hostname configured, using default hostname. Feb 9 06:43:01.566965 systemd[1]: Hostname set to . Feb 9 06:43:01.566971 systemd[1]: Initializing machine ID from random generator. Feb 9 06:43:01.566976 systemd[1]: Queued start job for default target initrd.target. Feb 9 06:43:01.566982 systemd[1]: Started systemd-ask-password-console.path. Feb 9 06:43:01.566987 systemd[1]: Reached target cryptsetup.target. Feb 9 06:43:01.566992 systemd[1]: Reached target paths.target. Feb 9 06:43:01.566997 systemd[1]: Reached target slices.target. Feb 9 06:43:01.567003 systemd[1]: Reached target swap.target. Feb 9 06:43:01.567008 systemd[1]: Reached target timers.target. Feb 9 06:43:01.567014 systemd[1]: Listening on iscsid.socket. Feb 9 06:43:01.567020 systemd[1]: Listening on iscsiuio.socket. Feb 9 06:43:01.567025 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 06:43:01.567030 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 06:43:01.567036 systemd[1]: Listening on systemd-journald.socket. Feb 9 06:43:01.567041 systemd[1]: Listening on systemd-networkd.socket. Feb 9 06:43:01.567046 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 06:43:01.567052 kernel: tsc: Refined TSC clocksource calibration: 3408.014 MHz Feb 9 06:43:01.567058 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fe15a465, max_idle_ns: 440795368898 ns Feb 9 06:43:01.567063 kernel: clocksource: Switched to clocksource tsc Feb 9 06:43:01.567068 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 06:43:01.567074 systemd[1]: Reached target sockets.target. Feb 9 06:43:01.567079 systemd[1]: Starting kmod-static-nodes.service... Feb 9 06:43:01.567085 systemd[1]: Finished network-cleanup.service. Feb 9 06:43:01.567090 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 06:43:01.567095 systemd[1]: Starting systemd-journald.service... Feb 9 06:43:01.567101 systemd[1]: Starting systemd-modules-load.service... Feb 9 06:43:01.567109 systemd-journald[268]: Journal started Feb 9 06:43:01.567133 systemd-journald[268]: Runtime Journal (/run/log/journal/787eb04e2d054e7392887e1244a73341) is 8.0M, max 636.8M, 628.8M free. Feb 9 06:43:01.569082 systemd-modules-load[269]: Inserted module 'overlay' Feb 9 06:43:01.576000 audit: BPF prog-id=6 op=LOAD Feb 9 06:43:01.594503 kernel: audit: type=1334 audit(1707460981.576:2): prog-id=6 op=LOAD Feb 9 06:43:01.594518 systemd[1]: Starting systemd-resolved.service... Feb 9 06:43:01.642494 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 06:43:01.642509 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 06:43:01.674481 kernel: Bridge firewalling registered Feb 9 06:43:01.674498 systemd[1]: Started systemd-journald.service. Feb 9 06:43:01.688480 systemd-modules-load[269]: Inserted module 'br_netfilter' Feb 9 06:43:01.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:01.694494 systemd-resolved[271]: Positive Trust Anchors: Feb 9 06:43:01.812120 kernel: audit: type=1130 audit(1707460981.696:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:01.812134 kernel: SCSI subsystem initialized Feb 9 06:43:01.812144 kernel: audit: type=1130 audit(1707460981.749:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:01.812151 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 06:43:01.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:01.694499 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 06:43:01.912364 kernel: device-mapper: uevent: version 1.0.3 Feb 9 06:43:01.912399 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 06:43:01.912408 kernel: audit: type=1130 audit(1707460981.869:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:01.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:01.694518 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 06:43:02.010655 kernel: audit: type=1130 audit(1707460981.921:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:01.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:01.696024 systemd-resolved[271]: Defaulting to hostname 'linux'. Feb 9 06:43:02.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:01.696664 systemd[1]: Started systemd-resolved.service. Feb 9 06:43:02.125704 kernel: audit: type=1130 audit(1707460982.019:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:02.125722 kernel: audit: type=1130 audit(1707460982.072:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:02.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:01.749615 systemd[1]: Finished kmod-static-nodes.service. Feb 9 06:43:01.869625 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 06:43:01.912965 systemd-modules-load[269]: Inserted module 'dm_multipath' Feb 9 06:43:01.921739 systemd[1]: Finished systemd-modules-load.service. Feb 9 06:43:02.019813 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 06:43:02.072737 systemd[1]: Reached target nss-lookup.target. Feb 9 06:43:02.135125 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 06:43:02.142104 systemd[1]: Starting systemd-sysctl.service... Feb 9 06:43:02.155086 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 06:43:02.155776 systemd[1]: Finished systemd-sysctl.service. Feb 9 06:43:02.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:02.157712 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 06:43:02.275710 kernel: audit: type=1130 audit(1707460982.155:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:02.275730 kernel: audit: type=1130 audit(1707460982.217:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:02.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:02.217773 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 06:43:02.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:02.285210 systemd[1]: Starting dracut-cmdline.service... Feb 9 06:43:02.304553 dracut-cmdline[293]: dracut-dracut-053 Feb 9 06:43:02.304553 dracut-cmdline[293]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 06:43:02.304553 dracut-cmdline[293]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 06:43:02.376540 kernel: Loading iSCSI transport class v2.0-870. Feb 9 06:43:02.376557 kernel: iscsi: registered transport (tcp) Feb 9 06:43:02.429222 kernel: iscsi: registered transport (qla4xxx) Feb 9 06:43:02.429239 kernel: QLogic iSCSI HBA Driver Feb 9 06:43:02.445396 systemd[1]: Finished dracut-cmdline.service. Feb 9 06:43:02.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:02.445954 systemd[1]: Starting dracut-pre-udev.service... Feb 9 06:43:02.501526 kernel: raid6: avx2x4 gen() 48905 MB/s Feb 9 06:43:02.536482 kernel: raid6: avx2x4 xor() 21432 MB/s Feb 9 06:43:02.571526 kernel: raid6: avx2x2 gen() 53809 MB/s Feb 9 06:43:02.606526 kernel: raid6: avx2x2 xor() 32137 MB/s Feb 9 06:43:02.641526 kernel: raid6: avx2x1 gen() 45281 MB/s Feb 9 06:43:02.676487 kernel: raid6: avx2x1 xor() 27939 MB/s Feb 9 06:43:02.711475 kernel: raid6: sse2x4 gen() 21344 MB/s Feb 9 06:43:02.744527 kernel: raid6: sse2x4 xor() 11978 MB/s Feb 9 06:43:02.778478 kernel: raid6: sse2x2 gen() 21692 MB/s Feb 9 06:43:02.812479 kernel: raid6: sse2x2 xor() 13450 MB/s Feb 9 06:43:02.846479 kernel: raid6: sse2x1 gen() 18310 MB/s Feb 9 06:43:02.898198 kernel: raid6: sse2x1 xor() 8926 MB/s Feb 9 06:43:02.898214 kernel: raid6: using algorithm avx2x2 gen() 53809 MB/s Feb 9 06:43:02.898221 kernel: raid6: .... xor() 32137 MB/s, rmw enabled Feb 9 06:43:02.916317 kernel: raid6: using avx2x2 recovery algorithm Feb 9 06:43:02.962477 kernel: xor: automatically using best checksumming function avx Feb 9 06:43:03.040482 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 06:43:03.045906 systemd[1]: Finished dracut-pre-udev.service. Feb 9 06:43:03.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:03.054000 audit: BPF prog-id=7 op=LOAD Feb 9 06:43:03.054000 audit: BPF prog-id=8 op=LOAD Feb 9 06:43:03.055382 systemd[1]: Starting systemd-udevd.service... Feb 9 06:43:03.063322 systemd-udevd[473]: Using default interface naming scheme 'v252'. Feb 9 06:43:03.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:03.069665 systemd[1]: Started systemd-udevd.service. Feb 9 06:43:03.108568 dracut-pre-trigger[486]: rd.md=0: removing MD RAID activation Feb 9 06:43:03.085145 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 06:43:03.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:03.111653 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 06:43:03.127491 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 06:43:03.177097 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 06:43:03.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:03.206461 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 06:43:03.208454 kernel: libata version 3.00 loaded. Feb 9 06:43:03.208482 kernel: ACPI: bus type USB registered Feb 9 06:43:03.243267 kernel: usbcore: registered new interface driver usbfs Feb 9 06:43:03.243324 kernel: usbcore: registered new interface driver hub Feb 9 06:43:03.278459 kernel: usbcore: registered new device driver usb Feb 9 06:43:03.311687 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 06:43:03.311717 kernel: AES CTR mode by8 optimization enabled Feb 9 06:43:03.312448 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 06:43:03.312470 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 06:43:03.329449 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 06:43:03.346223 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Feb 9 06:43:03.385821 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 06:43:03.386514 kernel: pps pps0: new PPS source ptp0 Feb 9 06:43:03.386601 kernel: mlx5_core 0000:02:00.0: firmware version: 14.28.2006 Feb 9 06:43:03.410460 kernel: igb 0000:04:00.0: added PHC on eth0 Feb 9 06:43:03.410722 kernel: scsi host0: ahci Feb 9 06:43:03.410966 kernel: scsi host1: ahci Feb 9 06:43:03.411190 kernel: scsi host2: ahci Feb 9 06:43:03.411430 kernel: scsi host3: ahci Feb 9 06:43:03.411678 kernel: scsi host4: ahci Feb 9 06:43:03.411914 kernel: scsi host5: ahci Feb 9 06:43:03.412151 kernel: scsi host6: ahci Feb 9 06:43:03.412375 kernel: scsi host7: ahci Feb 9 06:43:03.412616 kernel: ata1: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516100 irq 129 Feb 9 06:43:03.412632 kernel: ata2: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516180 irq 129 Feb 9 06:43:03.412656 kernel: ata3: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516200 irq 129 Feb 9 06:43:03.412673 kernel: ata4: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516280 irq 129 Feb 9 06:43:03.412691 kernel: ata5: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516300 irq 129 Feb 9 06:43:03.412703 kernel: ata6: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516380 irq 129 Feb 9 06:43:03.412723 kernel: ata7: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516400 irq 129 Feb 9 06:43:03.412742 kernel: ata8: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516480 irq 129 Feb 9 06:43:03.432935 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 06:43:03.433021 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 06:43:03.673368 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:07:66 Feb 9 06:43:03.673461 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Feb 9 06:43:03.684328 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 06:43:03.722448 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 06:43:03.722532 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 06:43:03.735447 kernel: pps pps1: new PPS source ptp2 Feb 9 06:43:03.735527 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 06:43:03.738447 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 06:43:03.757215 kernel: igb 0000:05:00.0: added PHC on eth1 Feb 9 06:43:03.757289 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 06:43:03.784298 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 06:43:03.784367 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 06:43:03.811408 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:07:67 Feb 9 06:43:03.811478 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 06:43:03.839492 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Feb 9 06:43:03.839564 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 06:43:03.865057 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 06:43:03.865128 kernel: ata8: SATA link down (SStatus 0 SControl 300) Feb 9 06:43:03.907498 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 06:43:03.922509 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 06:43:03.936448 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 06:43:03.959494 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 06:43:03.974449 kernel: mlx5_core 0000:02:00.1: firmware version: 14.28.2006 Feb 9 06:43:04.004652 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 06:43:04.004670 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 06:43:04.004736 kernel: ata1.00: Features: NCQ-prio Feb 9 06:43:04.022491 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 06:43:04.062792 kernel: ata2.00: Features: NCQ-prio Feb 9 06:43:04.079521 kernel: ata1.00: configured for UDMA/133 Feb 9 06:43:04.079536 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 06:43:04.096505 kernel: ata2.00: configured for UDMA/133 Feb 9 06:43:04.109515 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 06:43:04.158357 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 06:43:04.158463 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Feb 9 06:43:04.158530 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 06:43:04.211657 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 06:43:04.211730 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 06:43:04.211784 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 06:43:04.229261 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 06:43:04.261026 kernel: hub 1-0:1.0: USB hub found Feb 9 06:43:04.261126 kernel: hub 1-0:1.0: 16 ports detected Feb 9 06:43:04.290833 kernel: hub 2-0:1.0: USB hub found Feb 9 06:43:04.290914 kernel: hub 2-0:1.0: 10 ports detected Feb 9 06:43:04.305682 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 06:43:04.325983 kernel: usb: port power management may be unreliable Feb 9 06:43:04.326448 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 06:43:04.329519 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Feb 9 06:43:04.409119 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 06:43:04.409200 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 06:43:04.409209 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 06:43:04.409265 kernel: port_module: 9 callbacks suppressed Feb 9 06:43:04.409273 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Feb 9 06:43:04.440996 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 06:43:04.441069 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 06:43:04.474941 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 06:43:04.475016 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 06:43:04.475073 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 9 06:43:04.494493 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 06:43:04.529826 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 06:43:04.529855 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 9 06:43:04.529922 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 06:43:04.530508 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 06:43:04.629240 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 06:43:04.629315 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 06:43:04.644985 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 06:43:04.679901 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 06:43:04.679917 kernel: GPT:9289727 != 937703087 Feb 9 06:43:04.679924 kernel: hub 1-14:1.0: USB hub found Feb 9 06:43:04.679999 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 06:43:04.725434 kernel: hub 1-14:1.0: 4 ports detected Feb 9 06:43:04.725515 kernel: GPT:9289727 != 937703087 Feb 9 06:43:04.754468 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 06:43:04.754483 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 06:43:04.784582 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 06:43:04.784598 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 9 06:43:04.818481 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 06:43:04.826344 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 06:43:04.857636 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (540) Feb 9 06:43:04.844563 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 06:43:04.872744 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 06:43:04.883973 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 06:43:04.917632 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 06:43:04.926462 systemd[1]: Starting disk-uuid.service... Feb 9 06:43:04.977531 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 06:43:04.977545 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 06:43:04.977554 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 06:43:04.977606 disk-uuid[692]: Primary Header is updated. Feb 9 06:43:04.977606 disk-uuid[692]: Secondary Entries is updated. Feb 9 06:43:04.977606 disk-uuid[692]: Secondary Header is updated. Feb 9 06:43:05.065587 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 06:43:05.065597 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 06:43:05.065666 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 06:43:05.065676 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 06:43:05.065691 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 06:43:05.091530 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Feb 9 06:43:05.115453 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Feb 9 06:43:05.158452 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 06:43:05.190635 kernel: usbcore: registered new interface driver usbhid Feb 9 06:43:05.190667 kernel: usbhid: USB HID core driver Feb 9 06:43:05.225635 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 06:43:05.310492 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 06:43:05.310611 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 06:43:05.380555 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 06:43:06.018250 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 06:43:06.038294 disk-uuid[693]: The operation has completed successfully. Feb 9 06:43:06.047567 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 06:43:06.076105 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 06:43:06.175886 kernel: audit: type=1130 audit(1707460986.084:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.175901 kernel: audit: type=1131 audit(1707460986.084:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.076154 systemd[1]: Finished disk-uuid.service. Feb 9 06:43:06.210639 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 06:43:06.087913 systemd[1]: Starting verity-setup.service... Feb 9 06:43:06.240744 systemd[1]: Found device dev-mapper-usr.device. Feb 9 06:43:06.250425 systemd[1]: Mounting sysusr-usr.mount... Feb 9 06:43:06.264634 systemd[1]: Finished verity-setup.service. Feb 9 06:43:06.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.321449 kernel: audit: type=1130 audit(1707460986.272:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.349387 systemd[1]: Mounted sysusr-usr.mount. Feb 9 06:43:06.364546 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 06:43:06.357720 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 06:43:06.358119 systemd[1]: Starting ignition-setup.service... Feb 9 06:43:06.458496 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 06:43:06.458513 kernel: BTRFS info (device sdb6): using free space tree Feb 9 06:43:06.458520 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 06:43:06.458527 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 06:43:06.364948 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 06:43:06.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.442696 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 06:43:06.572533 kernel: audit: type=1130 audit(1707460986.466:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.572555 kernel: audit: type=1130 audit(1707460986.523:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.466994 systemd[1]: Finished ignition-setup.service. Feb 9 06:43:06.604609 kernel: audit: type=1334 audit(1707460986.581:24): prog-id=9 op=LOAD Feb 9 06:43:06.581000 audit: BPF prog-id=9 op=LOAD Feb 9 06:43:06.524116 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 06:43:06.582333 systemd[1]: Starting systemd-networkd.service... Feb 9 06:43:06.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.665380 ignition[871]: Ignition 2.14.0 Feb 9 06:43:06.690567 kernel: audit: type=1130 audit(1707460986.627:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.618428 systemd-networkd[878]: lo: Link UP Feb 9 06:43:06.665384 ignition[871]: Stage: fetch-offline Feb 9 06:43:06.618431 systemd-networkd[878]: lo: Gained carrier Feb 9 06:43:06.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.665411 ignition[871]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 06:43:06.849209 kernel: audit: type=1130 audit(1707460986.715:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.849301 kernel: audit: type=1130 audit(1707460986.774:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.849309 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 06:43:06.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.618721 systemd-networkd[878]: Enumeration completed Feb 9 06:43:06.874395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Feb 9 06:43:06.665425 ignition[871]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 06:43:06.618759 systemd[1]: Started systemd-networkd.service. Feb 9 06:43:06.673674 ignition[871]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 06:43:06.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.619429 systemd-networkd[878]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 06:43:06.673739 ignition[871]: parsed url from cmdline: "" Feb 9 06:43:06.927587 iscsid[909]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 06:43:06.927587 iscsid[909]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 06:43:06.927587 iscsid[909]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 06:43:06.927587 iscsid[909]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 06:43:06.927587 iscsid[909]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 06:43:06.927587 iscsid[909]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 06:43:06.927587 iscsid[909]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 06:43:07.099577 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 9 06:43:06.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:07.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:06.627572 systemd[1]: Reached target network.target. Feb 9 06:43:06.673741 ignition[871]: no config URL provided Feb 9 06:43:06.685958 systemd[1]: Starting iscsiuio.service... Feb 9 06:43:06.673743 ignition[871]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 06:43:06.694387 unknown[871]: fetched base config from "system" Feb 9 06:43:06.673773 ignition[871]: parsing config with SHA512: cf6c4f02280bd18f28d60c8e4ca5e1d6020455c629e83145a1e80bf67918dcfe707eea37d60fe2d6e36bd8af7f86292c57ab0b8ee396866c04b922a52775b261 Feb 9 06:43:06.694391 unknown[871]: fetched user config from "system" Feb 9 06:43:06.694749 ignition[871]: fetch-offline: fetch-offline passed Feb 9 06:43:06.697761 systemd[1]: Started iscsiuio.service. Feb 9 06:43:06.694752 ignition[871]: POST message to Packet Timeline Feb 9 06:43:06.715758 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 06:43:06.694756 ignition[871]: POST Status error: resource requires networking Feb 9 06:43:06.774711 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 06:43:06.694786 ignition[871]: Ignition finished successfully Feb 9 06:43:06.775144 systemd[1]: Starting ignition-kargs.service... Feb 9 06:43:06.853521 ignition[898]: Ignition 2.14.0 Feb 9 06:43:06.850605 systemd-networkd[878]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 06:43:06.853524 ignition[898]: Stage: kargs Feb 9 06:43:06.864102 systemd[1]: Starting iscsid.service... Feb 9 06:43:06.853578 ignition[898]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 06:43:06.885736 systemd[1]: Started iscsid.service. Feb 9 06:43:06.853587 ignition[898]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 06:43:06.892993 systemd[1]: Starting dracut-initqueue.service... Feb 9 06:43:06.854898 ignition[898]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 06:43:06.915627 systemd[1]: Finished dracut-initqueue.service. Feb 9 06:43:06.856315 ignition[898]: kargs: kargs passed Feb 9 06:43:06.936518 systemd[1]: Reached target remote-fs-pre.target. Feb 9 06:43:06.856319 ignition[898]: POST message to Packet Timeline Feb 9 06:43:06.980591 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 06:43:06.856329 ignition[898]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 06:43:07.017888 systemd[1]: Reached target remote-fs.target. Feb 9 06:43:06.858995 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:44717->[::1]:53: read: connection refused Feb 9 06:43:07.027246 systemd[1]: Starting dracut-pre-mount.service... Feb 9 06:43:07.064038 ignition[898]: GET https://metadata.packet.net/metadata: attempt #2 Feb 9 06:43:07.064206 systemd[1]: Finished dracut-pre-mount.service. Feb 9 06:43:07.064370 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:47286->[::1]:53: read: connection refused Feb 9 06:43:07.065267 systemd-networkd[878]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 06:43:07.093704 systemd-networkd[878]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 06:43:07.121977 systemd-networkd[878]: enp2s0f1np1: Link UP Feb 9 06:43:07.122149 systemd-networkd[878]: enp2s0f1np1: Gained carrier Feb 9 06:43:07.142936 systemd-networkd[878]: enp2s0f0np0: Link UP Feb 9 06:43:07.143297 systemd-networkd[878]: eno2: Link UP Feb 9 06:43:07.143646 systemd-networkd[878]: eno1: Link UP Feb 9 06:43:07.465193 ignition[898]: GET https://metadata.packet.net/metadata: attempt #3 Feb 9 06:43:07.466415 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:58387->[::1]:53: read: connection refused Feb 9 06:43:07.899275 systemd-networkd[878]: enp2s0f0np0: Gained carrier Feb 9 06:43:07.907664 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Feb 9 06:43:07.935658 systemd-networkd[878]: enp2s0f0np0: DHCPv4 address 86.109.11.101/31, gateway 86.109.11.100 acquired from 145.40.83.140 Feb 9 06:43:08.266846 ignition[898]: GET https://metadata.packet.net/metadata: attempt #4 Feb 9 06:43:08.268101 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:58584->[::1]:53: read: connection refused Feb 9 06:43:08.451944 systemd-networkd[878]: enp2s0f1np1: Gained IPv6LL Feb 9 06:43:09.667923 systemd-networkd[878]: enp2s0f0np0: Gained IPv6LL Feb 9 06:43:09.869765 ignition[898]: GET https://metadata.packet.net/metadata: attempt #5 Feb 9 06:43:09.871019 ignition[898]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:42854->[::1]:53: read: connection refused Feb 9 06:43:13.074369 ignition[898]: GET https://metadata.packet.net/metadata: attempt #6 Feb 9 06:43:13.110803 ignition[898]: GET result: OK Feb 9 06:43:13.334069 ignition[898]: Ignition finished successfully Feb 9 06:43:13.336406 systemd[1]: Finished ignition-kargs.service. Feb 9 06:43:13.426082 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 06:43:13.426098 kernel: audit: type=1130 audit(1707460993.349:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:13.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:13.358388 ignition[926]: Ignition 2.14.0 Feb 9 06:43:13.351706 systemd[1]: Starting ignition-disks.service... Feb 9 06:43:13.358392 ignition[926]: Stage: disks Feb 9 06:43:13.358501 ignition[926]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 06:43:13.358530 ignition[926]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 06:43:13.360951 ignition[926]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 06:43:13.361654 ignition[926]: disks: disks passed Feb 9 06:43:13.361657 ignition[926]: POST message to Packet Timeline Feb 9 06:43:13.361667 ignition[926]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 06:43:13.388089 ignition[926]: GET result: OK Feb 9 06:43:13.597600 ignition[926]: Ignition finished successfully Feb 9 06:43:13.600551 systemd[1]: Finished ignition-disks.service. Feb 9 06:43:13.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:13.612987 systemd[1]: Reached target initrd-root-device.target. Feb 9 06:43:13.691687 kernel: audit: type=1130 audit(1707460993.612:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:13.677649 systemd[1]: Reached target local-fs-pre.target. Feb 9 06:43:13.677683 systemd[1]: Reached target local-fs.target. Feb 9 06:43:13.700648 systemd[1]: Reached target sysinit.target. Feb 9 06:43:13.714608 systemd[1]: Reached target basic.target. Feb 9 06:43:13.715241 systemd[1]: Starting systemd-fsck-root.service... Feb 9 06:43:13.741111 systemd-fsck[941]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 06:43:13.760666 systemd[1]: Finished systemd-fsck-root.service. Feb 9 06:43:13.861231 kernel: audit: type=1130 audit(1707460993.768:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:13.861248 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 06:43:13.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:13.770283 systemd[1]: Mounting sysroot.mount... Feb 9 06:43:13.870070 systemd[1]: Mounted sysroot.mount. Feb 9 06:43:13.884726 systemd[1]: Reached target initrd-root-fs.target. Feb 9 06:43:13.893338 systemd[1]: Mounting sysroot-usr.mount... Feb 9 06:43:13.918549 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 06:43:13.927064 systemd[1]: Starting flatcar-static-network.service... Feb 9 06:43:13.942586 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 06:43:13.942630 systemd[1]: Reached target ignition-diskful.target. Feb 9 06:43:13.961236 systemd[1]: Mounted sysroot-usr.mount. Feb 9 06:43:14.034682 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (952) Feb 9 06:43:14.034703 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 06:43:13.984773 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 06:43:14.132699 kernel: BTRFS info (device sdb6): using free space tree Feb 9 06:43:14.132715 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 06:43:14.132723 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 06:43:14.132771 coreos-metadata[948]: Feb 09 06:43:14.037 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 06:43:14.132771 coreos-metadata[948]: Feb 09 06:43:14.073 INFO Fetch successful Feb 9 06:43:14.132771 coreos-metadata[948]: Feb 09 06:43:14.090 INFO wrote hostname ci-3510.3.2-a-4a81ef77ce to /sysroot/etc/hostname Feb 9 06:43:14.339692 kernel: audit: type=1130 audit(1707460994.141:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:14.339711 kernel: audit: type=1130 audit(1707460994.205:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:14.339719 kernel: audit: type=1131 audit(1707460994.205:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:14.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:14.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:14.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:13.995822 systemd[1]: Starting initrd-setup-root.service... Feb 9 06:43:14.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:14.407336 coreos-metadata[949]: Feb 09 06:43:14.038 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 06:43:14.407336 coreos-metadata[949]: Feb 09 06:43:14.067 INFO Fetch successful Feb 9 06:43:14.426595 kernel: audit: type=1130 audit(1707460994.349:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:14.426650 initrd-setup-root[959]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 06:43:14.123595 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 06:43:14.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:14.489632 initrd-setup-root[967]: cut: /sysroot/etc/group: No such file or directory Feb 9 06:43:14.526640 kernel: audit: type=1130 audit(1707460994.460:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:14.142758 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 9 06:43:14.536778 initrd-setup-root[975]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 06:43:14.142798 systemd[1]: Finished flatcar-static-network.service. Feb 9 06:43:14.554681 initrd-setup-root[983]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 06:43:14.205715 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 06:43:14.572718 ignition[1024]: INFO : Ignition 2.14.0 Feb 9 06:43:14.572718 ignition[1024]: INFO : Stage: mount Feb 9 06:43:14.572718 ignition[1024]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 06:43:14.572718 ignition[1024]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 06:43:14.572718 ignition[1024]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 06:43:14.572718 ignition[1024]: INFO : mount: mount passed Feb 9 06:43:14.572718 ignition[1024]: INFO : POST message to Packet Timeline Feb 9 06:43:14.572718 ignition[1024]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 06:43:14.572718 ignition[1024]: INFO : GET result: OK Feb 9 06:43:14.325706 systemd[1]: Finished initrd-setup-root.service. Feb 9 06:43:14.729520 kernel: audit: type=1130 audit(1707460994.670:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:14.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:14.729583 ignition[1024]: INFO : Ignition finished successfully Feb 9 06:43:14.350191 systemd[1]: Starting ignition-mount.service... Feb 9 06:43:14.791491 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1038) Feb 9 06:43:14.791503 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 06:43:14.415007 systemd[1]: Starting sysroot-boot.service... Feb 9 06:43:14.836529 kernel: BTRFS info (device sdb6): using free space tree Feb 9 06:43:14.836540 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 06:43:14.836547 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 06:43:14.441332 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 06:43:14.441370 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 06:43:14.441940 systemd[1]: Finished sysroot-boot.service. Feb 9 06:43:14.658965 systemd[1]: Finished ignition-mount.service. Feb 9 06:43:14.672526 systemd[1]: Starting ignition-files.service... Feb 9 06:43:14.916658 ignition[1057]: INFO : Ignition 2.14.0 Feb 9 06:43:14.916658 ignition[1057]: INFO : Stage: files Feb 9 06:43:14.916658 ignition[1057]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 06:43:14.916658 ignition[1057]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 06:43:14.916658 ignition[1057]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 06:43:14.916658 ignition[1057]: DEBUG : files: compiled without relabeling support, skipping Feb 9 06:43:14.916658 ignition[1057]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 06:43:14.916658 ignition[1057]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 06:43:14.916658 ignition[1057]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 06:43:14.916658 ignition[1057]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 06:43:14.916658 ignition[1057]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 06:43:14.916658 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 06:43:14.916658 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 06:43:14.738319 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 06:43:15.086620 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 06:43:14.872175 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 06:43:14.907888 unknown[1057]: wrote ssh authorized keys file for user: core Feb 9 06:43:15.121191 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 06:43:15.137663 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 06:43:15.137663 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 06:43:15.673854 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 06:43:15.767522 ignition[1057]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 06:43:15.791669 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 06:43:15.791669 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 06:43:15.791669 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 06:43:16.144699 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 06:43:16.235028 ignition[1057]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 06:43:16.259686 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 06:43:16.259686 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 06:43:16.259686 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 9 06:43:16.472716 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 06:43:16.722475 ignition[1057]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 9 06:43:16.722475 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 06:43:16.763719 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 06:43:16.763719 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 9 06:43:16.795664 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 06:43:17.266511 ignition[1057]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 9 06:43:17.266511 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 06:43:17.307658 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 06:43:17.307658 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Feb 9 06:43:17.340522 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 06:43:17.639228 ignition[1057]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 06:43:17.663673 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 06:43:17.931769 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1075) Feb 9 06:43:17.708654 systemd[1]: mnt-oem3270422062.mount: Deactivated successfully. Feb 9 06:43:17.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:17.999190 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3270422062" Feb 9 06:43:17.999190 ignition[1057]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3270422062": device or resource busy Feb 9 06:43:17.999190 ignition[1057]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3270422062", trying btrfs: device or resource busy Feb 9 06:43:17.999190 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3270422062" Feb 9 06:43:17.999190 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3270422062" Feb 9 06:43:17.999190 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem3270422062" Feb 9 06:43:17.999190 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem3270422062" Feb 9 06:43:17.999190 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 06:43:17.999190 ignition[1057]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 06:43:17.999190 ignition[1057]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 06:43:17.999190 ignition[1057]: INFO : files: op(14): [started] processing unit "packet-phone-home.service" Feb 9 06:43:17.999190 ignition[1057]: INFO : files: op(14): [finished] processing unit "packet-phone-home.service" Feb 9 06:43:17.999190 ignition[1057]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Feb 9 06:43:17.999190 ignition[1057]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 06:43:17.999190 ignition[1057]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 06:43:17.999190 ignition[1057]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Feb 9 06:43:17.999190 ignition[1057]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Feb 9 06:43:18.378733 kernel: audit: type=1130 audit(1707460997.940:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:17.925324 systemd[1]: Finished ignition-files.service. Feb 9 06:43:18.468232 kernel: kauditd_printk_skb: 6 callbacks suppressed Feb 9 06:43:18.468248 kernel: audit: type=1131 audit(1707460998.387:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(1b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(1b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(1c): [started] setting preset to enabled for "packet-phone-home.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(1c): [finished] setting preset to enabled for "packet-phone-home.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(1d): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(1d): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-critools.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-helm.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: createResultFile: createFiles: op(20): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: createResultFile: createFiles: op(20): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 06:43:18.468297 ignition[1057]: INFO : files: files passed Feb 9 06:43:19.035823 kernel: audit: type=1131 audit(1707460998.723:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.035906 kernel: audit: type=1131 audit(1707460998.811:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.035947 kernel: audit: type=1131 audit(1707460998.878:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:17.946386 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 06:43:19.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.111840 ignition[1057]: INFO : POST message to Packet Timeline Feb 9 06:43:19.111840 ignition[1057]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 06:43:19.111840 ignition[1057]: INFO : GET result: OK Feb 9 06:43:19.111840 ignition[1057]: INFO : Ignition finished successfully Feb 9 06:43:19.276600 kernel: audit: type=1131 audit(1707460999.045:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.276620 kernel: audit: type=1131 audit(1707460999.120:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.276629 kernel: audit: type=1131 audit(1707460999.187:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.007698 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 06:43:19.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.345169 initrd-setup-root-after-ignition[1090]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 06:43:19.366695 kernel: audit: type=1131 audit(1707460999.284:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.008017 systemd[1]: Starting ignition-quench.service... Feb 9 06:43:19.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.049866 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 06:43:19.505008 kernel: audit: type=1131 audit(1707460999.375:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.505020 kernel: audit: type=1131 audit(1707460999.444:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.082066 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 06:43:19.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.082211 systemd[1]: Finished ignition-quench.service. Feb 9 06:43:19.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.108028 systemd[1]: Reached target ignition-complete.target. Feb 9 06:43:19.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.135579 systemd[1]: Starting initrd-parse-etc.service... Feb 9 06:43:18.162223 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 06:43:19.584839 ignition[1105]: INFO : Ignition 2.14.0 Feb 9 06:43:19.584839 ignition[1105]: INFO : Stage: umount Feb 9 06:43:19.584839 ignition[1105]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 06:43:19.584839 ignition[1105]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 06:43:19.584839 ignition[1105]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 06:43:19.584839 ignition[1105]: INFO : umount: umount passed Feb 9 06:43:19.584839 ignition[1105]: INFO : POST message to Packet Timeline Feb 9 06:43:19.584839 ignition[1105]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 06:43:19.584839 ignition[1105]: INFO : GET result: OK Feb 9 06:43:19.584839 ignition[1105]: INFO : Ignition finished successfully Feb 9 06:43:19.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.162284 systemd[1]: Finished initrd-parse-etc.service. Feb 9 06:43:19.768000 audit: BPF prog-id=6 op=UNLOAD Feb 9 06:43:18.170749 systemd[1]: Reached target initrd-fs.target. Feb 9 06:43:18.203735 systemd[1]: Reached target initrd.target. Feb 9 06:43:19.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.221911 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 06:43:19.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.224109 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 06:43:19.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.257292 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 06:43:18.275340 systemd[1]: Starting initrd-cleanup.service... Feb 9 06:43:19.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.307669 systemd[1]: Stopped target nss-lookup.target. Feb 9 06:43:18.319920 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 06:43:18.348226 systemd[1]: Stopped target timers.target. Feb 9 06:43:19.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.368033 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 06:43:19.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.368398 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 06:43:19.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.388491 systemd[1]: Stopped target initrd.target. Feb 9 06:43:18.475682 systemd[1]: Stopped target basic.target. Feb 9 06:43:19.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.493809 systemd[1]: Stopped target ignition-complete.target. Feb 9 06:43:19.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:18.517823 systemd[1]: Stopped target ignition-diskful.target. Feb 9 06:43:18.536841 systemd[1]: Stopped target initrd-root-device.target. Feb 9 06:43:18.563995 systemd[1]: Stopped target remote-fs.target. Feb 9 06:43:18.590026 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 06:43:18.616202 systemd[1]: Stopped target sysinit.target. Feb 9 06:43:18.637183 systemd[1]: Stopped target local-fs.target. Feb 9 06:43:18.660050 systemd[1]: Stopped target local-fs-pre.target. Feb 9 06:43:18.683042 systemd[1]: Stopped target swap.target. Feb 9 06:43:18.702957 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 06:43:18.703327 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 06:43:18.724281 systemd[1]: Stopped target cryptsetup.target. Feb 9 06:43:18.797667 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 06:43:18.797733 systemd[1]: Stopped dracut-initqueue.service. Feb 9 06:43:18.811852 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 06:43:18.811928 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 06:43:18.878726 systemd[1]: Stopped target paths.target. Feb 9 06:43:18.942651 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 06:43:18.944666 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 06:43:18.963734 systemd[1]: Stopped target slices.target. Feb 9 06:43:18.976781 systemd[1]: Stopped target sockets.target. Feb 9 06:43:20.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:19.005722 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 06:43:19.005804 systemd[1]: Closed iscsid.socket. Feb 9 06:43:19.028985 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 06:43:19.029244 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 06:43:19.046137 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 06:43:20.240749 iscsid[909]: iscsid shutting down. Feb 9 06:43:19.046510 systemd[1]: Stopped ignition-files.service. Feb 9 06:43:19.120701 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 06:43:19.120763 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 06:43:19.188216 systemd[1]: Stopping ignition-mount.service... Feb 9 06:43:19.254685 systemd[1]: Stopping iscsiuio.service... Feb 9 06:43:19.262720 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 06:43:19.262797 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 06:43:19.285209 systemd[1]: Stopping sysroot-boot.service... Feb 9 06:43:19.352659 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 06:43:19.352731 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 06:43:19.375769 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 06:43:19.375842 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 06:43:19.446130 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 06:43:19.446486 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 06:43:19.446553 systemd[1]: Stopped iscsiuio.service. Feb 9 06:43:19.511913 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 06:43:19.511952 systemd[1]: Stopped ignition-mount.service. Feb 9 06:43:19.528845 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 06:43:19.528883 systemd[1]: Stopped sysroot-boot.service. Feb 9 06:43:19.543896 systemd[1]: Stopped target network.target. Feb 9 06:43:19.559702 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 06:43:19.559733 systemd[1]: Closed iscsiuio.socket. Feb 9 06:43:19.575638 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 06:43:19.575692 systemd[1]: Stopped ignition-disks.service. Feb 9 06:43:19.593777 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 06:43:19.593871 systemd[1]: Stopped ignition-kargs.service. Feb 9 06:43:19.602139 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 06:43:19.602271 systemd[1]: Stopped ignition-setup.service. Feb 9 06:43:19.623858 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 06:43:19.624009 systemd[1]: Stopped initrd-setup-root.service. Feb 9 06:43:19.644279 systemd[1]: Stopping systemd-networkd.service... Feb 9 06:43:19.657592 systemd-networkd[878]: enp2s0f1np1: DHCPv6 lease lost Feb 9 06:43:19.664054 systemd[1]: Stopping systemd-resolved.service... Feb 9 06:43:19.665673 systemd-networkd[878]: enp2s0f0np0: DHCPv6 lease lost Feb 9 06:43:19.682669 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 06:43:20.241455 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Feb 9 06:43:20.240000 audit: BPF prog-id=9 op=UNLOAD Feb 9 06:43:19.682891 systemd[1]: Stopped systemd-resolved.service. Feb 9 06:43:19.697073 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 06:43:19.697388 systemd[1]: Stopped systemd-networkd.service. Feb 9 06:43:19.727784 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 06:43:19.727841 systemd[1]: Finished initrd-cleanup.service. Feb 9 06:43:19.744110 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 06:43:19.744128 systemd[1]: Closed systemd-networkd.socket. Feb 9 06:43:19.761180 systemd[1]: Stopping network-cleanup.service... Feb 9 06:43:19.776602 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 06:43:19.776742 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 06:43:19.793971 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 06:43:19.794099 systemd[1]: Stopped systemd-sysctl.service. Feb 9 06:43:19.810078 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 06:43:19.810205 systemd[1]: Stopped systemd-modules-load.service. Feb 9 06:43:19.829177 systemd[1]: Stopping systemd-udevd.service... Feb 9 06:43:19.847842 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 06:43:19.849297 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 06:43:19.849627 systemd[1]: Stopped systemd-udevd.service. Feb 9 06:43:19.861100 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 06:43:19.861217 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 06:43:19.873776 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 06:43:19.873864 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 06:43:19.889679 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 06:43:19.889797 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 06:43:19.906897 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 06:43:19.907038 systemd[1]: Stopped dracut-cmdline.service. Feb 9 06:43:19.921801 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 06:43:19.921934 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 06:43:19.939584 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 06:43:19.953626 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 06:43:19.953767 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 06:43:19.970676 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 06:43:19.970885 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 06:43:20.142597 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 06:43:20.142813 systemd[1]: Stopped network-cleanup.service. Feb 9 06:43:20.158183 systemd[1]: Reached target initrd-switch-root.target. Feb 9 06:43:20.176649 systemd[1]: Starting initrd-switch-root.service... Feb 9 06:43:20.198988 systemd[1]: Switching root. Feb 9 06:43:20.242235 systemd-journald[268]: Journal stopped Feb 9 06:43:24.150543 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 06:43:24.150557 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 06:43:24.150566 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 06:43:24.150571 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 06:43:24.150576 kernel: SELinux: policy capability open_perms=1 Feb 9 06:43:24.150581 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 06:43:24.150587 kernel: SELinux: policy capability always_check_network=0 Feb 9 06:43:24.150592 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 06:43:24.150598 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 06:43:24.150604 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 06:43:24.150609 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 06:43:24.150615 systemd[1]: Successfully loaded SELinux policy in 305.271ms. Feb 9 06:43:24.150622 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.437ms. Feb 9 06:43:24.150629 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 06:43:24.150652 systemd[1]: Detected architecture x86-64. Feb 9 06:43:24.150658 systemd[1]: Detected first boot. Feb 9 06:43:24.150679 systemd[1]: Hostname set to . Feb 9 06:43:24.150685 systemd[1]: Initializing machine ID from random generator. Feb 9 06:43:24.150691 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 06:43:24.150697 systemd[1]: Populated /etc with preset unit settings. Feb 9 06:43:24.150703 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 06:43:24.150710 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 06:43:24.150717 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 06:43:24.150723 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 06:43:24.150729 systemd[1]: Stopped iscsid.service. Feb 9 06:43:24.150736 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 06:43:24.150742 systemd[1]: Stopped initrd-switch-root.service. Feb 9 06:43:24.150749 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 06:43:24.150756 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 06:43:24.150762 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 06:43:24.150768 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 06:43:24.150774 systemd[1]: Created slice system-getty.slice. Feb 9 06:43:24.150780 systemd[1]: Created slice system-modprobe.slice. Feb 9 06:43:24.150786 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 06:43:24.150792 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 06:43:24.150798 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 06:43:24.150805 systemd[1]: Created slice user.slice. Feb 9 06:43:24.150811 systemd[1]: Started systemd-ask-password-console.path. Feb 9 06:43:24.150817 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 06:43:24.150823 systemd[1]: Set up automount boot.automount. Feb 9 06:43:24.150831 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 06:43:24.150837 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 06:43:24.150860 systemd[1]: Stopped target initrd-fs.target. Feb 9 06:43:24.150867 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 06:43:24.150874 systemd[1]: Reached target integritysetup.target. Feb 9 06:43:24.150880 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 06:43:24.150903 systemd[1]: Reached target remote-fs.target. Feb 9 06:43:24.150909 systemd[1]: Reached target slices.target. Feb 9 06:43:24.150916 systemd[1]: Reached target swap.target. Feb 9 06:43:24.150922 systemd[1]: Reached target torcx.target. Feb 9 06:43:24.150928 systemd[1]: Reached target veritysetup.target. Feb 9 06:43:24.150935 systemd[1]: Listening on systemd-coredump.socket. Feb 9 06:43:24.150942 systemd[1]: Listening on systemd-initctl.socket. Feb 9 06:43:24.150949 systemd[1]: Listening on systemd-networkd.socket. Feb 9 06:43:24.150955 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 06:43:24.150961 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 06:43:24.150968 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 06:43:24.150974 systemd[1]: Mounting dev-hugepages.mount... Feb 9 06:43:24.150981 systemd[1]: Mounting dev-mqueue.mount... Feb 9 06:43:24.150988 systemd[1]: Mounting media.mount... Feb 9 06:43:24.150995 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 06:43:24.151001 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 06:43:24.151007 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 06:43:24.151014 systemd[1]: Mounting tmp.mount... Feb 9 06:43:24.151020 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 06:43:24.151026 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 06:43:24.151034 systemd[1]: Starting kmod-static-nodes.service... Feb 9 06:43:24.151040 systemd[1]: Starting modprobe@configfs.service... Feb 9 06:43:24.151047 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 06:43:24.151053 systemd[1]: Starting modprobe@drm.service... Feb 9 06:43:24.151059 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 06:43:24.151066 systemd[1]: Starting modprobe@fuse.service... Feb 9 06:43:24.151089 kernel: fuse: init (API version 7.34) Feb 9 06:43:24.151095 systemd[1]: Starting modprobe@loop.service... Feb 9 06:43:24.151101 kernel: loop: module loaded Feb 9 06:43:24.151109 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 06:43:24.151115 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 06:43:24.151136 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 06:43:24.151142 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 06:43:24.151149 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 9 06:43:24.151155 kernel: audit: type=1131 audit(1707461003.792:108): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.151161 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 06:43:24.151167 kernel: audit: type=1131 audit(1707461003.880:109): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.151174 systemd[1]: Stopped systemd-journald.service. Feb 9 06:43:24.151180 kernel: audit: type=1130 audit(1707461003.944:110): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.151186 kernel: audit: type=1131 audit(1707461003.944:111): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.151192 kernel: audit: type=1334 audit(1707461004.030:112): prog-id=18 op=LOAD Feb 9 06:43:24.151198 kernel: audit: type=1334 audit(1707461004.048:113): prog-id=19 op=LOAD Feb 9 06:43:24.151204 kernel: audit: type=1334 audit(1707461004.066:114): prog-id=20 op=LOAD Feb 9 06:43:24.151209 kernel: audit: type=1334 audit(1707461004.084:115): prog-id=16 op=UNLOAD Feb 9 06:43:24.151217 systemd[1]: Starting systemd-journald.service... Feb 9 06:43:24.151223 kernel: audit: type=1334 audit(1707461004.084:116): prog-id=17 op=UNLOAD Feb 9 06:43:24.151229 systemd[1]: Starting systemd-modules-load.service... Feb 9 06:43:24.151235 kernel: audit: type=1305 audit(1707461004.148:117): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 06:43:24.151243 systemd-journald[1258]: Journal started Feb 9 06:43:24.151269 systemd-journald[1258]: Runtime Journal (/run/log/journal/0333e3f90c9449679b4ec4208ec16d83) is 8.0M, max 636.8M, 628.8M free. Feb 9 06:43:20.602000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 06:43:20.871000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 06:43:20.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 06:43:20.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 06:43:20.874000 audit: BPF prog-id=10 op=LOAD Feb 9 06:43:20.874000 audit: BPF prog-id=10 op=UNLOAD Feb 9 06:43:20.874000 audit: BPF prog-id=11 op=LOAD Feb 9 06:43:20.874000 audit: BPF prog-id=11 op=UNLOAD Feb 9 06:43:20.941000 audit[1147]: AVC avc: denied { associate } for pid=1147 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 06:43:20.941000 audit[1147]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001258e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1130 pid=1147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:20.941000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 06:43:20.968000 audit[1147]: AVC avc: denied { associate } for pid=1147 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 06:43:20.968000 audit[1147]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001259b9 a2=1ed a3=0 items=2 ppid=1130 pid=1147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:20.968000 audit: CWD cwd="/" Feb 9 06:43:20.968000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:20.968000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:20.968000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 06:43:22.489000 audit: BPF prog-id=12 op=LOAD Feb 9 06:43:22.489000 audit: BPF prog-id=3 op=UNLOAD Feb 9 06:43:22.490000 audit: BPF prog-id=13 op=LOAD Feb 9 06:43:22.490000 audit: BPF prog-id=14 op=LOAD Feb 9 06:43:22.490000 audit: BPF prog-id=4 op=UNLOAD Feb 9 06:43:22.490000 audit: BPF prog-id=5 op=UNLOAD Feb 9 06:43:22.490000 audit: BPF prog-id=15 op=LOAD Feb 9 06:43:22.490000 audit: BPF prog-id=12 op=UNLOAD Feb 9 06:43:22.491000 audit: BPF prog-id=16 op=LOAD Feb 9 06:43:22.491000 audit: BPF prog-id=17 op=LOAD Feb 9 06:43:22.491000 audit: BPF prog-id=13 op=UNLOAD Feb 9 06:43:22.491000 audit: BPF prog-id=14 op=UNLOAD Feb 9 06:43:22.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:22.538000 audit: BPF prog-id=15 op=UNLOAD Feb 9 06:43:22.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:22.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:22.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:23.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:23.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:23.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:23.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.030000 audit: BPF prog-id=18 op=LOAD Feb 9 06:43:24.048000 audit: BPF prog-id=19 op=LOAD Feb 9 06:43:24.066000 audit: BPF prog-id=20 op=LOAD Feb 9 06:43:24.084000 audit: BPF prog-id=16 op=UNLOAD Feb 9 06:43:24.084000 audit: BPF prog-id=17 op=UNLOAD Feb 9 06:43:24.148000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 06:43:22.488649 systemd[1]: Queued start job for default target multi-user.target. Feb 9 06:43:20.940262 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 06:43:22.492093 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 06:43:20.940751 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 06:43:20.940767 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 06:43:20.940792 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 06:43:20.940800 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 06:43:20.940824 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 06:43:20.940834 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 06:43:20.940983 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 06:43:20.941015 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 06:43:20.941025 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 06:43:20.941573 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 06:43:20.941600 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 06:43:20.941615 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 06:43:20.941627 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 06:43:20.941640 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 06:43:20.941651 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 06:43:22.135052 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:22Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 06:43:22.135202 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:22Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 06:43:22.135253 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:22Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 06:43:22.135341 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:22Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 06:43:22.135372 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:22Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 06:43:22.135405 /usr/lib/systemd/system-generators/torcx-generator[1147]: time="2024-02-09T06:43:22Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 06:43:24.148000 audit[1258]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffc2b41880 a2=4000 a3=7fffc2b4191c items=0 ppid=1 pid=1258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:24.148000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 06:43:24.230625 systemd[1]: Starting systemd-network-generator.service... Feb 9 06:43:24.257495 systemd[1]: Starting systemd-remount-fs.service... Feb 9 06:43:24.284503 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 06:43:24.327259 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 06:43:24.327282 systemd[1]: Stopped verity-setup.service. Feb 9 06:43:24.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.373490 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 06:43:24.393619 systemd[1]: Started systemd-journald.service. Feb 9 06:43:24.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.403058 systemd[1]: Mounted dev-hugepages.mount. Feb 9 06:43:24.410781 systemd[1]: Mounted dev-mqueue.mount. Feb 9 06:43:24.417694 systemd[1]: Mounted media.mount. Feb 9 06:43:24.424700 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 06:43:24.433679 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 06:43:24.441681 systemd[1]: Mounted tmp.mount. Feb 9 06:43:24.448776 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 06:43:24.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.456805 systemd[1]: Finished kmod-static-nodes.service. Feb 9 06:43:24.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.465792 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 06:43:24.465898 systemd[1]: Finished modprobe@configfs.service. Feb 9 06:43:24.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.474860 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 06:43:24.474987 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 06:43:24.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.483993 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 06:43:24.484172 systemd[1]: Finished modprobe@drm.service. Feb 9 06:43:24.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.493261 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 06:43:24.493579 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 06:43:24.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.502263 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 06:43:24.502584 systemd[1]: Finished modprobe@fuse.service. Feb 9 06:43:24.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.511250 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 06:43:24.511733 systemd[1]: Finished modprobe@loop.service. Feb 9 06:43:24.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.520289 systemd[1]: Finished systemd-modules-load.service. Feb 9 06:43:24.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.530235 systemd[1]: Finished systemd-network-generator.service. Feb 9 06:43:24.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.539221 systemd[1]: Finished systemd-remount-fs.service. Feb 9 06:43:24.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.548235 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 06:43:24.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.558700 systemd[1]: Reached target network-pre.target. Feb 9 06:43:24.569254 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 06:43:24.578140 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 06:43:24.585653 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 06:43:24.586671 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 06:43:24.594110 systemd[1]: Starting systemd-journal-flush.service... Feb 9 06:43:24.597809 systemd-journald[1258]: Time spent on flushing to /var/log/journal/0333e3f90c9449679b4ec4208ec16d83 is 15.612ms for 1649 entries. Feb 9 06:43:24.597809 systemd-journald[1258]: System Journal (/var/log/journal/0333e3f90c9449679b4ec4208ec16d83) is 8.0M, max 195.6M, 187.6M free. Feb 9 06:43:24.637307 systemd-journald[1258]: Received client request to flush runtime journal. Feb 9 06:43:24.610557 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 06:43:24.611136 systemd[1]: Starting systemd-random-seed.service... Feb 9 06:43:24.625556 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 06:43:24.626058 systemd[1]: Starting systemd-sysctl.service... Feb 9 06:43:24.633036 systemd[1]: Starting systemd-sysusers.service... Feb 9 06:43:24.641142 systemd[1]: Starting systemd-udev-settle.service... Feb 9 06:43:24.649728 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 06:43:24.658630 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 06:43:24.666685 systemd[1]: Finished systemd-journal-flush.service. Feb 9 06:43:24.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.674663 systemd[1]: Finished systemd-random-seed.service. Feb 9 06:43:24.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.682644 systemd[1]: Finished systemd-sysctl.service. Feb 9 06:43:24.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.690650 systemd[1]: Finished systemd-sysusers.service. Feb 9 06:43:24.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.699675 systemd[1]: Reached target first-boot-complete.target. Feb 9 06:43:24.707791 udevadm[1275]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 06:43:24.890720 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 06:43:24.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.899000 audit: BPF prog-id=21 op=LOAD Feb 9 06:43:24.899000 audit: BPF prog-id=22 op=LOAD Feb 9 06:43:24.899000 audit: BPF prog-id=7 op=UNLOAD Feb 9 06:43:24.899000 audit: BPF prog-id=8 op=UNLOAD Feb 9 06:43:24.900789 systemd[1]: Starting systemd-udevd.service... Feb 9 06:43:24.911993 systemd-udevd[1276]: Using default interface naming scheme 'v252'. Feb 9 06:43:24.931764 systemd[1]: Started systemd-udevd.service. Feb 9 06:43:24.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:24.941546 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 06:43:24.941000 audit: BPF prog-id=23 op=LOAD Feb 9 06:43:24.942652 systemd[1]: Starting systemd-networkd.service... Feb 9 06:43:24.968000 audit: BPF prog-id=24 op=LOAD Feb 9 06:43:24.968000 audit: BPF prog-id=25 op=LOAD Feb 9 06:43:24.968000 audit: BPF prog-id=26 op=LOAD Feb 9 06:43:24.969452 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 06:43:24.969485 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 06:43:24.986640 systemd[1]: Starting systemd-userdbd.service... Feb 9 06:43:25.010910 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1297) Feb 9 06:43:25.010948 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 06:43:25.051789 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 06:43:25.053449 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 06:43:25.053473 kernel: ACPI: button: Power Button [PWRF] Feb 9 06:43:25.071452 kernel: IPMI message handler: version 39.2 Feb 9 06:43:24.976000 audit[1288]: AVC avc: denied { confidentiality } for pid=1288 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 06:43:24.976000 audit[1288]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe7dca0e010 a1=4d8bc a2=7fe7de6c6bc5 a3=5 items=42 ppid=1276 pid=1288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:24.976000 audit: CWD cwd="/" Feb 9 06:43:24.976000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=1 name=(null) inode=12559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=2 name=(null) inode=12559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=3 name=(null) inode=12560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=4 name=(null) inode=12559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=5 name=(null) inode=12561 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=6 name=(null) inode=12559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=7 name=(null) inode=12562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=8 name=(null) inode=12562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=9 name=(null) inode=12563 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=10 name=(null) inode=12562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=11 name=(null) inode=12564 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=12 name=(null) inode=12562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=13 name=(null) inode=12565 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=14 name=(null) inode=12562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=15 name=(null) inode=12566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=16 name=(null) inode=12562 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=17 name=(null) inode=12567 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=18 name=(null) inode=12559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=19 name=(null) inode=12568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=20 name=(null) inode=12568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=21 name=(null) inode=12569 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=22 name=(null) inode=12568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=23 name=(null) inode=12570 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=24 name=(null) inode=12568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=25 name=(null) inode=12571 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=26 name=(null) inode=12568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=27 name=(null) inode=12572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=28 name=(null) inode=12568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=29 name=(null) inode=12573 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=30 name=(null) inode=12559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=31 name=(null) inode=12574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=32 name=(null) inode=12574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=33 name=(null) inode=12575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=34 name=(null) inode=12574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=35 name=(null) inode=12576 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=36 name=(null) inode=12574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=37 name=(null) inode=12577 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=38 name=(null) inode=12574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=39 name=(null) inode=12578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=40 name=(null) inode=12574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PATH item=41 name=(null) inode=12579 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:43:24.976000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 06:43:25.110455 kernel: ipmi device interface Feb 9 06:43:25.140481 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 06:43:25.140654 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 06:43:25.140753 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 06:43:25.140855 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 06:43:25.175514 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 06:43:25.223504 systemd[1]: Started systemd-userdbd.service. Feb 9 06:43:25.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:25.264447 kernel: ipmi_si: IPMI System Interface driver Feb 9 06:43:25.264472 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 06:43:25.264554 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 06:43:25.285062 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 06:43:25.304243 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 06:43:25.344800 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 06:43:25.381459 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 06:43:25.422004 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 06:43:25.422190 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 06:43:25.422215 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 06:43:25.471456 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Feb 9 06:43:25.471758 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 06:43:25.488288 systemd-networkd[1305]: bond0: netdev ready Feb 9 06:43:25.490342 systemd-networkd[1305]: lo: Link UP Feb 9 06:43:25.490345 systemd-networkd[1305]: lo: Gained carrier Feb 9 06:43:25.490812 systemd-networkd[1305]: Enumeration completed Feb 9 06:43:25.490873 systemd[1]: Started systemd-networkd.service. Feb 9 06:43:25.491103 systemd-networkd[1305]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 06:43:25.507266 systemd-networkd[1305]: enp2s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:7e:a1:e9.network. Feb 9 06:43:25.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:25.548159 kernel: intel_rapl_common: Found RAPL domain package Feb 9 06:43:25.548191 kernel: intel_rapl_common: Found RAPL domain core Feb 9 06:43:25.548206 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Feb 9 06:43:25.548298 kernel: intel_rapl_common: Found RAPL domain uncore Feb 9 06:43:25.603657 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 06:43:25.706461 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 06:43:25.724452 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 06:43:25.852552 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 06:43:25.877490 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Feb 9 06:43:25.879943 systemd-networkd[1305]: enp2s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:7e:a1:e8.network. Feb 9 06:43:25.899754 systemd[1]: Finished systemd-udev-settle.service. Feb 9 06:43:25.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:25.909355 systemd[1]: Starting lvm2-activation-early.service... Feb 9 06:43:25.926335 lvm[1382]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 06:43:25.930451 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 06:43:25.967878 systemd[1]: Finished lvm2-activation-early.service. Feb 9 06:43:25.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:25.976571 systemd[1]: Reached target cryptsetup.target. Feb 9 06:43:25.985103 systemd[1]: Starting lvm2-activation.service... Feb 9 06:43:25.987273 lvm[1383]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 06:43:26.019881 systemd[1]: Finished lvm2-activation.service. Feb 9 06:43:26.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:26.028571 systemd[1]: Reached target local-fs-pre.target. Feb 9 06:43:26.045484 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 06:43:26.045503 systemd[1]: Reached target local-fs.target. Feb 9 06:43:26.057489 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 06:43:26.066551 systemd[1]: Reached target machines.target. Feb 9 06:43:26.075128 systemd[1]: Starting ldconfig.service... Feb 9 06:43:26.081900 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 06:43:26.081931 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 06:43:26.082571 systemd[1]: Starting systemd-boot-update.service... Feb 9 06:43:26.090009 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 06:43:26.100140 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 06:43:26.100342 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 06:43:26.100373 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 06:43:26.100906 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 06:43:26.101123 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1385 (bootctl) Feb 9 06:43:26.101907 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 06:43:26.120851 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 06:43:26.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:26.239493 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 9 06:43:26.263501 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Feb 9 06:43:26.263545 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 06:43:26.280450 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 06:43:26.289073 systemd-tmpfiles[1389]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 06:43:26.301269 systemd-networkd[1305]: bond0: Link UP Feb 9 06:43:26.301454 systemd-networkd[1305]: enp2s0f1np1: Link UP Feb 9 06:43:26.301632 systemd-networkd[1305]: enp2s0f1np1: Gained carrier Feb 9 06:43:26.302559 systemd-networkd[1305]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:7e:a1:e8.network. Feb 9 06:43:26.340198 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 06:43:26.340228 kernel: bond0: active interface up! Feb 9 06:43:26.361478 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 06:43:26.424489 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 06:43:26.455450 systemd-networkd[1305]: enp2s0f0np0: Link UP Feb 9 06:43:26.455598 systemd-networkd[1305]: bond0: Gained carrier Feb 9 06:43:26.455676 systemd-networkd[1305]: enp2s0f0np0: Gained carrier Feb 9 06:43:26.464692 systemd-networkd[1305]: enp2s0f1np1: Link DOWN Feb 9 06:43:26.464695 systemd-networkd[1305]: enp2s0f1np1: Lost carrier Feb 9 06:43:26.505960 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 06:43:26.505988 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Feb 9 06:43:26.618065 systemd-tmpfiles[1389]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 06:43:26.633269 systemd-tmpfiles[1389]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 06:43:26.649481 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 06:43:26.649725 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 06:43:26.650050 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 06:43:26.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:26.665158 systemd-fsck[1393]: fsck.fat 4.2 (2021-01-31) Feb 9 06:43:26.665158 systemd-fsck[1393]: /dev/sdb1: 789 files, 115332/258078 clusters Feb 9 06:43:26.665836 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 06:43:26.669449 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Feb 9 06:43:26.671034 systemd-networkd[1305]: enp2s0f1np1: Link UP Feb 9 06:43:26.671235 systemd-networkd[1305]: enp2s0f1np1: Gained carrier Feb 9 06:43:26.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:26.681245 systemd[1]: Mounting boot.mount... Feb 9 06:43:26.694078 systemd[1]: Mounted boot.mount. Feb 9 06:43:26.711179 systemd[1]: Finished systemd-boot-update.service. Feb 9 06:43:26.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:26.735486 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Feb 9 06:43:26.741368 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 06:43:26.755489 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 06:43:26.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:26.764257 systemd[1]: Starting audit-rules.service... Feb 9 06:43:26.772009 systemd[1]: Starting clean-ca-certificates.service... Feb 9 06:43:26.782023 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 06:43:26.784292 augenrules[1414]: No rules Feb 9 06:43:26.783000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 06:43:26.783000 audit[1414]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc6c789470 a2=420 a3=0 items=0 ppid=1397 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:26.783000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 06:43:26.791415 systemd[1]: Starting systemd-resolved.service... Feb 9 06:43:26.800382 systemd[1]: Starting systemd-timesyncd.service... Feb 9 06:43:26.808006 systemd[1]: Starting systemd-update-utmp.service... Feb 9 06:43:26.814775 systemd[1]: Finished audit-rules.service. Feb 9 06:43:26.821648 systemd[1]: Finished clean-ca-certificates.service. Feb 9 06:43:26.829595 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 06:43:26.841134 systemd[1]: Finished systemd-update-utmp.service. Feb 9 06:43:26.849523 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 06:43:26.863557 ldconfig[1384]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 06:43:26.866866 systemd[1]: Finished ldconfig.service. Feb 9 06:43:26.870240 systemd-resolved[1419]: Positive Trust Anchors: Feb 9 06:43:26.870245 systemd-resolved[1419]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 06:43:26.870265 systemd-resolved[1419]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 06:43:26.873580 systemd[1]: Started systemd-timesyncd.service. Feb 9 06:43:26.873984 systemd-resolved[1419]: Using system hostname 'ci-3510.3.2-a-4a81ef77ce'. Feb 9 06:43:26.882568 systemd[1]: Started systemd-resolved.service. Feb 9 06:43:26.891566 systemd[1]: Reached target network.target. Feb 9 06:43:26.899530 systemd[1]: Reached target nss-lookup.target. Feb 9 06:43:26.907519 systemd[1]: Reached target time-set.target. Feb 9 06:43:26.916139 systemd[1]: Starting systemd-update-done.service... Feb 9 06:43:26.922625 systemd[1]: Finished systemd-update-done.service. Feb 9 06:43:26.930569 systemd[1]: Reached target sysinit.target. Feb 9 06:43:26.938567 systemd[1]: Started motdgen.path. Feb 9 06:43:26.945560 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 06:43:26.955601 systemd[1]: Started logrotate.timer. Feb 9 06:43:26.962566 systemd[1]: Started mdadm.timer. Feb 9 06:43:26.969532 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 06:43:26.977521 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 06:43:26.977537 systemd[1]: Reached target paths.target. Feb 9 06:43:26.984657 systemd[1]: Reached target timers.target. Feb 9 06:43:26.991626 systemd[1]: Listening on dbus.socket. Feb 9 06:43:26.998943 systemd[1]: Starting docker.socket... Feb 9 06:43:27.006916 systemd[1]: Listening on sshd.socket. Feb 9 06:43:27.013535 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 06:43:27.013740 systemd[1]: Listening on docker.socket. Feb 9 06:43:27.020520 systemd[1]: Reached target sockets.target. Feb 9 06:43:27.028474 systemd[1]: Reached target basic.target. Feb 9 06:43:27.035493 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 06:43:27.035506 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 06:43:27.035925 systemd[1]: Starting containerd.service... Feb 9 06:43:27.042877 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 06:43:27.050968 systemd[1]: Starting coreos-metadata.service... Feb 9 06:43:27.057980 systemd[1]: Starting dbus.service... Feb 9 06:43:27.063989 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 06:43:27.068405 jq[1434]: false Feb 9 06:43:27.071002 systemd[1]: Starting extend-filesystems.service... Feb 9 06:43:27.071409 coreos-metadata[1427]: Feb 09 06:43:27.071 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 06:43:27.074658 dbus-daemon[1433]: [system] SELinux support is enabled Feb 9 06:43:27.077567 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 06:43:27.078019 coreos-metadata[1430]: Feb 09 06:43:27.077 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 06:43:27.078146 systemd[1]: Starting motdgen.service... Feb 9 06:43:27.078724 extend-filesystems[1435]: Found sda Feb 9 06:43:27.078724 extend-filesystems[1435]: Found sdb Feb 9 06:43:27.123562 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 9 06:43:27.085298 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 06:43:27.123659 extend-filesystems[1435]: Found sdb1 Feb 9 06:43:27.123659 extend-filesystems[1435]: Found sdb2 Feb 9 06:43:27.123659 extend-filesystems[1435]: Found sdb3 Feb 9 06:43:27.123659 extend-filesystems[1435]: Found usr Feb 9 06:43:27.123659 extend-filesystems[1435]: Found sdb4 Feb 9 06:43:27.123659 extend-filesystems[1435]: Found sdb6 Feb 9 06:43:27.123659 extend-filesystems[1435]: Found sdb7 Feb 9 06:43:27.123659 extend-filesystems[1435]: Found sdb9 Feb 9 06:43:27.123659 extend-filesystems[1435]: Checking size of /dev/sdb9 Feb 9 06:43:27.123659 extend-filesystems[1435]: Resized partition /dev/sdb9 Feb 9 06:43:27.116254 systemd[1]: Starting prepare-critools.service... Feb 9 06:43:27.229640 extend-filesystems[1451]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 06:43:27.131109 systemd[1]: Starting prepare-helm.service... Feb 9 06:43:27.146070 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 06:43:27.165019 systemd[1]: Starting sshd-keygen.service... Feb 9 06:43:27.183886 systemd[1]: Starting systemd-logind.service... Feb 9 06:43:27.201481 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 06:43:27.202058 systemd[1]: Starting tcsd.service... Feb 9 06:43:27.245049 jq[1467]: true Feb 9 06:43:27.204437 systemd-logind[1464]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 06:43:27.204449 systemd-logind[1464]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 06:43:27.204459 systemd-logind[1464]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 06:43:27.204626 systemd-logind[1464]: New seat seat0. Feb 9 06:43:27.221942 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 06:43:27.222295 systemd[1]: Starting update-engine.service... Feb 9 06:43:27.237134 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 06:43:27.253831 systemd[1]: Started dbus.service. Feb 9 06:43:27.262214 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 06:43:27.262300 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 06:43:27.262475 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 06:43:27.262551 systemd[1]: Finished motdgen.service. Feb 9 06:43:27.265388 update_engine[1466]: I0209 06:43:27.264959 1466 main.cc:92] Flatcar Update Engine starting Feb 9 06:43:27.268152 update_engine[1466]: I0209 06:43:27.268112 1466 update_check_scheduler.cc:74] Next update check in 6m26s Feb 9 06:43:27.270574 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 06:43:27.270657 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 06:43:27.274695 tar[1469]: ./ Feb 9 06:43:27.274695 tar[1469]: ./loopback Feb 9 06:43:27.281065 jq[1475]: true Feb 9 06:43:27.282528 dbus-daemon[1433]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 06:43:27.283289 tar[1470]: crictl Feb 9 06:43:27.284610 tar[1471]: linux-amd64/helm Feb 9 06:43:27.286994 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 06:43:27.287119 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 06:43:27.290616 env[1476]: time="2024-02-09T06:43:27.290563518Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 06:43:27.292558 systemd[1]: Started update-engine.service. Feb 9 06:43:27.297846 tar[1469]: ./bandwidth Feb 9 06:43:27.300547 systemd[1]: Started systemd-logind.service. Feb 9 06:43:27.307106 env[1476]: time="2024-02-09T06:43:27.307081691Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 06:43:27.308710 env[1476]: time="2024-02-09T06:43:27.308649333Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 06:43:27.309134 bash[1503]: Updated "/home/core/.ssh/authorized_keys" Feb 9 06:43:27.309329 env[1476]: time="2024-02-09T06:43:27.309308375Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 06:43:27.309372 env[1476]: time="2024-02-09T06:43:27.309328548Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 06:43:27.309499 env[1476]: time="2024-02-09T06:43:27.309483662Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 06:43:27.309536 env[1476]: time="2024-02-09T06:43:27.309498870Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 06:43:27.309536 env[1476]: time="2024-02-09T06:43:27.309513100Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 06:43:27.309536 env[1476]: time="2024-02-09T06:43:27.309522900Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 06:43:27.309613 env[1476]: time="2024-02-09T06:43:27.309578854Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 06:43:27.309753 env[1476]: time="2024-02-09T06:43:27.309742178Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 06:43:27.309856 env[1476]: time="2024-02-09T06:43:27.309841019Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 06:43:27.309885 env[1476]: time="2024-02-09T06:43:27.309855403Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 06:43:27.309911 env[1476]: time="2024-02-09T06:43:27.309889829Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 06:43:27.309911 env[1476]: time="2024-02-09T06:43:27.309900361Z" level=info msg="metadata content store policy set" policy=shared Feb 9 06:43:27.310309 systemd[1]: Started locksmithd.service. Feb 9 06:43:27.317609 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 06:43:27.317735 systemd[1]: Reached target system-config.target. Feb 9 06:43:27.317839 env[1476]: time="2024-02-09T06:43:27.317824581Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 06:43:27.317865 env[1476]: time="2024-02-09T06:43:27.317846354Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 06:43:27.317865 env[1476]: time="2024-02-09T06:43:27.317858905Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 06:43:27.317898 env[1476]: time="2024-02-09T06:43:27.317884689Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 06:43:27.317919 env[1476]: time="2024-02-09T06:43:27.317897715Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 06:43:27.317919 env[1476]: time="2024-02-09T06:43:27.317910992Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 06:43:27.317953 env[1476]: time="2024-02-09T06:43:27.317922386Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 06:43:27.317953 env[1476]: time="2024-02-09T06:43:27.317935137Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 06:43:27.317953 env[1476]: time="2024-02-09T06:43:27.317946691Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 06:43:27.318000 env[1476]: time="2024-02-09T06:43:27.317958903Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 06:43:27.318000 env[1476]: time="2024-02-09T06:43:27.317970738Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 06:43:27.318000 env[1476]: time="2024-02-09T06:43:27.317981917Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 06:43:27.318058 env[1476]: time="2024-02-09T06:43:27.318048465Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 06:43:27.318122 env[1476]: time="2024-02-09T06:43:27.318111870Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 06:43:27.318304 env[1476]: time="2024-02-09T06:43:27.318294327Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 06:43:27.318325 env[1476]: time="2024-02-09T06:43:27.318316450Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 06:43:27.318341 env[1476]: time="2024-02-09T06:43:27.318329052Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 06:43:27.318371 env[1476]: time="2024-02-09T06:43:27.318363094Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 06:43:27.318394 env[1476]: time="2024-02-09T06:43:27.318375915Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 06:43:27.318394 env[1476]: time="2024-02-09T06:43:27.318387418Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 06:43:27.318428 env[1476]: time="2024-02-09T06:43:27.318397707Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 06:43:27.318428 env[1476]: time="2024-02-09T06:43:27.318408611Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 06:43:27.318428 env[1476]: time="2024-02-09T06:43:27.318419650Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 06:43:27.318478 env[1476]: time="2024-02-09T06:43:27.318430270Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 06:43:27.318478 env[1476]: time="2024-02-09T06:43:27.318440616Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 06:43:27.318478 env[1476]: time="2024-02-09T06:43:27.318457089Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 06:43:27.318550 env[1476]: time="2024-02-09T06:43:27.318540134Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 06:43:27.318570 env[1476]: time="2024-02-09T06:43:27.318553881Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 06:43:27.318570 env[1476]: time="2024-02-09T06:43:27.318564959Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 06:43:27.318607 env[1476]: time="2024-02-09T06:43:27.318576750Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 06:43:27.318607 env[1476]: time="2024-02-09T06:43:27.318590018Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 06:43:27.318607 env[1476]: time="2024-02-09T06:43:27.318600256Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 06:43:27.318654 env[1476]: time="2024-02-09T06:43:27.318615458Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 06:43:27.318654 env[1476]: time="2024-02-09T06:43:27.318641633Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 06:43:27.319001 env[1476]: time="2024-02-09T06:43:27.318949290Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 06:43:27.321029 env[1476]: time="2024-02-09T06:43:27.319016003Z" level=info msg="Connect containerd service" Feb 9 06:43:27.321029 env[1476]: time="2024-02-09T06:43:27.319073824Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 06:43:27.321029 env[1476]: time="2024-02-09T06:43:27.319427564Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 06:43:27.321029 env[1476]: time="2024-02-09T06:43:27.319512929Z" level=info msg="Start subscribing containerd event" Feb 9 06:43:27.321029 env[1476]: time="2024-02-09T06:43:27.319541102Z" level=info msg="Start recovering state" Feb 9 06:43:27.321029 env[1476]: time="2024-02-09T06:43:27.319569058Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 06:43:27.321029 env[1476]: time="2024-02-09T06:43:27.319573279Z" level=info msg="Start event monitor" Feb 9 06:43:27.321029 env[1476]: time="2024-02-09T06:43:27.319589048Z" level=info msg="Start snapshots syncer" Feb 9 06:43:27.321029 env[1476]: time="2024-02-09T06:43:27.319594272Z" level=info msg="Start cni network conf syncer for default" Feb 9 06:43:27.321029 env[1476]: time="2024-02-09T06:43:27.319598919Z" level=info msg="Start streaming server" Feb 9 06:43:27.321029 env[1476]: time="2024-02-09T06:43:27.319593321Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 06:43:27.321029 env[1476]: time="2024-02-09T06:43:27.319639972Z" level=info msg="containerd successfully booted in 0.029436s" Feb 9 06:43:27.325586 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 06:43:27.325678 systemd[1]: Reached target user-config.target. Feb 9 06:43:27.330080 tar[1469]: ./ptp Feb 9 06:43:27.335069 systemd[1]: Started containerd.service. Feb 9 06:43:27.341739 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 06:43:27.354894 tar[1469]: ./vlan Feb 9 06:43:27.372285 locksmithd[1509]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 06:43:27.379315 tar[1469]: ./host-device Feb 9 06:43:27.402328 tar[1469]: ./tuning Feb 9 06:43:27.422965 tar[1469]: ./vrf Feb 9 06:43:27.444090 tar[1469]: ./sbr Feb 9 06:43:27.464839 tar[1469]: ./tap Feb 9 06:43:27.488778 tar[1469]: ./dhcp Feb 9 06:43:27.539215 tar[1471]: linux-amd64/LICENSE Feb 9 06:43:27.539297 tar[1471]: linux-amd64/README.md Feb 9 06:43:27.541904 systemd[1]: Finished prepare-helm.service. Feb 9 06:43:27.549558 tar[1469]: ./static Feb 9 06:43:27.552141 systemd[1]: Finished prepare-critools.service. Feb 9 06:43:27.567141 tar[1469]: ./firewall Feb 9 06:43:27.581127 sshd_keygen[1463]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 06:43:27.592677 systemd[1]: Finished sshd-keygen.service. Feb 9 06:43:27.593664 tar[1469]: ./macvlan Feb 9 06:43:27.607516 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 9 06:43:27.614492 systemd[1]: Starting issuegen.service... Feb 9 06:43:27.637018 extend-filesystems[1451]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 9 06:43:27.637018 extend-filesystems[1451]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 06:43:27.637018 extend-filesystems[1451]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 9 06:43:27.621709 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 06:43:27.663812 tar[1469]: ./dummy Feb 9 06:43:27.663836 extend-filesystems[1435]: Resized filesystem in /dev/sdb9 Feb 9 06:43:27.621782 systemd[1]: Finished issuegen.service. Feb 9 06:43:27.689711 tar[1469]: ./bridge Feb 9 06:43:27.629255 systemd[1]: Starting systemd-user-sessions.service... Feb 9 06:43:27.637788 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 06:43:27.637864 systemd[1]: Finished extend-filesystems.service. Feb 9 06:43:27.648902 systemd[1]: Finished systemd-user-sessions.service. Feb 9 06:43:27.682404 systemd[1]: Started getty@tty1.service. Feb 9 06:43:27.690920 tar[1469]: ./ipvlan Feb 9 06:43:27.697285 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 06:43:27.705639 systemd[1]: Reached target getty.target. Feb 9 06:43:27.712855 tar[1469]: ./portmap Feb 9 06:43:27.733540 tar[1469]: ./host-local Feb 9 06:43:27.757396 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 06:43:27.971587 systemd-networkd[1305]: bond0: Gained IPv6LL Feb 9 06:43:28.944452 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 06:43:32.708102 login[1536]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 06:43:32.714570 login[1535]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 06:43:32.820727 systemd-logind[1464]: New session 2 of user core. Feb 9 06:43:32.823790 systemd[1]: Created slice user-500.slice. Feb 9 06:43:32.827391 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 06:43:32.834137 systemd-logind[1464]: New session 1 of user core. Feb 9 06:43:32.861220 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 06:43:32.862016 systemd[1]: Starting user@500.service... Feb 9 06:43:32.883628 (systemd)[1542]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:43:33.027998 coreos-metadata[1430]: Feb 09 06:43:33.027 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 06:43:33.028319 coreos-metadata[1427]: Feb 09 06:43:33.027 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 06:43:33.065883 systemd[1542]: Queued start job for default target default.target. Feb 9 06:43:33.066121 systemd[1542]: Reached target paths.target. Feb 9 06:43:33.066132 systemd[1542]: Reached target sockets.target. Feb 9 06:43:33.066140 systemd[1542]: Reached target timers.target. Feb 9 06:43:33.066147 systemd[1542]: Reached target basic.target. Feb 9 06:43:33.066166 systemd[1542]: Reached target default.target. Feb 9 06:43:33.066179 systemd[1542]: Startup finished in 177ms. Feb 9 06:43:33.066235 systemd[1]: Started user@500.service. Feb 9 06:43:33.066790 systemd[1]: Started session-1.scope. Feb 9 06:43:33.067121 systemd[1]: Started session-2.scope. Feb 9 06:43:34.028513 coreos-metadata[1430]: Feb 09 06:43:34.028 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 06:43:34.029267 coreos-metadata[1427]: Feb 09 06:43:34.028 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 06:43:34.250488 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Feb 9 06:43:34.257490 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 9 06:43:35.084044 systemd[1]: Created slice system-sshd.slice. Feb 9 06:43:35.084692 systemd[1]: Started sshd@0-86.109.11.101:22-147.75.109.163:32846.service. Feb 9 06:43:35.098180 coreos-metadata[1427]: Feb 09 06:43:35.098 INFO Fetch successful Feb 9 06:43:35.098501 coreos-metadata[1430]: Feb 09 06:43:35.098 INFO Fetch successful Feb 9 06:43:35.121046 systemd[1]: Finished coreos-metadata.service. Feb 9 06:43:35.121137 unknown[1427]: wrote ssh authorized keys file for user: core Feb 9 06:43:35.121885 systemd[1]: Started packet-phone-home.service. Feb 9 06:43:35.122957 sshd[1563]: Accepted publickey for core from 147.75.109.163 port 32846 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:43:35.123786 sshd[1563]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:43:35.126010 systemd-logind[1464]: New session 3 of user core. Feb 9 06:43:35.126549 systemd[1]: Started session-3.scope. Feb 9 06:43:35.127139 curl[1567]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 06:43:35.127139 curl[1567]: Dload Upload Total Spent Left Speed Feb 9 06:43:35.131741 update-ssh-keys[1568]: Updated "/home/core/.ssh/authorized_keys" Feb 9 06:43:35.131933 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 06:43:35.132084 systemd[1]: Reached target multi-user.target. Feb 9 06:43:35.132802 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 06:43:35.136694 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 06:43:35.136767 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 06:43:35.136845 systemd[1]: Startup finished in 2.008s (kernel) + 19.453s (initrd) + 14.851s (userspace) = 36.313s. Feb 9 06:43:35.173245 systemd[1]: Started sshd@1-86.109.11.101:22-147.75.109.163:49614.service. Feb 9 06:43:35.202569 sshd[1573]: Accepted publickey for core from 147.75.109.163 port 49614 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:43:35.203233 sshd[1573]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:43:35.205307 systemd-logind[1464]: New session 4 of user core. Feb 9 06:43:35.205790 systemd[1]: Started session-4.scope. Feb 9 06:43:35.256099 sshd[1573]: pam_unix(sshd:session): session closed for user core Feb 9 06:43:35.258268 systemd[1]: sshd@1-86.109.11.101:22-147.75.109.163:49614.service: Deactivated successfully. Feb 9 06:43:35.258771 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 06:43:35.259238 systemd-logind[1464]: Session 4 logged out. Waiting for processes to exit. Feb 9 06:43:35.260090 systemd[1]: Started sshd@2-86.109.11.101:22-147.75.109.163:49622.service. Feb 9 06:43:35.260788 systemd-logind[1464]: Removed session 4. Feb 9 06:43:35.295504 sshd[1579]: Accepted publickey for core from 147.75.109.163 port 49622 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:43:35.296260 sshd[1579]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:43:35.298975 systemd-logind[1464]: New session 5 of user core. Feb 9 06:43:35.299513 systemd[1]: Started session-5.scope. Feb 9 06:43:35.304822 systemd[1]: Started sshd@3-86.109.11.101:22-159.223.148.156:56742.service. Feb 9 06:43:35.313587 curl[1567]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 06:43:35.314370 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 06:43:35.354304 sshd[1579]: pam_unix(sshd:session): session closed for user core Feb 9 06:43:35.361031 systemd[1]: sshd@2-86.109.11.101:22-147.75.109.163:49622.service: Deactivated successfully. Feb 9 06:43:35.362593 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 06:43:35.364396 systemd-logind[1464]: Session 5 logged out. Waiting for processes to exit. Feb 9 06:43:35.366923 systemd[1]: Started sshd@4-86.109.11.101:22-147.75.109.163:49628.service. Feb 9 06:43:35.369335 systemd-logind[1464]: Removed session 5. Feb 9 06:43:35.429421 sshd[1588]: Accepted publickey for core from 147.75.109.163 port 49628 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:43:35.432263 sshd[1588]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:43:35.441562 systemd-logind[1464]: New session 6 of user core. Feb 9 06:43:35.443717 systemd[1]: Started session-6.scope. Feb 9 06:43:35.929540 systemd-resolved[1419]: Clock change detected. Flushing caches. Feb 9 06:43:35.929727 systemd-timesyncd[1420]: Contacted time server 23.141.40.124:123 (0.flatcar.pool.ntp.org). Feb 9 06:43:35.929854 systemd-timesyncd[1420]: Initial clock synchronization to Fri 2024-02-09 06:43:35.929381 UTC. Feb 9 06:43:35.952389 sshd[1588]: pam_unix(sshd:session): session closed for user core Feb 9 06:43:35.954040 systemd[1]: sshd@4-86.109.11.101:22-147.75.109.163:49628.service: Deactivated successfully. Feb 9 06:43:35.954391 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 06:43:35.954746 systemd-logind[1464]: Session 6 logged out. Waiting for processes to exit. Feb 9 06:43:35.955325 systemd[1]: Started sshd@5-86.109.11.101:22-147.75.109.163:49640.service. Feb 9 06:43:35.955787 systemd-logind[1464]: Removed session 6. Feb 9 06:43:35.985708 sshd[1594]: Accepted publickey for core from 147.75.109.163 port 49640 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:43:35.987105 sshd[1594]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:43:35.992066 systemd-logind[1464]: New session 7 of user core. Feb 9 06:43:35.993415 systemd[1]: Started session-7.scope. Feb 9 06:43:36.083286 sudo[1597]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 06:43:36.083883 sudo[1597]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 06:43:36.115519 dbus-daemon[1433]: Э\u00037\u001fV: received setenforce notice (enforcing=-835151248) Feb 9 06:43:36.119961 sudo[1597]: pam_unix(sudo:session): session closed for user root Feb 9 06:43:36.124575 sshd[1594]: pam_unix(sshd:session): session closed for user core Feb 9 06:43:36.131133 systemd[1]: sshd@5-86.109.11.101:22-147.75.109.163:49640.service: Deactivated successfully. Feb 9 06:43:36.132692 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 06:43:36.134383 systemd-logind[1464]: Session 7 logged out. Waiting for processes to exit. Feb 9 06:43:36.137217 systemd[1]: Started sshd@6-86.109.11.101:22-147.75.109.163:49644.service. Feb 9 06:43:36.139605 systemd-logind[1464]: Removed session 7. Feb 9 06:43:36.187311 sshd[1583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.148.156 user=root Feb 9 06:43:36.189026 sshd[1601]: Accepted publickey for core from 147.75.109.163 port 49644 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:43:36.189665 sshd[1601]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:43:36.192022 systemd-logind[1464]: New session 8 of user core. Feb 9 06:43:36.192474 systemd[1]: Started session-8.scope. Feb 9 06:43:36.245290 sudo[1605]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 06:43:36.245616 sudo[1605]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 06:43:36.250886 sudo[1605]: pam_unix(sudo:session): session closed for user root Feb 9 06:43:36.258289 sudo[1604]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 06:43:36.258440 sudo[1604]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 06:43:36.263325 systemd[1]: Stopping audit-rules.service... Feb 9 06:43:36.262000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 06:43:36.264099 auditctl[1608]: No rules Feb 9 06:43:36.264239 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 06:43:36.264319 systemd[1]: Stopped audit-rules.service. Feb 9 06:43:36.265051 systemd[1]: Starting audit-rules.service... Feb 9 06:43:36.269485 kernel: kauditd_printk_skb: 95 callbacks suppressed Feb 9 06:43:36.269557 kernel: audit: type=1305 audit(1707461016.262:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 06:43:36.274889 augenrules[1625]: No rules Feb 9 06:43:36.275226 systemd[1]: Finished audit-rules.service. Feb 9 06:43:36.275772 sudo[1604]: pam_unix(sudo:session): session closed for user root Feb 9 06:43:36.276550 sshd[1601]: pam_unix(sshd:session): session closed for user core Feb 9 06:43:36.278032 systemd[1]: sshd@6-86.109.11.101:22-147.75.109.163:49644.service: Deactivated successfully. Feb 9 06:43:36.278346 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 06:43:36.278685 systemd-logind[1464]: Session 8 logged out. Waiting for processes to exit. Feb 9 06:43:36.279268 systemd[1]: Started sshd@7-86.109.11.101:22-147.75.109.163:49650.service. Feb 9 06:43:36.279735 systemd-logind[1464]: Removed session 8. Feb 9 06:43:36.262000 audit[1608]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc1dabec0 a2=420 a3=0 items=0 ppid=1 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:36.316048 kernel: audit: type=1300 audit(1707461016.262:164): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc1dabec0 a2=420 a3=0 items=0 ppid=1 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:36.316093 kernel: audit: type=1327 audit(1707461016.262:164): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 06:43:36.262000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 06:43:36.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:36.347953 sshd[1631]: Accepted publickey for core from 147.75.109.163 port 49650 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:43:36.348226 kernel: audit: type=1131 audit(1707461016.262:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:36.348270 kernel: audit: type=1130 audit(1707461016.274:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:36.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:36.348539 sshd[1631]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:43:36.350680 systemd-logind[1464]: New session 9 of user core. Feb 9 06:43:36.351082 systemd[1]: Started session-9.scope. Feb 9 06:43:36.370511 kernel: audit: type=1106 audit(1707461016.274:167): pid=1604 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:43:36.274000 audit[1604]: USER_END pid=1604 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:43:36.396482 kernel: audit: type=1104 audit(1707461016.274:168): pid=1604 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:43:36.274000 audit[1604]: CRED_DISP pid=1604 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:43:36.398409 sudo[1634]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 06:43:36.398513 sudo[1634]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 06:43:36.420065 kernel: audit: type=1106 audit(1707461016.275:169): pid=1601 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:43:36.275000 audit[1601]: USER_END pid=1601 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:43:36.452236 kernel: audit: type=1104 audit(1707461016.275:170): pid=1601 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:43:36.275000 audit[1601]: CRED_DISP pid=1601 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:43:36.478268 kernel: audit: type=1131 audit(1707461016.277:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-86.109.11.101:22-147.75.109.163:49644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:36.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-86.109.11.101:22-147.75.109.163:49644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:36.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-86.109.11.101:22-147.75.109.163:49650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:36.345000 audit[1631]: USER_ACCT pid=1631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:43:36.347000 audit[1631]: CRED_ACQ pid=1631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:43:36.347000 audit[1631]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7ee30460 a2=3 a3=0 items=0 ppid=1 pid=1631 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:36.347000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:43:36.348000 audit[1631]: USER_START pid=1631 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:43:36.348000 audit[1633]: CRED_ACQ pid=1633 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:43:36.395000 audit[1634]: USER_ACCT pid=1634 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:43:36.395000 audit[1634]: CRED_REFR pid=1634 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:43:36.398000 audit[1634]: USER_START pid=1634 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:43:37.729879 sshd[1583]: Failed password for root from 159.223.148.156 port 56742 ssh2 Feb 9 06:43:38.173364 sshd[1583]: Received disconnect from 159.223.148.156 port 56742:11: Bye Bye [preauth] Feb 9 06:43:38.173364 sshd[1583]: Disconnected from authenticating user root 159.223.148.156 port 56742 [preauth] Feb 9 06:43:38.175818 systemd[1]: sshd@3-86.109.11.101:22-159.223.148.156:56742.service: Deactivated successfully. Feb 9 06:43:38.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@3-86.109.11.101:22-159.223.148.156:56742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:40.431688 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 06:43:40.436071 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 06:43:40.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:40.436280 systemd[1]: Reached target network-online.target. Feb 9 06:43:40.437017 systemd[1]: Starting docker.service... Feb 9 06:43:40.459834 env[1656]: time="2024-02-09T06:43:40.459780069Z" level=info msg="Starting up" Feb 9 06:43:40.460452 env[1656]: time="2024-02-09T06:43:40.460418773Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 06:43:40.460452 env[1656]: time="2024-02-09T06:43:40.460427579Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 06:43:40.460498 env[1656]: time="2024-02-09T06:43:40.460459203Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 06:43:40.460498 env[1656]: time="2024-02-09T06:43:40.460465576Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 06:43:40.461435 env[1656]: time="2024-02-09T06:43:40.461403928Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 06:43:40.461435 env[1656]: time="2024-02-09T06:43:40.461414951Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 06:43:40.461435 env[1656]: time="2024-02-09T06:43:40.461427121Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 06:43:40.461532 env[1656]: time="2024-02-09T06:43:40.461456042Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 06:43:40.481482 env[1656]: time="2024-02-09T06:43:40.481433999Z" level=info msg="Loading containers: start." Feb 9 06:43:40.512000 audit[1698]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.512000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd012e8e50 a2=0 a3=7ffd012e8e3c items=0 ppid=1656 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.512000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 06:43:40.513000 audit[1700]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.513000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffea774db10 a2=0 a3=7ffea774dafc items=0 ppid=1656 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.513000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 06:43:40.514000 audit[1702]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.514000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff2d98bb80 a2=0 a3=7fff2d98bb6c items=0 ppid=1656 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.514000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 06:43:40.515000 audit[1704]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.515000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc3958ee00 a2=0 a3=7ffc3958edec items=0 ppid=1656 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.515000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 06:43:40.523000 audit[1706]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.523000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff483eea20 a2=0 a3=7fff483eea0c items=0 ppid=1656 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.523000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 06:43:40.557000 audit[1711]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.557000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe785ca0f0 a2=0 a3=7ffe785ca0dc items=0 ppid=1656 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.557000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 06:43:40.567000 audit[1713]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.567000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc1df1c790 a2=0 a3=7ffc1df1c77c items=0 ppid=1656 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.567000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 06:43:40.572000 audit[1715]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.572000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffcca7e5fb0 a2=0 a3=7ffcca7e5f9c items=0 ppid=1656 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.572000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 06:43:40.576000 audit[1717]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.576000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcce5bc6d0 a2=0 a3=7ffcce5bc6bc items=0 ppid=1656 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.576000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 06:43:40.589000 audit[1721]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.589000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffca1222d00 a2=0 a3=7ffca1222cec items=0 ppid=1656 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.589000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 06:43:40.591000 audit[1722]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.591000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffda578a6e0 a2=0 a3=7ffda578a6cc items=0 ppid=1656 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.591000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 06:43:40.616165 kernel: Initializing XFRM netlink socket Feb 9 06:43:40.665897 env[1656]: time="2024-02-09T06:43:40.665879257Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 06:43:40.678000 audit[1730]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.678000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff39db1970 a2=0 a3=7fff39db195c items=0 ppid=1656 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 06:43:40.695000 audit[1733]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.695000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe3cef8bc0 a2=0 a3=7ffe3cef8bac items=0 ppid=1656 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.695000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 06:43:40.696000 audit[1736]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.696000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff714f82a0 a2=0 a3=7fff714f828c items=0 ppid=1656 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.696000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 06:43:40.698000 audit[1738]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.698000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff81bffe90 a2=0 a3=7fff81bffe7c items=0 ppid=1656 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.698000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 06:43:40.699000 audit[1740]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.699000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc85905ce0 a2=0 a3=7ffc85905ccc items=0 ppid=1656 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.699000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 06:43:40.700000 audit[1742]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.700000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff41af9400 a2=0 a3=7fff41af93ec items=0 ppid=1656 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.700000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 06:43:40.701000 audit[1744]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.701000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd52604cc0 a2=0 a3=7ffd52604cac items=0 ppid=1656 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.701000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 06:43:40.734000 audit[1747]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.734000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc5ca29690 a2=0 a3=7ffc5ca2967c items=0 ppid=1656 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.734000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 06:43:40.739000 audit[1749]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.739000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcebc0e7f0 a2=0 a3=7ffcebc0e7dc items=0 ppid=1656 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.739000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 06:43:40.744000 audit[1751]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.744000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff47002dc0 a2=0 a3=7fff47002dac items=0 ppid=1656 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.744000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 06:43:40.749000 audit[1753]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.749000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc55583610 a2=0 a3=7ffc555835fc items=0 ppid=1656 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.749000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 06:43:40.751423 systemd-networkd[1305]: docker0: Link UP Feb 9 06:43:40.763000 audit[1757]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.763000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd040085a0 a2=0 a3=7ffd0400858c items=0 ppid=1656 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.763000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 06:43:40.765000 audit[1758]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:40.765000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc56341050 a2=0 a3=7ffc5634103c items=0 ppid=1656 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:40.765000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 06:43:40.767886 env[1656]: time="2024-02-09T06:43:40.767789822Z" level=info msg="Loading containers: done." Feb 9 06:43:40.786846 env[1656]: time="2024-02-09T06:43:40.786829972Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 06:43:40.786860 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck102863092-merged.mount: Deactivated successfully. Feb 9 06:43:40.786985 env[1656]: time="2024-02-09T06:43:40.786916134Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 06:43:40.786985 env[1656]: time="2024-02-09T06:43:40.786964203Z" level=info msg="Daemon has completed initialization" Feb 9 06:43:40.794241 systemd[1]: Started docker.service. Feb 9 06:43:40.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:40.797354 env[1656]: time="2024-02-09T06:43:40.797306209Z" level=info msg="API listen on /run/docker.sock" Feb 9 06:43:40.807949 systemd[1]: Reloading. Feb 9 06:43:40.842782 /usr/lib/systemd/system-generators/torcx-generator[1809]: time="2024-02-09T06:43:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 06:43:40.842800 /usr/lib/systemd/system-generators/torcx-generator[1809]: time="2024-02-09T06:43:40Z" level=info msg="torcx already run" Feb 9 06:43:40.903477 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 06:43:40.903487 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 06:43:40.916590 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit: BPF prog-id=34 op=LOAD Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.961000 audit: BPF prog-id=35 op=LOAD Feb 9 06:43:40.961000 audit: BPF prog-id=21 op=UNLOAD Feb 9 06:43:40.961000 audit: BPF prog-id=22 op=UNLOAD Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit: BPF prog-id=36 op=LOAD Feb 9 06:43:40.962000 audit: BPF prog-id=24 op=UNLOAD Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit: BPF prog-id=37 op=LOAD Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.962000 audit: BPF prog-id=38 op=LOAD Feb 9 06:43:40.962000 audit: BPF prog-id=25 op=UNLOAD Feb 9 06:43:40.962000 audit: BPF prog-id=26 op=UNLOAD Feb 9 06:43:40.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.963000 audit: BPF prog-id=39 op=LOAD Feb 9 06:43:40.963000 audit: BPF prog-id=23 op=UNLOAD Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit: BPF prog-id=40 op=LOAD Feb 9 06:43:40.964000 audit: BPF prog-id=27 op=UNLOAD Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.964000 audit: BPF prog-id=41 op=LOAD Feb 9 06:43:40.964000 audit: BPF prog-id=32 op=UNLOAD Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit: BPF prog-id=42 op=LOAD Feb 9 06:43:40.965000 audit: BPF prog-id=18 op=UNLOAD Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit: BPF prog-id=43 op=LOAD Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit: BPF prog-id=44 op=LOAD Feb 9 06:43:40.965000 audit: BPF prog-id=19 op=UNLOAD Feb 9 06:43:40.965000 audit: BPF prog-id=20 op=UNLOAD Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit: BPF prog-id=45 op=LOAD Feb 9 06:43:40.966000 audit: BPF prog-id=29 op=UNLOAD Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit: BPF prog-id=46 op=LOAD Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit: BPF prog-id=47 op=LOAD Feb 9 06:43:40.966000 audit: BPF prog-id=30 op=UNLOAD Feb 9 06:43:40.966000 audit: BPF prog-id=31 op=UNLOAD Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:40.967000 audit: BPF prog-id=48 op=LOAD Feb 9 06:43:40.967000 audit: BPF prog-id=28 op=UNLOAD Feb 9 06:43:40.972100 systemd[1]: Started kubelet.service. Feb 9 06:43:40.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:40.994594 kubelet[1868]: E0209 06:43:40.994516 1868 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 06:43:40.995644 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 06:43:40.995710 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 06:43:40.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 06:43:41.784320 env[1476]: time="2024-02-09T06:43:41.784198087Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 9 06:43:42.677329 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4260921396.mount: Deactivated successfully. Feb 9 06:43:44.325757 env[1476]: time="2024-02-09T06:43:44.325708089Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:44.326318 env[1476]: time="2024-02-09T06:43:44.326284257Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:44.327342 env[1476]: time="2024-02-09T06:43:44.327296037Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:44.328752 env[1476]: time="2024-02-09T06:43:44.328719531Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:44.329070 env[1476]: time="2024-02-09T06:43:44.329039357Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5\"" Feb 9 06:43:44.334646 env[1476]: time="2024-02-09T06:43:44.334571618Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 9 06:43:46.523656 env[1476]: time="2024-02-09T06:43:46.523597692Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:46.525011 env[1476]: time="2024-02-09T06:43:46.524965788Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:46.525878 env[1476]: time="2024-02-09T06:43:46.525845623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:46.526823 env[1476]: time="2024-02-09T06:43:46.526810841Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:46.527328 env[1476]: time="2024-02-09T06:43:46.527294050Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0\"" Feb 9 06:43:46.537918 env[1476]: time="2024-02-09T06:43:46.537883153Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 9 06:43:47.670631 env[1476]: time="2024-02-09T06:43:47.670587422Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:47.671339 env[1476]: time="2024-02-09T06:43:47.671326716Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:47.673215 env[1476]: time="2024-02-09T06:43:47.673168547Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:47.674177 env[1476]: time="2024-02-09T06:43:47.674116958Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:47.674588 env[1476]: time="2024-02-09T06:43:47.674533706Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975\"" Feb 9 06:43:47.682047 env[1476]: time="2024-02-09T06:43:47.681979780Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 06:43:48.670612 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1137590792.mount: Deactivated successfully. Feb 9 06:43:48.999991 env[1476]: time="2024-02-09T06:43:48.999943090Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:49.000578 env[1476]: time="2024-02-09T06:43:49.000537725Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:49.001176 env[1476]: time="2024-02-09T06:43:49.001119304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:49.002160 env[1476]: time="2024-02-09T06:43:49.002095880Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:49.002336 env[1476]: time="2024-02-09T06:43:49.002301233Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 9 06:43:49.008665 env[1476]: time="2024-02-09T06:43:49.008619177Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 06:43:49.528006 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount363528955.mount: Deactivated successfully. Feb 9 06:43:49.529395 env[1476]: time="2024-02-09T06:43:49.529344619Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:49.529906 env[1476]: time="2024-02-09T06:43:49.529866159Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:49.530483 env[1476]: time="2024-02-09T06:43:49.530437057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:49.531440 env[1476]: time="2024-02-09T06:43:49.531398922Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:49.531635 env[1476]: time="2024-02-09T06:43:49.531593001Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 06:43:49.536968 env[1476]: time="2024-02-09T06:43:49.536951916Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 9 06:43:50.194054 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount609805818.mount: Deactivated successfully. Feb 9 06:43:51.222828 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 06:43:51.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:51.223143 systemd[1]: Stopped kubelet.service. Feb 9 06:43:51.224979 systemd[1]: Started kubelet.service. Feb 9 06:43:51.228795 kernel: kauditd_printk_skb: 260 callbacks suppressed Feb 9 06:43:51.228834 kernel: audit: type=1130 audit(1707461031.222:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:51.250528 kubelet[1967]: E0209 06:43:51.250454 1967 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 06:43:51.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:51.252645 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 06:43:51.252713 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 06:43:51.306463 kernel: audit: type=1131 audit(1707461031.222:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:51.306499 kernel: audit: type=1130 audit(1707461031.224:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:51.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:51.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 06:43:51.418188 kernel: audit: type=1131 audit(1707461031.251:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 06:43:53.350393 env[1476]: time="2024-02-09T06:43:53.350366652Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:53.350981 env[1476]: time="2024-02-09T06:43:53.350968146Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:53.351905 env[1476]: time="2024-02-09T06:43:53.351894382Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:53.353167 env[1476]: time="2024-02-09T06:43:53.353118605Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:53.353486 env[1476]: time="2024-02-09T06:43:53.353474261Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Feb 9 06:43:53.359961 env[1476]: time="2024-02-09T06:43:53.359942687Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 06:43:53.999067 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3683871625.mount: Deactivated successfully. Feb 9 06:43:54.393525 systemd[1]: Started sshd@8-86.109.11.101:22-195.87.80.171:22212.service. Feb 9 06:43:54.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-86.109.11.101:22-195.87.80.171:22212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:54.475148 kernel: audit: type=1130 audit(1707461034.392:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-86.109.11.101:22-195.87.80.171:22212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:54.669123 env[1476]: time="2024-02-09T06:43:54.669038392Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:54.669775 env[1476]: time="2024-02-09T06:43:54.669738028Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:54.670423 env[1476]: time="2024-02-09T06:43:54.670388758Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:54.671037 env[1476]: time="2024-02-09T06:43:54.671003922Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:54.671428 env[1476]: time="2024-02-09T06:43:54.671372136Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 06:43:56.231506 sshd[1994]: Invalid user suporte from 195.87.80.171 port 22212 Feb 9 06:43:56.232848 sshd[1994]: pam_faillock(sshd:auth): User unknown Feb 9 06:43:56.233063 sshd[1994]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:43:56.233079 sshd[1994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.87.80.171 Feb 9 06:43:56.233256 sshd[1994]: pam_faillock(sshd:auth): User unknown Feb 9 06:43:56.232000 audit[1994]: USER_AUTH pid=1994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="suporte" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:43:56.319156 kernel: audit: type=1100 audit(1707461036.232:387): pid=1994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="suporte" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:43:56.787103 systemd[1]: Stopped kubelet.service. Feb 9 06:43:56.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:56.795410 systemd[1]: Reloading. Feb 9 06:43:56.826720 /usr/lib/systemd/system-generators/torcx-generator[2133]: time="2024-02-09T06:43:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 06:43:56.826770 /usr/lib/systemd/system-generators/torcx-generator[2133]: time="2024-02-09T06:43:56Z" level=info msg="torcx already run" Feb 9 06:43:56.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:56.851148 kernel: audit: type=1130 audit(1707461036.786:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:56.851188 kernel: audit: type=1131 audit(1707461036.786:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:56.934570 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 06:43:56.934578 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 06:43:56.945248 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 06:43:56.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:56.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.117519 kernel: audit: type=1400 audit(1707461036.990:390): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.117594 kernel: audit: type=1400 audit(1707461036.990:391): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.117609 kernel: audit: type=1400 audit(1707461036.990:392): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:56.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.181288 kernel: audit: type=1400 audit(1707461036.990:393): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:56.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.244978 kernel: audit: type=1400 audit(1707461036.990:394): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:56.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.309045 kernel: audit: type=1400 audit(1707461036.990:395): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:56.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.373163 kernel: audit: type=1400 audit(1707461036.990:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:56.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:56.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.053000 audit: BPF prog-id=49 op=LOAD Feb 9 06:43:57.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.180000 audit: BPF prog-id=50 op=LOAD Feb 9 06:43:57.180000 audit: BPF prog-id=34 op=UNLOAD Feb 9 06:43:57.180000 audit: BPF prog-id=35 op=UNLOAD Feb 9 06:43:57.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.307000 audit: BPF prog-id=51 op=LOAD Feb 9 06:43:57.307000 audit: BPF prog-id=36 op=UNLOAD Feb 9 06:43:57.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.436000 audit: BPF prog-id=52 op=LOAD Feb 9 06:43:57.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.436000 audit: BPF prog-id=53 op=LOAD Feb 9 06:43:57.436000 audit: BPF prog-id=37 op=UNLOAD Feb 9 06:43:57.436000 audit: BPF prog-id=38 op=UNLOAD Feb 9 06:43:57.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.437000 audit: BPF prog-id=54 op=LOAD Feb 9 06:43:57.437000 audit: BPF prog-id=39 op=UNLOAD Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit: BPF prog-id=55 op=LOAD Feb 9 06:43:57.438000 audit: BPF prog-id=40 op=UNLOAD Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.438000 audit: BPF prog-id=56 op=LOAD Feb 9 06:43:57.438000 audit: BPF prog-id=41 op=UNLOAD Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit: BPF prog-id=57 op=LOAD Feb 9 06:43:57.439000 audit: BPF prog-id=42 op=UNLOAD Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit: BPF prog-id=58 op=LOAD Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.439000 audit: BPF prog-id=59 op=LOAD Feb 9 06:43:57.439000 audit: BPF prog-id=43 op=UNLOAD Feb 9 06:43:57.439000 audit: BPF prog-id=44 op=UNLOAD Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit: BPF prog-id=60 op=LOAD Feb 9 06:43:57.440000 audit: BPF prog-id=45 op=UNLOAD Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit: BPF prog-id=61 op=LOAD Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.440000 audit: BPF prog-id=62 op=LOAD Feb 9 06:43:57.440000 audit: BPF prog-id=46 op=UNLOAD Feb 9 06:43:57.440000 audit: BPF prog-id=47 op=UNLOAD Feb 9 06:43:57.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.441000 audit: BPF prog-id=63 op=LOAD Feb 9 06:43:57.441000 audit: BPF prog-id=48 op=UNLOAD Feb 9 06:43:57.448657 systemd[1]: Started kubelet.service. Feb 9 06:43:57.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:57.470906 kubelet[2193]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 06:43:57.470906 kubelet[2193]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 06:43:57.470906 kubelet[2193]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 06:43:57.471129 kubelet[2193]: I0209 06:43:57.470903 2193 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 06:43:57.593159 kubelet[2193]: I0209 06:43:57.593104 2193 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 06:43:57.593159 kubelet[2193]: I0209 06:43:57.593116 2193 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 06:43:57.593222 kubelet[2193]: I0209 06:43:57.593219 2193 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 06:43:57.595083 kubelet[2193]: I0209 06:43:57.595046 2193 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 06:43:57.595572 kubelet[2193]: E0209 06:43:57.595534 2193 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://86.109.11.101:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 86.109.11.101:6443: connect: connection refused Feb 9 06:43:57.613944 kubelet[2193]: I0209 06:43:57.613906 2193 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 06:43:57.614012 kubelet[2193]: I0209 06:43:57.614006 2193 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 06:43:57.614050 kubelet[2193]: I0209 06:43:57.614044 2193 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 06:43:57.614116 kubelet[2193]: I0209 06:43:57.614056 2193 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 06:43:57.614116 kubelet[2193]: I0209 06:43:57.614064 2193 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 06:43:57.614157 kubelet[2193]: I0209 06:43:57.614116 2193 state_mem.go:36] "Initialized new in-memory state store" Feb 9 06:43:57.615326 kubelet[2193]: I0209 06:43:57.615290 2193 kubelet.go:405] "Attempting to sync node with API server" Feb 9 06:43:57.615326 kubelet[2193]: I0209 06:43:57.615300 2193 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 06:43:57.615326 kubelet[2193]: I0209 06:43:57.615310 2193 kubelet.go:309] "Adding apiserver pod source" Feb 9 06:43:57.615326 kubelet[2193]: I0209 06:43:57.615318 2193 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 06:43:57.615555 kubelet[2193]: I0209 06:43:57.615506 2193 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 06:43:57.615588 kubelet[2193]: W0209 06:43:57.615547 2193 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://86.109.11.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-4a81ef77ce&limit=500&resourceVersion=0": dial tcp 86.109.11.101:6443: connect: connection refused Feb 9 06:43:57.615588 kubelet[2193]: E0209 06:43:57.615578 2193 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://86.109.11.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-4a81ef77ce&limit=500&resourceVersion=0": dial tcp 86.109.11.101:6443: connect: connection refused Feb 9 06:43:57.615633 kubelet[2193]: W0209 06:43:57.615606 2193 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://86.109.11.101:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 86.109.11.101:6443: connect: connection refused Feb 9 06:43:57.615633 kubelet[2193]: W0209 06:43:57.615631 2193 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 06:43:57.615667 kubelet[2193]: E0209 06:43:57.615639 2193 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://86.109.11.101:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 86.109.11.101:6443: connect: connection refused Feb 9 06:43:57.615876 kubelet[2193]: I0209 06:43:57.615841 2193 server.go:1168] "Started kubelet" Feb 9 06:43:57.615908 kubelet[2193]: I0209 06:43:57.615889 2193 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 06:43:57.615933 kubelet[2193]: I0209 06:43:57.615908 2193 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 06:43:57.616058 kubelet[2193]: E0209 06:43:57.616050 2193 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 06:43:57.616091 kubelet[2193]: E0209 06:43:57.616064 2193 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 06:43:57.616116 kubelet[2193]: E0209 06:43:57.616063 2193 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-4a81ef77ce.17b21ec466e9563d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-4a81ef77ce", UID:"ci-3510.3.2-a-4a81ef77ce", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-4a81ef77ce"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 43, 57, 615830589, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 43, 57, 615830589, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://86.109.11.101:6443/api/v1/namespaces/default/events": dial tcp 86.109.11.101:6443: connect: connection refused'(may retry after sleeping) Feb 9 06:43:57.616457 kubelet[2193]: I0209 06:43:57.616451 2193 server.go:461] "Adding debug handlers to kubelet server" Feb 9 06:43:57.615000 audit[2193]: AVC avc: denied { mac_admin } for pid=2193 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.615000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 06:43:57.615000 audit[2193]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001122bd0 a1=c000612678 a2=c001122ba0 a3=25 items=0 ppid=1 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.615000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 06:43:57.615000 audit[2193]: AVC avc: denied { mac_admin } for pid=2193 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.615000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 06:43:57.615000 audit[2193]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00008d5c0 a1=c000612690 a2=c001122c60 a3=25 items=0 ppid=1 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.615000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 06:43:57.616778 kubelet[2193]: I0209 06:43:57.616517 2193 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 06:43:57.616778 kubelet[2193]: I0209 06:43:57.616536 2193 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 06:43:57.616778 kubelet[2193]: I0209 06:43:57.616567 2193 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 06:43:57.616778 kubelet[2193]: E0209 06:43:57.616607 2193 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-4a81ef77ce\" not found" Feb 9 06:43:57.616778 kubelet[2193]: I0209 06:43:57.616629 2193 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 06:43:57.616778 kubelet[2193]: I0209 06:43:57.616679 2193 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 06:43:57.616945 kubelet[2193]: E0209 06:43:57.616784 2193 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://86.109.11.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-4a81ef77ce?timeout=10s\": dial tcp 86.109.11.101:6443: connect: connection refused" interval="200ms" Feb 9 06:43:57.616945 kubelet[2193]: W0209 06:43:57.616853 2193 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://86.109.11.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 86.109.11.101:6443: connect: connection refused Feb 9 06:43:57.616945 kubelet[2193]: E0209 06:43:57.616882 2193 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://86.109.11.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 86.109.11.101:6443: connect: connection refused Feb 9 06:43:57.617000 audit[2217]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:57.617000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffec1a9de80 a2=0 a3=7ffec1a9de6c items=0 ppid=2193 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 06:43:57.617000 audit[2218]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:57.617000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf0a72920 a2=0 a3=7ffdf0a7290c items=0 ppid=2193 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 06:43:57.618000 audit[2220]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:57.618000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd2a209b00 a2=0 a3=7ffd2a209aec items=0 ppid=2193 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.618000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 06:43:57.619000 audit[2222]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:57.619000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff8d8e60b0 a2=0 a3=7fff8d8e609c items=0 ppid=2193 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 06:43:57.622000 audit[2225]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:57.622000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffec60a24d0 a2=0 a3=7ffec60a24bc items=0 ppid=2193 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 06:43:57.623664 kubelet[2193]: I0209 06:43:57.623623 2193 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 06:43:57.622000 audit[2226]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:43:57.622000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca658dad0 a2=0 a3=7ffca658dabc items=0 ppid=2193 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.622000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 06:43:57.622000 audit[2227]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:57.622000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc848ac990 a2=0 a3=7ffc848ac97c items=0 ppid=2193 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 06:43:57.624241 kubelet[2193]: I0209 06:43:57.624062 2193 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 06:43:57.624241 kubelet[2193]: I0209 06:43:57.624079 2193 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 06:43:57.624241 kubelet[2193]: I0209 06:43:57.624097 2193 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 06:43:57.624241 kubelet[2193]: E0209 06:43:57.624134 2193 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 06:43:57.624337 kubelet[2193]: W0209 06:43:57.624302 2193 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://86.109.11.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 86.109.11.101:6443: connect: connection refused Feb 9 06:43:57.624337 kubelet[2193]: E0209 06:43:57.624330 2193 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://86.109.11.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 86.109.11.101:6443: connect: connection refused Feb 9 06:43:57.623000 audit[2229]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:43:57.623000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb2260980 a2=0 a3=7ffcb226096c items=0 ppid=2193 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.623000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 06:43:57.623000 audit[2230]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:57.623000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbbe0f450 a2=0 a3=7ffdbbe0f43c items=0 ppid=2193 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 06:43:57.623000 audit[2231]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:43:57.623000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffda9b6e630 a2=0 a3=7ffda9b6e61c items=0 ppid=2193 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.623000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 06:43:57.623000 audit[2232]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:43:57.623000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe78806c20 a2=0 a3=7ffe78806c0c items=0 ppid=2193 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 06:43:57.624000 audit[2233]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:43:57.624000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe33cd6860 a2=0 a3=7ffe33cd684c items=0 ppid=2193 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 06:43:57.636559 kubelet[2193]: I0209 06:43:57.636528 2193 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 06:43:57.636559 kubelet[2193]: I0209 06:43:57.636554 2193 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 06:43:57.636614 kubelet[2193]: I0209 06:43:57.636561 2193 state_mem.go:36] "Initialized new in-memory state store" Feb 9 06:43:57.637350 kubelet[2193]: I0209 06:43:57.637313 2193 policy_none.go:49] "None policy: Start" Feb 9 06:43:57.637603 kubelet[2193]: I0209 06:43:57.637561 2193 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 06:43:57.637603 kubelet[2193]: I0209 06:43:57.637573 2193 state_mem.go:35] "Initializing new in-memory state store" Feb 9 06:43:57.639801 systemd[1]: Created slice kubepods.slice. Feb 9 06:43:57.641772 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 06:43:57.643291 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 06:43:57.658000 audit[2193]: AVC avc: denied { mac_admin } for pid=2193 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:57.658000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 06:43:57.658000 audit[2193]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001434210 a1=c0014383d8 a2=c0014341e0 a3=25 items=0 ppid=1 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:57.658000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 06:43:57.659819 kubelet[2193]: I0209 06:43:57.659589 2193 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 06:43:57.659819 kubelet[2193]: I0209 06:43:57.659623 2193 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 06:43:57.659819 kubelet[2193]: I0209 06:43:57.659721 2193 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 06:43:57.659998 kubelet[2193]: E0209 06:43:57.659989 2193 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-4a81ef77ce\" not found" Feb 9 06:43:57.720898 kubelet[2193]: I0209 06:43:57.720814 2193 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:57.721562 kubelet[2193]: E0209 06:43:57.721489 2193 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://86.109.11.101:6443/api/v1/nodes\": dial tcp 86.109.11.101:6443: connect: connection refused" node="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:57.724792 kubelet[2193]: I0209 06:43:57.724714 2193 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:43:57.727711 kubelet[2193]: I0209 06:43:57.727633 2193 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:43:57.730734 kubelet[2193]: I0209 06:43:57.730659 2193 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:43:57.741736 systemd[1]: Created slice kubepods-burstable-podec615c25665378dc04ec67806fc8c602.slice. Feb 9 06:43:57.778721 systemd[1]: Created slice kubepods-burstable-pod805b379b015479a6799d1bf0da2fc079.slice. Feb 9 06:43:57.813257 systemd[1]: Created slice kubepods-burstable-podc2a136a002afb0c8209b7b89a2b52678.slice. Feb 9 06:43:57.817602 kubelet[2193]: I0209 06:43:57.817523 2193 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c2a136a002afb0c8209b7b89a2b52678-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-4a81ef77ce\" (UID: \"c2a136a002afb0c8209b7b89a2b52678\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:57.817602 kubelet[2193]: E0209 06:43:57.817572 2193 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://86.109.11.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-4a81ef77ce?timeout=10s\": dial tcp 86.109.11.101:6443: connect: connection refused" interval="400ms" Feb 9 06:43:57.918648 kubelet[2193]: I0209 06:43:57.918452 2193 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ec615c25665378dc04ec67806fc8c602-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-4a81ef77ce\" (UID: \"ec615c25665378dc04ec67806fc8c602\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:57.918648 kubelet[2193]: I0209 06:43:57.918544 2193 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/805b379b015479a6799d1bf0da2fc079-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-4a81ef77ce\" (UID: \"805b379b015479a6799d1bf0da2fc079\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:57.918947 kubelet[2193]: I0209 06:43:57.918687 2193 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/805b379b015479a6799d1bf0da2fc079-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-4a81ef77ce\" (UID: \"805b379b015479a6799d1bf0da2fc079\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:57.918947 kubelet[2193]: I0209 06:43:57.918808 2193 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/805b379b015479a6799d1bf0da2fc079-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-4a81ef77ce\" (UID: \"805b379b015479a6799d1bf0da2fc079\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:57.919283 kubelet[2193]: I0209 06:43:57.918967 2193 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ec615c25665378dc04ec67806fc8c602-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-4a81ef77ce\" (UID: \"ec615c25665378dc04ec67806fc8c602\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:57.919283 kubelet[2193]: I0209 06:43:57.919022 2193 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ec615c25665378dc04ec67806fc8c602-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-4a81ef77ce\" (UID: \"ec615c25665378dc04ec67806fc8c602\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:57.919283 kubelet[2193]: I0209 06:43:57.919102 2193 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/805b379b015479a6799d1bf0da2fc079-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-4a81ef77ce\" (UID: \"805b379b015479a6799d1bf0da2fc079\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:57.919283 kubelet[2193]: I0209 06:43:57.919262 2193 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/805b379b015479a6799d1bf0da2fc079-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-4a81ef77ce\" (UID: \"805b379b015479a6799d1bf0da2fc079\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:57.925847 kubelet[2193]: I0209 06:43:57.925769 2193 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:57.926496 kubelet[2193]: E0209 06:43:57.926423 2193 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://86.109.11.101:6443/api/v1/nodes\": dial tcp 86.109.11.101:6443: connect: connection refused" node="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:58.074314 env[1476]: time="2024-02-09T06:43:58.074186141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-4a81ef77ce,Uid:ec615c25665378dc04ec67806fc8c602,Namespace:kube-system,Attempt:0,}" Feb 9 06:43:58.084283 env[1476]: time="2024-02-09T06:43:58.084172018Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-4a81ef77ce,Uid:805b379b015479a6799d1bf0da2fc079,Namespace:kube-system,Attempt:0,}" Feb 9 06:43:58.119065 env[1476]: time="2024-02-09T06:43:58.118950690Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-4a81ef77ce,Uid:c2a136a002afb0c8209b7b89a2b52678,Namespace:kube-system,Attempt:0,}" Feb 9 06:43:58.187585 sshd[1994]: Failed password for invalid user suporte from 195.87.80.171 port 22212 ssh2 Feb 9 06:43:58.218604 kubelet[2193]: E0209 06:43:58.218507 2193 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://86.109.11.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-4a81ef77ce?timeout=10s\": dial tcp 86.109.11.101:6443: connect: connection refused" interval="800ms" Feb 9 06:43:58.330133 kubelet[2193]: I0209 06:43:58.330034 2193 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:58.330809 kubelet[2193]: E0209 06:43:58.330732 2193 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://86.109.11.101:6443/api/v1/nodes\": dial tcp 86.109.11.101:6443: connect: connection refused" node="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:58.463511 kubelet[2193]: W0209 06:43:58.463275 2193 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://86.109.11.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 86.109.11.101:6443: connect: connection refused Feb 9 06:43:58.463511 kubelet[2193]: E0209 06:43:58.463394 2193 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://86.109.11.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 86.109.11.101:6443: connect: connection refused Feb 9 06:43:58.597020 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1619862751.mount: Deactivated successfully. Feb 9 06:43:58.598021 env[1476]: time="2024-02-09T06:43:58.597982526Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:58.599228 env[1476]: time="2024-02-09T06:43:58.599211480Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:58.599908 env[1476]: time="2024-02-09T06:43:58.599893083Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:58.600568 env[1476]: time="2024-02-09T06:43:58.600554814Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:58.600949 env[1476]: time="2024-02-09T06:43:58.600936838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:58.601742 env[1476]: time="2024-02-09T06:43:58.601728895Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:58.603316 env[1476]: time="2024-02-09T06:43:58.603304447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:58.605077 env[1476]: time="2024-02-09T06:43:58.605065048Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:58.605869 env[1476]: time="2024-02-09T06:43:58.605856146Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:58.606274 env[1476]: time="2024-02-09T06:43:58.606261552Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:58.606625 env[1476]: time="2024-02-09T06:43:58.606615015Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:58.606964 env[1476]: time="2024-02-09T06:43:58.606953683Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:43:58.611075 env[1476]: time="2024-02-09T06:43:58.611040201Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:43:58.611075 env[1476]: time="2024-02-09T06:43:58.611061954Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:43:58.611075 env[1476]: time="2024-02-09T06:43:58.611069187Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:43:58.611233 env[1476]: time="2024-02-09T06:43:58.611150225Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e516abcbe30203faf335b14380beb1ee337b2be236490c5cbb2f844cedbf1503 pid=2241 runtime=io.containerd.runc.v2 Feb 9 06:43:58.611986 env[1476]: time="2024-02-09T06:43:58.611959230Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:43:58.611986 env[1476]: time="2024-02-09T06:43:58.611978347Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:43:58.612068 env[1476]: time="2024-02-09T06:43:58.611988994Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:43:58.612068 env[1476]: time="2024-02-09T06:43:58.612056933Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1e99bf6ad53665d311802468b242160b2a15da69f5e5255bc44b8e570f1fc5fd pid=2252 runtime=io.containerd.runc.v2 Feb 9 06:43:58.613386 env[1476]: time="2024-02-09T06:43:58.613355306Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:43:58.613386 env[1476]: time="2024-02-09T06:43:58.613377901Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:43:58.613456 env[1476]: time="2024-02-09T06:43:58.613386532Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:43:58.613492 env[1476]: time="2024-02-09T06:43:58.613449938Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/234f3a4b6dbbc25ebc6418d490b78ba6b430e5941dd9fac8d0c34e36ea28b0e2 pid=2274 runtime=io.containerd.runc.v2 Feb 9 06:43:58.617360 systemd[1]: Started cri-containerd-1e99bf6ad53665d311802468b242160b2a15da69f5e5255bc44b8e570f1fc5fd.scope. Feb 9 06:43:58.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit: BPF prog-id=64 op=LOAD Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2252 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165393962663661643533363635643331313830323436386232343231 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2252 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165393962663661643533363635643331313830323436386232343231 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit: BPF prog-id=65 op=LOAD Feb 9 06:43:58.622000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000251a0 items=0 ppid=2252 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165393962663661643533363635643331313830323436386232343231 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit: BPF prog-id=66 op=LOAD Feb 9 06:43:58.622000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000251e8 items=0 ppid=2252 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165393962663661643533363635643331313830323436386232343231 Feb 9 06:43:58.622000 audit: BPF prog-id=66 op=UNLOAD Feb 9 06:43:58.622000 audit: BPF prog-id=65 op=UNLOAD Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { perfmon } for pid=2275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit[2275]: AVC avc: denied { bpf } for pid=2275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.622000 audit: BPF prog-id=67 op=LOAD Feb 9 06:43:58.622000 audit[2275]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000255f8 items=0 ppid=2252 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165393962663661643533363635643331313830323436386232343231 Feb 9 06:43:58.627065 kubelet[2193]: W0209 06:43:58.627033 2193 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://86.109.11.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 86.109.11.101:6443: connect: connection refused Feb 9 06:43:58.627065 kubelet[2193]: E0209 06:43:58.627068 2193 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://86.109.11.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 86.109.11.101:6443: connect: connection refused Feb 9 06:43:58.627705 systemd[1]: Started cri-containerd-e516abcbe30203faf335b14380beb1ee337b2be236490c5cbb2f844cedbf1503.scope. Feb 9 06:43:58.629709 systemd[1]: Started cri-containerd-234f3a4b6dbbc25ebc6418d490b78ba6b430e5941dd9fac8d0c34e36ea28b0e2.scope. Feb 9 06:43:58.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.632000 audit: BPF prog-id=68 op=LOAD Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2241 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535313661626362653330323033666166333335623134333830626562 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2241 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535313661626362653330323033666166333335623134333830626562 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit: BPF prog-id=69 op=LOAD Feb 9 06:43:58.633000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a1730 items=0 ppid=2241 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535313661626362653330323033666166333335623134333830626562 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit: BPF prog-id=70 op=LOAD Feb 9 06:43:58.633000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a1778 items=0 ppid=2241 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535313661626362653330323033666166333335623134333830626562 Feb 9 06:43:58.633000 audit: BPF prog-id=70 op=UNLOAD Feb 9 06:43:58.633000 audit: BPF prog-id=69 op=UNLOAD Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { perfmon } for pid=2266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit[2266]: AVC avc: denied { bpf } for pid=2266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.633000 audit: BPF prog-id=71 op=LOAD Feb 9 06:43:58.633000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a1b88 items=0 ppid=2241 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535313661626362653330323033666166333335623134333830626562 Feb 9 06:43:58.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit: BPF prog-id=72 op=LOAD Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2274 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233346633613462366462626332356562633634313864343930623738 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2274 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233346633613462366462626332356562633634313864343930623738 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit: BPF prog-id=73 op=LOAD Feb 9 06:43:58.634000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000220a90 items=0 ppid=2274 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233346633613462366462626332356562633634313864343930623738 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit: BPF prog-id=74 op=LOAD Feb 9 06:43:58.634000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000220ad8 items=0 ppid=2274 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233346633613462366462626332356562633634313864343930623738 Feb 9 06:43:58.634000 audit: BPF prog-id=74 op=UNLOAD Feb 9 06:43:58.634000 audit: BPF prog-id=73 op=UNLOAD Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.634000 audit: BPF prog-id=75 op=LOAD Feb 9 06:43:58.634000 audit[2294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000220ee8 items=0 ppid=2274 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233346633613462366462626332356562633634313864343930623738 Feb 9 06:43:58.651788 env[1476]: time="2024-02-09T06:43:58.651759004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-4a81ef77ce,Uid:ec615c25665378dc04ec67806fc8c602,Namespace:kube-system,Attempt:0,} returns sandbox id \"e516abcbe30203faf335b14380beb1ee337b2be236490c5cbb2f844cedbf1503\"" Feb 9 06:43:58.652374 env[1476]: time="2024-02-09T06:43:58.652356513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-4a81ef77ce,Uid:c2a136a002afb0c8209b7b89a2b52678,Namespace:kube-system,Attempt:0,} returns sandbox id \"234f3a4b6dbbc25ebc6418d490b78ba6b430e5941dd9fac8d0c34e36ea28b0e2\"" Feb 9 06:43:58.653153 env[1476]: time="2024-02-09T06:43:58.653138400Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-4a81ef77ce,Uid:805b379b015479a6799d1bf0da2fc079,Namespace:kube-system,Attempt:0,} returns sandbox id \"1e99bf6ad53665d311802468b242160b2a15da69f5e5255bc44b8e570f1fc5fd\"" Feb 9 06:43:58.653529 env[1476]: time="2024-02-09T06:43:58.653515466Z" level=info msg="CreateContainer within sandbox \"234f3a4b6dbbc25ebc6418d490b78ba6b430e5941dd9fac8d0c34e36ea28b0e2\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 06:43:58.653559 env[1476]: time="2024-02-09T06:43:58.653541984Z" level=info msg="CreateContainer within sandbox \"e516abcbe30203faf335b14380beb1ee337b2be236490c5cbb2f844cedbf1503\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 06:43:58.654198 env[1476]: time="2024-02-09T06:43:58.654184369Z" level=info msg="CreateContainer within sandbox \"1e99bf6ad53665d311802468b242160b2a15da69f5e5255bc44b8e570f1fc5fd\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 06:43:58.659377 env[1476]: time="2024-02-09T06:43:58.659332128Z" level=info msg="CreateContainer within sandbox \"e516abcbe30203faf335b14380beb1ee337b2be236490c5cbb2f844cedbf1503\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"72e6cde23ddec12ee06db220947bf502b9a286e7005608cd402270faf1e6ac8d\"" Feb 9 06:43:58.659570 env[1476]: time="2024-02-09T06:43:58.659557667Z" level=info msg="StartContainer for \"72e6cde23ddec12ee06db220947bf502b9a286e7005608cd402270faf1e6ac8d\"" Feb 9 06:43:58.660328 env[1476]: time="2024-02-09T06:43:58.660312262Z" level=info msg="CreateContainer within sandbox \"234f3a4b6dbbc25ebc6418d490b78ba6b430e5941dd9fac8d0c34e36ea28b0e2\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"041f61094910214a28f62352482567369e7cba32be2ba2e666d9b30fc36c57c9\"" Feb 9 06:43:58.660538 env[1476]: time="2024-02-09T06:43:58.660525313Z" level=info msg="StartContainer for \"041f61094910214a28f62352482567369e7cba32be2ba2e666d9b30fc36c57c9\"" Feb 9 06:43:58.661747 env[1476]: time="2024-02-09T06:43:58.661709493Z" level=info msg="CreateContainer within sandbox \"1e99bf6ad53665d311802468b242160b2a15da69f5e5255bc44b8e570f1fc5fd\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"bdcb532f0abcbabd1f0975aad77cdbbf9a4d1a0cd9696b7905854cbad87d4f74\"" Feb 9 06:43:58.661879 env[1476]: time="2024-02-09T06:43:58.661866876Z" level=info msg="StartContainer for \"bdcb532f0abcbabd1f0975aad77cdbbf9a4d1a0cd9696b7905854cbad87d4f74\"" Feb 9 06:43:58.667384 systemd[1]: Started cri-containerd-72e6cde23ddec12ee06db220947bf502b9a286e7005608cd402270faf1e6ac8d.scope. Feb 9 06:43:58.669641 systemd[1]: Started cri-containerd-bdcb532f0abcbabd1f0975aad77cdbbf9a4d1a0cd9696b7905854cbad87d4f74.scope. Feb 9 06:43:58.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.672000 audit: BPF prog-id=76 op=LOAD Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2241 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653663646532336464656331326565303664623232303934376266 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2241 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653663646532336464656331326565303664623232303934376266 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit: BPF prog-id=77 op=LOAD Feb 9 06:43:58.673000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024ed0 items=0 ppid=2241 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653663646532336464656331326565303664623232303934376266 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit: BPF prog-id=78 op=LOAD Feb 9 06:43:58.673000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024f18 items=0 ppid=2241 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653663646532336464656331326565303664623232303934376266 Feb 9 06:43:58.673000 audit: BPF prog-id=78 op=UNLOAD Feb 9 06:43:58.673000 audit: BPF prog-id=77 op=UNLOAD Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.673000 audit: BPF prog-id=79 op=LOAD Feb 9 06:43:58.673000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025328 items=0 ppid=2241 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653663646532336464656331326565303664623232303934376266 Feb 9 06:43:58.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit: BPF prog-id=80 op=LOAD Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=2252 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264636235333266306162636261626431663039373561616437376364 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=c items=0 ppid=2252 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264636235333266306162636261626431663039373561616437376364 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit: BPF prog-id=81 op=LOAD Feb 9 06:43:58.675000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c000309990 items=0 ppid=2252 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264636235333266306162636261626431663039373561616437376364 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit: BPF prog-id=82 op=LOAD Feb 9 06:43:58.675000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c0003099d8 items=0 ppid=2252 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264636235333266306162636261626431663039373561616437376364 Feb 9 06:43:58.675000 audit: BPF prog-id=82 op=UNLOAD Feb 9 06:43:58.675000 audit: BPF prog-id=81 op=UNLOAD Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.675000 audit: BPF prog-id=83 op=LOAD Feb 9 06:43:58.675000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c000309de8 items=0 ppid=2252 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264636235333266306162636261626431663039373561616437376364 Feb 9 06:43:58.678771 systemd[1]: Started cri-containerd-041f61094910214a28f62352482567369e7cba32be2ba2e666d9b30fc36c57c9.scope. Feb 9 06:43:58.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit: BPF prog-id=84 op=LOAD Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2274 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034316636313039343931303231346132386636323335323438323536 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2274 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034316636313039343931303231346132386636323335323438323536 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit: BPF prog-id=85 op=LOAD Feb 9 06:43:58.684000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003c86b0 items=0 ppid=2274 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034316636313039343931303231346132386636323335323438323536 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit: BPF prog-id=86 op=LOAD Feb 9 06:43:58.684000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003c86f8 items=0 ppid=2274 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034316636313039343931303231346132386636323335323438323536 Feb 9 06:43:58.684000 audit: BPF prog-id=86 op=UNLOAD Feb 9 06:43:58.684000 audit: BPF prog-id=85 op=UNLOAD Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:43:58.684000 audit: BPF prog-id=87 op=LOAD Feb 9 06:43:58.684000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003c8b08 items=0 ppid=2274 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:43:58.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034316636313039343931303231346132386636323335323438323536 Feb 9 06:43:58.698550 env[1476]: time="2024-02-09T06:43:58.698521201Z" level=info msg="StartContainer for \"bdcb532f0abcbabd1f0975aad77cdbbf9a4d1a0cd9696b7905854cbad87d4f74\" returns successfully" Feb 9 06:43:58.703380 env[1476]: time="2024-02-09T06:43:58.703353508Z" level=info msg="StartContainer for \"041f61094910214a28f62352482567369e7cba32be2ba2e666d9b30fc36c57c9\" returns successfully" Feb 9 06:43:58.704107 env[1476]: time="2024-02-09T06:43:58.704076163Z" level=info msg="StartContainer for \"72e6cde23ddec12ee06db220947bf502b9a286e7005608cd402270faf1e6ac8d\" returns successfully" Feb 9 06:43:59.132643 kubelet[2193]: I0209 06:43:59.132599 2193 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:59.331000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:43:59.331000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:43:59.331000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0077b2020 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:43:59.331000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c0038bc030 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:43:59.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:43:59.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:43:59.331000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:43:59.331000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c003baa060 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:43:59.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:43:59.340000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:43:59.340000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c003779220 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:43:59.340000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:43:59.340000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:43:59.340000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c0041bc840 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:43:59.340000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:43:59.340000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:43:59.340000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c004072030 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:43:59.340000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:43:59.348019 kubelet[2193]: E0209 06:43:59.348001 2193 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-4a81ef77ce\" not found" node="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:59.440935 kubelet[2193]: I0209 06:43:59.440876 2193 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:59.460000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:43:59.460000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:43:59.460000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00104c000 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:43:59.460000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000944020 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:43:59.460000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:43:59.460000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:43:59.495927 sshd[1994]: Received disconnect from 195.87.80.171 port 22212:11: Bye Bye [preauth] Feb 9 06:43:59.495927 sshd[1994]: Disconnected from invalid user suporte 195.87.80.171 port 22212 [preauth] Feb 9 06:43:59.498270 systemd[1]: sshd@8-86.109.11.101:22-195.87.80.171:22212.service: Deactivated successfully. Feb 9 06:43:59.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-86.109.11.101:22-195.87.80.171:22212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:43:59.616639 kubelet[2193]: I0209 06:43:59.616547 2193 apiserver.go:52] "Watching apiserver" Feb 9 06:43:59.640587 kubelet[2193]: E0209 06:43:59.640497 2193 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-4a81ef77ce\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:59.640587 kubelet[2193]: E0209 06:43:59.640510 2193 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-4a81ef77ce\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:59.641401 kubelet[2193]: E0209 06:43:59.640516 2193 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-4a81ef77ce\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:43:59.718372 kubelet[2193]: I0209 06:43:59.718180 2193 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 06:43:59.730879 kubelet[2193]: I0209 06:43:59.730762 2193 reconciler.go:41] "Reconciler: start to sync state" Feb 9 06:44:00.645627 kubelet[2193]: W0209 06:44:00.645573 2193 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 06:44:02.237716 kubelet[2193]: W0209 06:44:02.237656 2193 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 06:44:02.601700 systemd[1]: Reloading. Feb 9 06:44:02.636100 /usr/lib/systemd/system-generators/torcx-generator[2523]: time="2024-02-09T06:44:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 06:44:02.636116 /usr/lib/systemd/system-generators/torcx-generator[2523]: time="2024-02-09T06:44:02Z" level=info msg="torcx already run" Feb 9 06:44:02.693901 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 06:44:02.693912 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 06:44:02.707541 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 06:44:02.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.787798 kernel: kauditd_printk_skb: 581 callbacks suppressed Feb 9 06:44:02.787824 kernel: audit: type=1400 audit(1707461042.759:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.916361 kernel: audit: type=1400 audit(1707461042.759:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.916409 kernel: audit: type=1400 audit(1707461042.759:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.981092 kernel: audit: type=1400 audit(1707461042.759:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.045142 kernel: audit: type=1400 audit(1707461042.759:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.108746 kernel: audit: type=1400 audit(1707461042.759:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.172283 kernel: audit: type=1400 audit(1707461042.759:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.236712 kernel: audit: type=1400 audit(1707461042.759:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.301048 kernel: audit: type=1400 audit(1707461042.850:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.365386 kernel: audit: type=1334 audit(1707461042.850:704): prog-id=88 op=LOAD Feb 9 06:44:02.850000 audit: BPF prog-id=88 op=LOAD Feb 9 06:44:02.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.980000 audit: BPF prog-id=89 op=LOAD Feb 9 06:44:02.980000 audit: BPF prog-id=49 op=UNLOAD Feb 9 06:44:02.980000 audit: BPF prog-id=50 op=UNLOAD Feb 9 06:44:02.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:02.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.171000 audit: BPF prog-id=90 op=LOAD Feb 9 06:44:03.171000 audit: BPF prog-id=51 op=UNLOAD Feb 9 06:44:03.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.299000 audit: BPF prog-id=91 op=LOAD Feb 9 06:44:03.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.392000 audit: BPF prog-id=92 op=LOAD Feb 9 06:44:03.393000 audit: BPF prog-id=52 op=UNLOAD Feb 9 06:44:03.393000 audit: BPF prog-id=53 op=UNLOAD Feb 9 06:44:03.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.393000 audit: BPF prog-id=93 op=LOAD Feb 9 06:44:03.393000 audit: BPF prog-id=54 op=UNLOAD Feb 9 06:44:03.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.394000 audit: BPF prog-id=94 op=LOAD Feb 9 06:44:03.394000 audit: BPF prog-id=68 op=UNLOAD Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit: BPF prog-id=95 op=LOAD Feb 9 06:44:03.395000 audit: BPF prog-id=55 op=UNLOAD Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.395000 audit: BPF prog-id=96 op=LOAD Feb 9 06:44:03.395000 audit: BPF prog-id=56 op=UNLOAD Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit: BPF prog-id=97 op=LOAD Feb 9 06:44:03.396000 audit: BPF prog-id=57 op=UNLOAD Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit: BPF prog-id=98 op=LOAD Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit: BPF prog-id=99 op=LOAD Feb 9 06:44:03.396000 audit: BPF prog-id=58 op=UNLOAD Feb 9 06:44:03.396000 audit: BPF prog-id=59 op=UNLOAD Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit: BPF prog-id=100 op=LOAD Feb 9 06:44:03.397000 audit: BPF prog-id=60 op=UNLOAD Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit: BPF prog-id=101 op=LOAD Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit: BPF prog-id=102 op=LOAD Feb 9 06:44:03.397000 audit: BPF prog-id=61 op=UNLOAD Feb 9 06:44:03.397000 audit: BPF prog-id=62 op=UNLOAD Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.397000 audit: BPF prog-id=103 op=LOAD Feb 9 06:44:03.397000 audit: BPF prog-id=63 op=UNLOAD Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit: BPF prog-id=104 op=LOAD Feb 9 06:44:03.398000 audit: BPF prog-id=64 op=UNLOAD Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.398000 audit: BPF prog-id=105 op=LOAD Feb 9 06:44:03.398000 audit: BPF prog-id=84 op=UNLOAD Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit: BPF prog-id=106 op=LOAD Feb 9 06:44:03.399000 audit: BPF prog-id=80 op=UNLOAD Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.399000 audit: BPF prog-id=107 op=LOAD Feb 9 06:44:03.399000 audit: BPF prog-id=76 op=UNLOAD Feb 9 06:44:03.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.400000 audit: BPF prog-id=108 op=LOAD Feb 9 06:44:03.400000 audit: BPF prog-id=72 op=UNLOAD Feb 9 06:44:03.406612 kubelet[2193]: I0209 06:44:03.406596 2193 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 06:44:03.406603 systemd[1]: Stopping kubelet.service... Feb 9 06:44:03.428475 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 06:44:03.428582 systemd[1]: Stopped kubelet.service. Feb 9 06:44:03.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:03.429517 systemd[1]: Started kubelet.service. Feb 9 06:44:03.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:03.452386 kubelet[2582]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 06:44:03.452386 kubelet[2582]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 06:44:03.452386 kubelet[2582]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 06:44:03.452386 kubelet[2582]: I0209 06:44:03.452373 2582 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 06:44:03.454801 kubelet[2582]: I0209 06:44:03.454766 2582 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 06:44:03.454801 kubelet[2582]: I0209 06:44:03.454777 2582 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 06:44:03.455249 kubelet[2582]: I0209 06:44:03.455236 2582 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 06:44:03.456355 kubelet[2582]: I0209 06:44:03.456320 2582 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 06:44:03.456887 kubelet[2582]: I0209 06:44:03.456854 2582 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 06:44:03.473640 kubelet[2582]: I0209 06:44:03.473595 2582 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 06:44:03.473700 kubelet[2582]: I0209 06:44:03.473687 2582 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 06:44:03.473766 kubelet[2582]: I0209 06:44:03.473727 2582 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 06:44:03.473766 kubelet[2582]: I0209 06:44:03.473738 2582 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 06:44:03.473766 kubelet[2582]: I0209 06:44:03.473745 2582 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 06:44:03.473766 kubelet[2582]: I0209 06:44:03.473761 2582 state_mem.go:36] "Initialized new in-memory state store" Feb 9 06:44:03.475189 kubelet[2582]: I0209 06:44:03.475153 2582 kubelet.go:405] "Attempting to sync node with API server" Feb 9 06:44:03.475189 kubelet[2582]: I0209 06:44:03.475164 2582 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 06:44:03.475189 kubelet[2582]: I0209 06:44:03.475174 2582 kubelet.go:309] "Adding apiserver pod source" Feb 9 06:44:03.475189 kubelet[2582]: I0209 06:44:03.475181 2582 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 06:44:03.475453 kubelet[2582]: I0209 06:44:03.475435 2582 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 06:44:03.475708 kubelet[2582]: I0209 06:44:03.475700 2582 server.go:1168] "Started kubelet" Feb 9 06:44:03.475748 kubelet[2582]: I0209 06:44:03.475732 2582 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 06:44:03.475895 kubelet[2582]: I0209 06:44:03.475886 2582 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 06:44:03.475931 kubelet[2582]: E0209 06:44:03.475922 2582 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 06:44:03.475957 kubelet[2582]: E0209 06:44:03.475936 2582 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 06:44:03.475000 audit[2582]: AVC avc: denied { mac_admin } for pid=2582 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.475000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 06:44:03.475000 audit[2582]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b5a4b0 a1=c001096438 a2=c000b5a480 a3=25 items=0 ppid=1 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:03.475000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 06:44:03.475000 audit[2582]: AVC avc: denied { mac_admin } for pid=2582 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.475000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 06:44:03.475000 audit[2582]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00012f680 a1=c001096450 a2=c000b5a540 a3=25 items=0 ppid=1 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:03.475000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 06:44:03.477311 kubelet[2582]: I0209 06:44:03.477074 2582 server.go:461] "Adding debug handlers to kubelet server" Feb 9 06:44:03.477311 kubelet[2582]: I0209 06:44:03.477079 2582 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 06:44:03.477311 kubelet[2582]: I0209 06:44:03.477106 2582 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 06:44:03.477311 kubelet[2582]: I0209 06:44:03.477119 2582 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 06:44:03.477311 kubelet[2582]: I0209 06:44:03.477143 2582 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 06:44:03.477311 kubelet[2582]: E0209 06:44:03.477163 2582 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-4a81ef77ce\" not found" Feb 9 06:44:03.477311 kubelet[2582]: I0209 06:44:03.477177 2582 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 06:44:03.481038 kubelet[2582]: I0209 06:44:03.481019 2582 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 06:44:03.481671 kubelet[2582]: I0209 06:44:03.481659 2582 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 06:44:03.481745 kubelet[2582]: I0209 06:44:03.481675 2582 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 06:44:03.481745 kubelet[2582]: I0209 06:44:03.481690 2582 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 06:44:03.481745 kubelet[2582]: E0209 06:44:03.481724 2582 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 06:44:03.499063 kubelet[2582]: I0209 06:44:03.499048 2582 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 06:44:03.499063 kubelet[2582]: I0209 06:44:03.499060 2582 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 06:44:03.499063 kubelet[2582]: I0209 06:44:03.499069 2582 state_mem.go:36] "Initialized new in-memory state store" Feb 9 06:44:03.499186 kubelet[2582]: I0209 06:44:03.499157 2582 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 06:44:03.499186 kubelet[2582]: I0209 06:44:03.499167 2582 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 06:44:03.499186 kubelet[2582]: I0209 06:44:03.499172 2582 policy_none.go:49] "None policy: Start" Feb 9 06:44:03.499448 kubelet[2582]: I0209 06:44:03.499405 2582 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 06:44:03.499448 kubelet[2582]: I0209 06:44:03.499415 2582 state_mem.go:35] "Initializing new in-memory state store" Feb 9 06:44:03.499497 kubelet[2582]: I0209 06:44:03.499482 2582 state_mem.go:75] "Updated machine memory state" Feb 9 06:44:03.501315 kubelet[2582]: I0209 06:44:03.501279 2582 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 06:44:03.501315 kubelet[2582]: I0209 06:44:03.501307 2582 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 06:44:03.500000 audit[2582]: AVC avc: denied { mac_admin } for pid=2582 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:03.500000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 06:44:03.500000 audit[2582]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e4e660 a1=c001036dc8 a2=c000e4e630 a3=25 items=0 ppid=1 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:03.500000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 06:44:03.501506 kubelet[2582]: I0209 06:44:03.501442 2582 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 06:44:03.579420 kubelet[2582]: I0209 06:44:03.579398 2582 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:03.581790 kubelet[2582]: I0209 06:44:03.581766 2582 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:44:03.581837 kubelet[2582]: I0209 06:44:03.581809 2582 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:44:03.581837 kubelet[2582]: I0209 06:44:03.581832 2582 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:44:03.585364 kubelet[2582]: W0209 06:44:03.585354 2582 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 06:44:03.585524 kubelet[2582]: I0209 06:44:03.585512 2582 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:03.585842 kubelet[2582]: I0209 06:44:03.585832 2582 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:03.586017 kubelet[2582]: W0209 06:44:03.586010 2582 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 06:44:03.586051 kubelet[2582]: E0209 06:44:03.586038 2582 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-4a81ef77ce\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:03.586113 kubelet[2582]: W0209 06:44:03.586108 2582 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 06:44:03.586138 kubelet[2582]: E0209 06:44:03.586133 2582 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-4a81ef77ce\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:03.678822 kubelet[2582]: I0209 06:44:03.678732 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/805b379b015479a6799d1bf0da2fc079-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-4a81ef77ce\" (UID: \"805b379b015479a6799d1bf0da2fc079\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:03.678822 kubelet[2582]: I0209 06:44:03.678759 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/805b379b015479a6799d1bf0da2fc079-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-4a81ef77ce\" (UID: \"805b379b015479a6799d1bf0da2fc079\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:03.678822 kubelet[2582]: I0209 06:44:03.678773 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/805b379b015479a6799d1bf0da2fc079-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-4a81ef77ce\" (UID: \"805b379b015479a6799d1bf0da2fc079\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:03.678822 kubelet[2582]: I0209 06:44:03.678785 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c2a136a002afb0c8209b7b89a2b52678-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-4a81ef77ce\" (UID: \"c2a136a002afb0c8209b7b89a2b52678\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:03.678822 kubelet[2582]: I0209 06:44:03.678797 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ec615c25665378dc04ec67806fc8c602-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-4a81ef77ce\" (UID: \"ec615c25665378dc04ec67806fc8c602\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:03.678970 kubelet[2582]: I0209 06:44:03.678846 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ec615c25665378dc04ec67806fc8c602-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-4a81ef77ce\" (UID: \"ec615c25665378dc04ec67806fc8c602\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:03.678970 kubelet[2582]: I0209 06:44:03.678881 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ec615c25665378dc04ec67806fc8c602-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-4a81ef77ce\" (UID: \"ec615c25665378dc04ec67806fc8c602\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:03.678970 kubelet[2582]: I0209 06:44:03.678902 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/805b379b015479a6799d1bf0da2fc079-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-4a81ef77ce\" (UID: \"805b379b015479a6799d1bf0da2fc079\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:03.678970 kubelet[2582]: I0209 06:44:03.678934 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/805b379b015479a6799d1bf0da2fc079-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-4a81ef77ce\" (UID: \"805b379b015479a6799d1bf0da2fc079\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-4a81ef77ce" Feb 9 06:44:04.476181 kubelet[2582]: I0209 06:44:04.476082 2582 apiserver.go:52] "Watching apiserver" Feb 9 06:44:04.509642 kubelet[2582]: I0209 06:44:04.509602 2582 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-4a81ef77ce" podStartSLOduration=1.509576101 podCreationTimestamp="2024-02-09 06:44:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 06:44:04.509560711 +0000 UTC m=+1.078151641" watchObservedRunningTime="2024-02-09 06:44:04.509576101 +0000 UTC m=+1.078167036" Feb 9 06:44:04.518502 kubelet[2582]: I0209 06:44:04.518457 2582 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-4a81ef77ce" podStartSLOduration=2.518441207 podCreationTimestamp="2024-02-09 06:44:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 06:44:04.513830537 +0000 UTC m=+1.082421467" watchObservedRunningTime="2024-02-09 06:44:04.518441207 +0000 UTC m=+1.087032133" Feb 9 06:44:04.518502 kubelet[2582]: I0209 06:44:04.518486 2582 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-4a81ef77ce" podStartSLOduration=4.518476577 podCreationTimestamp="2024-02-09 06:44:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 06:44:04.518378852 +0000 UTC m=+1.086969783" watchObservedRunningTime="2024-02-09 06:44:04.518476577 +0000 UTC m=+1.087067503" Feb 9 06:44:04.578742 kubelet[2582]: I0209 06:44:04.578635 2582 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 06:44:04.586469 kubelet[2582]: I0209 06:44:04.586388 2582 reconciler.go:41] "Reconciler: start to sync state" Feb 9 06:44:08.471430 sudo[1634]: pam_unix(sudo:session): session closed for user root Feb 9 06:44:08.470000 audit[1634]: USER_END pid=1634 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:44:08.472269 sshd[1631]: pam_unix(sshd:session): session closed for user core Feb 9 06:44:08.473698 systemd[1]: sshd@7-86.109.11.101:22-147.75.109.163:49650.service: Deactivated successfully. Feb 9 06:44:08.474246 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 06:44:08.474387 systemd[1]: session-9.scope: Consumed 3.596s CPU time. Feb 9 06:44:08.474739 systemd-logind[1464]: Session 9 logged out. Waiting for processes to exit. Feb 9 06:44:08.475139 systemd-logind[1464]: Removed session 9. Feb 9 06:44:08.499054 kernel: kauditd_printk_skb: 248 callbacks suppressed Feb 9 06:44:08.499130 kernel: audit: type=1106 audit(1707461048.470:944): pid=1634 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:44:08.470000 audit[1634]: CRED_DISP pid=1634 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:44:08.675893 kernel: audit: type=1104 audit(1707461048.470:945): pid=1634 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:44:08.675923 kernel: audit: type=1106 audit(1707461048.471:946): pid=1631 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:44:08.471000 audit[1631]: USER_END pid=1631 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:44:08.471000 audit[1631]: CRED_DISP pid=1631 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:44:08.861165 kernel: audit: type=1104 audit(1707461048.471:947): pid=1631 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:44:08.861196 kernel: audit: type=1131 audit(1707461048.472:948): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-86.109.11.101:22-147.75.109.163:49650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:08.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-86.109.11.101:22-147.75.109.163:49650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:12.112000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sdb9" ino=524848 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 06:44:12.112000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b61e00 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:44:12.327152 kernel: audit: type=1400 audit(1707461052.112:949): avc: denied { watch } for pid=2405 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sdb9" ino=524848 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 06:44:12.327207 kernel: audit: type=1300 audit(1707461052.112:949): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b61e00 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:44:12.327325 kernel: audit: type=1327 audit(1707461052.112:949): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:44:12.112000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:44:12.211000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:12.510579 kernel: audit: type=1400 audit(1707461052.211:950): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:12.510627 kernel: audit: type=1300 audit(1707461052.211:950): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ac6460 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:44:12.211000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ac6460 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:44:12.211000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:44:12.212000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:12.212000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001104720 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:44:12.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:44:12.212000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:12.212000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010c4040 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:44:12.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:44:12.213000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:12.213000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00053f6c0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:44:12.213000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:44:13.274951 update_engine[1466]: I0209 06:44:13.274878 1466 update_attempter.cc:509] Updating boot flags... Feb 9 06:44:15.067383 kubelet[2582]: I0209 06:44:15.067314 2582 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 06:44:15.068269 env[1476]: time="2024-02-09T06:44:15.068083191Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 06:44:15.068908 kubelet[2582]: I0209 06:44:15.068488 2582 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 06:44:15.877817 kubelet[2582]: I0209 06:44:15.877780 2582 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:44:15.885538 systemd[1]: Created slice kubepods-besteffort-podbd080d12_5c1a_4445_829b_363295e9fe9e.slice. Feb 9 06:44:16.055355 kubelet[2582]: I0209 06:44:16.055240 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/bd080d12-5c1a-4445-829b-363295e9fe9e-xtables-lock\") pod \"kube-proxy-wcf5h\" (UID: \"bd080d12-5c1a-4445-829b-363295e9fe9e\") " pod="kube-system/kube-proxy-wcf5h" Feb 9 06:44:16.055624 kubelet[2582]: I0209 06:44:16.055384 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/bd080d12-5c1a-4445-829b-363295e9fe9e-lib-modules\") pod \"kube-proxy-wcf5h\" (UID: \"bd080d12-5c1a-4445-829b-363295e9fe9e\") " pod="kube-system/kube-proxy-wcf5h" Feb 9 06:44:16.055624 kubelet[2582]: I0209 06:44:16.055483 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/bd080d12-5c1a-4445-829b-363295e9fe9e-kube-proxy\") pod \"kube-proxy-wcf5h\" (UID: \"bd080d12-5c1a-4445-829b-363295e9fe9e\") " pod="kube-system/kube-proxy-wcf5h" Feb 9 06:44:16.055624 kubelet[2582]: I0209 06:44:16.055553 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jzk2b\" (UniqueName: \"kubernetes.io/projected/bd080d12-5c1a-4445-829b-363295e9fe9e-kube-api-access-jzk2b\") pod \"kube-proxy-wcf5h\" (UID: \"bd080d12-5c1a-4445-829b-363295e9fe9e\") " pod="kube-system/kube-proxy-wcf5h" Feb 9 06:44:16.118223 kubelet[2582]: I0209 06:44:16.118181 2582 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:44:16.126845 systemd[1]: Created slice kubepods-besteffort-pod3843d51e_70c0_4a66_9af2_5a6bc887589c.slice. Feb 9 06:44:16.201123 env[1476]: time="2024-02-09T06:44:16.200876761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wcf5h,Uid:bd080d12-5c1a-4445-829b-363295e9fe9e,Namespace:kube-system,Attempt:0,}" Feb 9 06:44:16.224395 env[1476]: time="2024-02-09T06:44:16.224222392Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:44:16.224395 env[1476]: time="2024-02-09T06:44:16.224307746Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:44:16.224395 env[1476]: time="2024-02-09T06:44:16.224343735Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:44:16.224842 env[1476]: time="2024-02-09T06:44:16.224675880Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40f9977f2ace69de112261ed2fc39c88821085047640f3a1648f279ee4f8eaba pid=2766 runtime=io.containerd.runc.v2 Feb 9 06:44:16.257206 kubelet[2582]: I0209 06:44:16.257133 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vgs5w\" (UniqueName: \"kubernetes.io/projected/3843d51e-70c0-4a66-9af2-5a6bc887589c-kube-api-access-vgs5w\") pod \"tigera-operator-7ff8dc855-dncvz\" (UID: \"3843d51e-70c0-4a66-9af2-5a6bc887589c\") " pod="tigera-operator/tigera-operator-7ff8dc855-dncvz" Feb 9 06:44:16.257506 kubelet[2582]: I0209 06:44:16.257362 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3843d51e-70c0-4a66-9af2-5a6bc887589c-var-lib-calico\") pod \"tigera-operator-7ff8dc855-dncvz\" (UID: \"3843d51e-70c0-4a66-9af2-5a6bc887589c\") " pod="tigera-operator/tigera-operator-7ff8dc855-dncvz" Feb 9 06:44:16.264078 systemd[1]: Started cri-containerd-40f9977f2ace69de112261ed2fc39c88821085047640f3a1648f279ee4f8eaba.scope. Feb 9 06:44:16.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.319792 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 9 06:44:16.319848 kernel: audit: type=1400 audit(1707461056.281:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.430370 env[1476]: time="2024-02-09T06:44:16.430349372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-dncvz,Uid:3843d51e-70c0-4a66-9af2-5a6bc887589c,Namespace:tigera-operator,Attempt:0,}" Feb 9 06:44:16.437847 env[1476]: time="2024-02-09T06:44:16.437793525Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:44:16.437847 env[1476]: time="2024-02-09T06:44:16.437813605Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:44:16.437847 env[1476]: time="2024-02-09T06:44:16.437820403Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:44:16.437973 env[1476]: time="2024-02-09T06:44:16.437879610Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5b6964d6dcfca74c3bb323bd8e8851597575d46b32660f88e74eab4afd4190e8 pid=2800 runtime=io.containerd.runc.v2 Feb 9 06:44:16.445866 kernel: audit: type=1400 audit(1707461056.281:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.445902 kernel: audit: type=1400 audit(1707461056.281:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.511844 systemd[1]: Started cri-containerd-5b6964d6dcfca74c3bb323bd8e8851597575d46b32660f88e74eab4afd4190e8.scope. Feb 9 06:44:16.572492 kernel: audit: type=1400 audit(1707461056.281:957): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.572534 kernel: audit: type=1400 audit(1707461056.281:958): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.635895 kernel: audit: type=1400 audit(1707461056.281:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.699256 kernel: audit: type=1400 audit(1707461056.281:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.763013 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 06:44:16.763051 kernel: audit: type=1400 audit(1707461056.281:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.763072 kernel: audit: type=1400 audit(1707461056.281:962): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.381000 audit: BPF prog-id=109 op=LOAD Feb 9 06:44:16.382000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.382000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2766 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430663939373766326163653639646531313232363165643266633339 Feb 9 06:44:16.382000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.382000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2766 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430663939373766326163653639646531313232363165643266633339 Feb 9 06:44:16.382000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.382000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.382000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.382000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.382000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.382000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.382000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.382000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.382000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.382000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.382000 audit: BPF prog-id=110 op=LOAD Feb 9 06:44:16.382000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000212860 items=0 ppid=2766 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430663939373766326163653639646531313232363165643266633339 Feb 9 06:44:16.508000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.508000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.508000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.508000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.508000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.508000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.508000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.508000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.508000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.508000 audit: BPF prog-id=111 op=LOAD Feb 9 06:44:16.508000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002128a8 items=0 ppid=2766 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430663939373766326163653639646531313232363165643266633339 Feb 9 06:44:16.634000 audit: BPF prog-id=111 op=UNLOAD Feb 9 06:44:16.634000 audit: BPF prog-id=110 op=UNLOAD Feb 9 06:44:16.634000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.634000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.634000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.634000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.634000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.634000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.634000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.634000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.634000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.698000 audit: BPF prog-id=112 op=LOAD Feb 9 06:44:16.698000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.698000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2800 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562363936346436646366636137346333626233323362643865383835 Feb 9 06:44:16.634000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.634000 audit: BPF prog-id=113 op=LOAD Feb 9 06:44:16.634000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000212f58 items=0 ppid=2766 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430663939373766326163653639646531313232363165643266633339 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c0001979d8 a2=78 a3=c0003ec870 items=0 ppid=2800 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562363936346436646366636137346333626233323362643865383835 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit: BPF prog-id=114 op=LOAD Feb 9 06:44:16.916000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=1 items=0 ppid=2800 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562363936346436646366636137346333626233323362643865383835 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit: BPF prog-id=115 op=LOAD Feb 9 06:44:16.916000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ec8b8 items=0 ppid=2800 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562363936346436646366636137346333626233323362643865383835 Feb 9 06:44:16.916000 audit: BPF prog-id=115 op=UNLOAD Feb 9 06:44:16.916000 audit: BPF prog-id=114 op=UNLOAD Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.916000 audit: BPF prog-id=116 op=LOAD Feb 9 06:44:16.916000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003eccc8 items=0 ppid=2800 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562363936346436646366636137346333626233323362643865383835 Feb 9 06:44:16.933928 env[1476]: time="2024-02-09T06:44:16.933901508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wcf5h,Uid:bd080d12-5c1a-4445-829b-363295e9fe9e,Namespace:kube-system,Attempt:0,} returns sandbox id \"40f9977f2ace69de112261ed2fc39c88821085047640f3a1648f279ee4f8eaba\"" Feb 9 06:44:16.935003 env[1476]: time="2024-02-09T06:44:16.934988125Z" level=info msg="CreateContainer within sandbox \"40f9977f2ace69de112261ed2fc39c88821085047640f3a1648f279ee4f8eaba\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 06:44:16.941470 env[1476]: time="2024-02-09T06:44:16.941425055Z" level=info msg="CreateContainer within sandbox \"40f9977f2ace69de112261ed2fc39c88821085047640f3a1648f279ee4f8eaba\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e369c494ea67289c369800be98c2d297a4cfd843cad993d58dc4c1ddcc8da7f0\"" Feb 9 06:44:16.941720 env[1476]: time="2024-02-09T06:44:16.941678056Z" level=info msg="StartContainer for \"e369c494ea67289c369800be98c2d297a4cfd843cad993d58dc4c1ddcc8da7f0\"" Feb 9 06:44:16.946664 env[1476]: time="2024-02-09T06:44:16.946637845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-dncvz,Uid:3843d51e-70c0-4a66-9af2-5a6bc887589c,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"5b6964d6dcfca74c3bb323bd8e8851597575d46b32660f88e74eab4afd4190e8\"" Feb 9 06:44:16.947384 env[1476]: time="2024-02-09T06:44:16.947369811Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 06:44:16.967990 systemd[1]: Started cri-containerd-e369c494ea67289c369800be98c2d297a4cfd843cad993d58dc4c1ddcc8da7f0.scope. Feb 9 06:44:16.974000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.974000 audit[2845]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2766 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363963343934656136373238396333363938303062653938633264 Feb 9 06:44:16.974000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.974000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.974000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.974000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.974000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.974000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.974000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.974000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.974000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.974000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.974000 audit: BPF prog-id=117 op=LOAD Feb 9 06:44:16.974000 audit[2845]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027e200 items=0 ppid=2766 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363963343934656136373238396333363938303062653938633264 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit: BPF prog-id=118 op=LOAD Feb 9 06:44:16.975000 audit[2845]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027e248 items=0 ppid=2766 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363963343934656136373238396333363938303062653938633264 Feb 9 06:44:16.975000 audit: BPF prog-id=118 op=UNLOAD Feb 9 06:44:16.975000 audit: BPF prog-id=117 op=UNLOAD Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { perfmon } for pid=2845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit[2845]: AVC avc: denied { bpf } for pid=2845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:16.975000 audit: BPF prog-id=119 op=LOAD Feb 9 06:44:16.975000 audit[2845]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027e2d8 items=0 ppid=2766 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:16.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363963343934656136373238396333363938303062653938633264 Feb 9 06:44:16.982738 env[1476]: time="2024-02-09T06:44:16.982680729Z" level=info msg="StartContainer for \"e369c494ea67289c369800be98c2d297a4cfd843cad993d58dc4c1ddcc8da7f0\" returns successfully" Feb 9 06:44:17.013000 audit[2906]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.013000 audit[2906]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2611f6e0 a2=0 a3=7ffc2611f6cc items=0 ppid=2856 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 06:44:17.013000 audit[2907]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2907 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.013000 audit[2907]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8e966300 a2=0 a3=7ffd8e9662ec items=0 ppid=2856 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.013000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 06:44:17.014000 audit[2909]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.014000 audit[2909]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7df89d30 a2=0 a3=7fff7df89d1c items=0 ppid=2856 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 06:44:17.014000 audit[2910]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2910 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.014000 audit[2910]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc28a28e70 a2=0 a3=7ffc28a28e5c items=0 ppid=2856 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 06:44:17.015000 audit[2911]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.015000 audit[2911]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc97be9b20 a2=0 a3=7ffc97be9b0c items=0 ppid=2856 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 06:44:17.015000 audit[2912]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2912 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.015000 audit[2912]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd555d3690 a2=0 a3=7ffd555d367c items=0 ppid=2856 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 06:44:17.120000 audit[2913]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.120000 audit[2913]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffd1351fd0 a2=0 a3=7fffd1351fbc items=0 ppid=2856 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 06:44:17.127000 audit[2915]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.127000 audit[2915]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc232c06c0 a2=0 a3=7ffc232c06ac items=0 ppid=2856 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 06:44:17.137000 audit[2918]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.137000 audit[2918]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff5c1178f0 a2=0 a3=7fff5c1178dc items=0 ppid=2856 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 06:44:17.140000 audit[2919]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.140000 audit[2919]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbfb2ac30 a2=0 a3=7fffbfb2ac1c items=0 ppid=2856 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 06:44:17.147000 audit[2921]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.147000 audit[2921]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe49133e20 a2=0 a3=7ffe49133e0c items=0 ppid=2856 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.147000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 06:44:17.149000 audit[2922]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.149000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe139999e0 a2=0 a3=7ffe139999cc items=0 ppid=2856 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 06:44:17.156000 audit[2924]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.156000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd0bd4cd50 a2=0 a3=7ffd0bd4cd3c items=0 ppid=2856 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 06:44:17.165000 audit[2927]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.165000 audit[2927]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffb84af210 a2=0 a3=7fffb84af1fc items=0 ppid=2856 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 06:44:17.168000 audit[2928]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.168000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb8fcdc80 a2=0 a3=7fffb8fcdc6c items=0 ppid=2856 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 06:44:17.174000 audit[2930]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.174000 audit[2930]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe73308690 a2=0 a3=7ffe7330867c items=0 ppid=2856 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 06:44:17.177000 audit[2931]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.177000 audit[2931]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc10329350 a2=0 a3=7ffc1032933c items=0 ppid=2856 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.177000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 06:44:17.183000 audit[2933]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.183000 audit[2933]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe66e9c140 a2=0 a3=7ffe66e9c12c items=0 ppid=2856 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 06:44:17.192000 audit[2936]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.192000 audit[2936]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffccaacff00 a2=0 a3=7ffccaacfeec items=0 ppid=2856 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.192000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 06:44:17.202000 audit[2939]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.202000 audit[2939]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce939b510 a2=0 a3=7ffce939b4fc items=0 ppid=2856 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 06:44:17.204000 audit[2940]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2940 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.204000 audit[2940]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff8fe1c240 a2=0 a3=7fff8fe1c22c items=0 ppid=2856 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 06:44:17.211000 audit[2942]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.211000 audit[2942]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc8d38abf0 a2=0 a3=7ffc8d38abdc items=0 ppid=2856 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.211000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 06:44:17.219000 audit[2945]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.219000 audit[2945]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd2e5249b0 a2=0 a3=7ffd2e52499c items=0 ppid=2856 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 06:44:17.234000 audit[2950]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.234000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4a4049e0 a2=0 a3=7fff4a4049cc items=0 ppid=2856 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 06:44:17.240000 audit[2952]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:44:17.240000 audit[2952]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe96e5e760 a2=0 a3=7ffe96e5e74c items=0 ppid=2856 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 06:44:17.266000 audit[2954]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:44:17.266000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe3f8a6660 a2=0 a3=7ffe3f8a664c items=0 ppid=2856 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:44:17.282000 audit[2954]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:44:17.282000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe3f8a6660 a2=0 a3=7ffe3f8a664c items=0 ppid=2856 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:44:17.285000 audit[2960]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.285000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe06a47de0 a2=0 a3=7ffe06a47dcc items=0 ppid=2856 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 06:44:17.291000 audit[2962]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2962 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.291000 audit[2962]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd1b1a1c00 a2=0 a3=7ffd1b1a1bec items=0 ppid=2856 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 06:44:17.301000 audit[2965]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.301000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffde171c2e0 a2=0 a3=7ffde171c2cc items=0 ppid=2856 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 06:44:17.303000 audit[2966]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.303000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea64d71c0 a2=0 a3=7ffea64d71ac items=0 ppid=2856 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 06:44:17.309000 audit[2968]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2968 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.309000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff34401720 a2=0 a3=7fff3440170c items=0 ppid=2856 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 06:44:17.312000 audit[2969]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2969 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.312000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff4b71dc0 a2=0 a3=7ffff4b71dac items=0 ppid=2856 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 06:44:17.318000 audit[2971]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.318000 audit[2971]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff1025be70 a2=0 a3=7fff1025be5c items=0 ppid=2856 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 06:44:17.327000 audit[2974]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.327000 audit[2974]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffda187cdd0 a2=0 a3=7ffda187cdbc items=0 ppid=2856 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 06:44:17.330000 audit[2975]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.330000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc83219630 a2=0 a3=7ffc8321961c items=0 ppid=2856 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 06:44:17.336000 audit[2977]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.336000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffe70bae0 a2=0 a3=7ffffe70bacc items=0 ppid=2856 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 06:44:17.339000 audit[2978]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2978 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.339000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff41363ef0 a2=0 a3=7fff41363edc items=0 ppid=2856 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 06:44:17.345000 audit[2980]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2980 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.345000 audit[2980]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2eeb07a0 a2=0 a3=7ffe2eeb078c items=0 ppid=2856 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.345000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 06:44:17.354000 audit[2983]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2983 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.354000 audit[2983]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc80f08610 a2=0 a3=7ffc80f085fc items=0 ppid=2856 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 06:44:17.363000 audit[2986]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.363000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee4ed03c0 a2=0 a3=7ffee4ed03ac items=0 ppid=2856 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 06:44:17.366000 audit[2987]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.366000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffddfad3c60 a2=0 a3=7ffddfad3c4c items=0 ppid=2856 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.366000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 06:44:17.372000 audit[2989]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2989 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.372000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe9e543160 a2=0 a3=7ffe9e54314c items=0 ppid=2856 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 06:44:17.380000 audit[2992]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2992 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.380000 audit[2992]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff97776d70 a2=0 a3=7fff97776d5c items=0 ppid=2856 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 06:44:17.383000 audit[2993]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2993 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.383000 audit[2993]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe59782c30 a2=0 a3=7ffe59782c1c items=0 ppid=2856 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 06:44:17.388000 audit[2995]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.388000 audit[2995]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcb60c2ce0 a2=0 a3=7ffcb60c2ccc items=0 ppid=2856 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.388000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 06:44:17.397000 audit[2998]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2998 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.397000 audit[2998]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd83a0e280 a2=0 a3=7ffd83a0e26c items=0 ppid=2856 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 06:44:17.399000 audit[2999]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2999 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.399000 audit[2999]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff013a19e0 a2=0 a3=7fff013a19cc items=0 ppid=2856 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 06:44:17.405000 audit[3001]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=3001 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:44:17.405000 audit[3001]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe684735f0 a2=0 a3=7ffe684735dc items=0 ppid=2856 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 06:44:17.413000 audit[3003]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3003 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 06:44:17.413000 audit[3003]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffedd8c96e0 a2=0 a3=7ffedd8c96cc items=0 ppid=2856 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.413000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:44:17.414000 audit[3003]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3003 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 06:44:17.414000 audit[3003]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffedd8c96e0 a2=0 a3=7ffedd8c96cc items=0 ppid=2856 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:17.414000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:44:17.536387 kubelet[2582]: I0209 06:44:17.536190 2582 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-wcf5h" podStartSLOduration=2.536029829 podCreationTimestamp="2024-02-09 06:44:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 06:44:17.535950713 +0000 UTC m=+14.104541713" watchObservedRunningTime="2024-02-09 06:44:17.536029829 +0000 UTC m=+14.104620818" Feb 9 06:44:18.644202 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2025642280.mount: Deactivated successfully. Feb 9 06:44:19.430840 env[1476]: time="2024-02-09T06:44:19.430816002Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:44:19.431346 env[1476]: time="2024-02-09T06:44:19.431334817Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:44:19.432241 env[1476]: time="2024-02-09T06:44:19.432228142Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:44:19.433070 env[1476]: time="2024-02-09T06:44:19.433059579Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:44:19.433518 env[1476]: time="2024-02-09T06:44:19.433504765Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 06:44:19.434583 env[1476]: time="2024-02-09T06:44:19.434543618Z" level=info msg="CreateContainer within sandbox \"5b6964d6dcfca74c3bb323bd8e8851597575d46b32660f88e74eab4afd4190e8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 06:44:19.439484 env[1476]: time="2024-02-09T06:44:19.439466208Z" level=info msg="CreateContainer within sandbox \"5b6964d6dcfca74c3bb323bd8e8851597575d46b32660f88e74eab4afd4190e8\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"5cc1833841c80f1a8815a7a54b3322f10ee60d3b40bef5f6b922b8471bb143b8\"" Feb 9 06:44:19.439798 env[1476]: time="2024-02-09T06:44:19.439786279Z" level=info msg="StartContainer for \"5cc1833841c80f1a8815a7a54b3322f10ee60d3b40bef5f6b922b8471bb143b8\"" Feb 9 06:44:19.459561 systemd[1]: Started cri-containerd-5cc1833841c80f1a8815a7a54b3322f10ee60d3b40bef5f6b922b8471bb143b8.scope. Feb 9 06:44:19.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit: BPF prog-id=120 op=LOAD Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2800 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:19.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633138333338343163383066316138383135613761353462333332 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2800 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:19.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633138333338343163383066316138383135613761353462333332 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit: BPF prog-id=121 op=LOAD Feb 9 06:44:19.465000 audit[3011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000304d90 items=0 ppid=2800 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:19.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633138333338343163383066316138383135613761353462333332 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit: BPF prog-id=122 op=LOAD Feb 9 06:44:19.465000 audit[3011]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000304dd8 items=0 ppid=2800 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:19.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633138333338343163383066316138383135613761353462333332 Feb 9 06:44:19.465000 audit: BPF prog-id=122 op=UNLOAD Feb 9 06:44:19.465000 audit: BPF prog-id=121 op=UNLOAD Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { perfmon } for pid=3011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit[3011]: AVC avc: denied { bpf } for pid=3011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:19.465000 audit: BPF prog-id=123 op=LOAD Feb 9 06:44:19.465000 audit[3011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003051e8 items=0 ppid=2800 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:19.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633138333338343163383066316138383135613761353462333332 Feb 9 06:44:19.485044 env[1476]: time="2024-02-09T06:44:19.484991618Z" level=info msg="StartContainer for \"5cc1833841c80f1a8815a7a54b3322f10ee60d3b40bef5f6b922b8471bb143b8\" returns successfully" Feb 9 06:44:19.528828 kubelet[2582]: I0209 06:44:19.528772 2582 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-dncvz" podStartSLOduration=1.042150498 podCreationTimestamp="2024-02-09 06:44:16 +0000 UTC" firstStartedPulling="2024-02-09 06:44:16.947162016 +0000 UTC m=+13.515752945" lastFinishedPulling="2024-02-09 06:44:19.433754236 +0000 UTC m=+16.002345165" observedRunningTime="2024-02-09 06:44:19.528521999 +0000 UTC m=+16.097112935" watchObservedRunningTime="2024-02-09 06:44:19.528742718 +0000 UTC m=+16.097333652" Feb 9 06:44:21.174000 audit[3055]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:44:21.174000 audit[3055]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc6b1ffff0 a2=0 a3=7ffc6b1fffdc items=0 ppid=2856 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:21.174000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:44:21.175000 audit[3055]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:44:21.175000 audit[3055]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc6b1ffff0 a2=0 a3=31030 items=0 ppid=2856 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:21.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:44:21.194000 audit[3057]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3057 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:44:21.194000 audit[3057]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffeb6872e10 a2=0 a3=7ffeb6872dfc items=0 ppid=2856 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:21.194000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:44:21.199000 audit[3057]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3057 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:44:21.199000 audit[3057]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffeb6872e10 a2=0 a3=31030 items=0 ppid=2856 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:21.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:44:21.316065 kubelet[2582]: I0209 06:44:21.315997 2582 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:44:21.327401 systemd[1]: Created slice kubepods-besteffort-pod73b72c76_f5bd_4b43_842c_1c5c7c2a1a32.slice. Feb 9 06:44:21.349305 kubelet[2582]: I0209 06:44:21.349275 2582 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:44:21.353493 systemd[1]: Created slice kubepods-besteffort-pod6678e3be_812d_4321_b8bf_a97282ef5dc4.slice. Feb 9 06:44:21.477598 kubelet[2582]: I0209 06:44:21.477543 2582 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:44:21.478235 kubelet[2582]: E0209 06:44:21.478192 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:21.493596 kubelet[2582]: I0209 06:44:21.493549 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6678e3be-812d-4321-b8bf-a97282ef5dc4-lib-modules\") pod \"calico-node-bnjjw\" (UID: \"6678e3be-812d-4321-b8bf-a97282ef5dc4\") " pod="calico-system/calico-node-bnjjw" Feb 9 06:44:21.493880 kubelet[2582]: I0209 06:44:21.493644 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6678e3be-812d-4321-b8bf-a97282ef5dc4-tigera-ca-bundle\") pod \"calico-node-bnjjw\" (UID: \"6678e3be-812d-4321-b8bf-a97282ef5dc4\") " pod="calico-system/calico-node-bnjjw" Feb 9 06:44:21.493880 kubelet[2582]: I0209 06:44:21.493706 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6678e3be-812d-4321-b8bf-a97282ef5dc4-cni-net-dir\") pod \"calico-node-bnjjw\" (UID: \"6678e3be-812d-4321-b8bf-a97282ef5dc4\") " pod="calico-system/calico-node-bnjjw" Feb 9 06:44:21.493880 kubelet[2582]: I0209 06:44:21.493769 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p9vsf\" (UniqueName: \"kubernetes.io/projected/73b72c76-f5bd-4b43-842c-1c5c7c2a1a32-kube-api-access-p9vsf\") pod \"calico-typha-5975fc6685-6v2wv\" (UID: \"73b72c76-f5bd-4b43-842c-1c5c7c2a1a32\") " pod="calico-system/calico-typha-5975fc6685-6v2wv" Feb 9 06:44:21.494269 kubelet[2582]: I0209 06:44:21.494044 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6678e3be-812d-4321-b8bf-a97282ef5dc4-cni-bin-dir\") pod \"calico-node-bnjjw\" (UID: \"6678e3be-812d-4321-b8bf-a97282ef5dc4\") " pod="calico-system/calico-node-bnjjw" Feb 9 06:44:21.494269 kubelet[2582]: I0209 06:44:21.494194 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/73b72c76-f5bd-4b43-842c-1c5c7c2a1a32-typha-certs\") pod \"calico-typha-5975fc6685-6v2wv\" (UID: \"73b72c76-f5bd-4b43-842c-1c5c7c2a1a32\") " pod="calico-system/calico-typha-5975fc6685-6v2wv" Feb 9 06:44:21.494269 kubelet[2582]: I0209 06:44:21.494264 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6678e3be-812d-4321-b8bf-a97282ef5dc4-xtables-lock\") pod \"calico-node-bnjjw\" (UID: \"6678e3be-812d-4321-b8bf-a97282ef5dc4\") " pod="calico-system/calico-node-bnjjw" Feb 9 06:44:21.494592 kubelet[2582]: I0209 06:44:21.494431 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6678e3be-812d-4321-b8bf-a97282ef5dc4-policysync\") pod \"calico-node-bnjjw\" (UID: \"6678e3be-812d-4321-b8bf-a97282ef5dc4\") " pod="calico-system/calico-node-bnjjw" Feb 9 06:44:21.494592 kubelet[2582]: I0209 06:44:21.494524 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6678e3be-812d-4321-b8bf-a97282ef5dc4-var-lib-calico\") pod \"calico-node-bnjjw\" (UID: \"6678e3be-812d-4321-b8bf-a97282ef5dc4\") " pod="calico-system/calico-node-bnjjw" Feb 9 06:44:21.494777 kubelet[2582]: I0209 06:44:21.494674 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xzlsz\" (UniqueName: \"kubernetes.io/projected/6678e3be-812d-4321-b8bf-a97282ef5dc4-kube-api-access-xzlsz\") pod \"calico-node-bnjjw\" (UID: \"6678e3be-812d-4321-b8bf-a97282ef5dc4\") " pod="calico-system/calico-node-bnjjw" Feb 9 06:44:21.494888 kubelet[2582]: I0209 06:44:21.494804 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/73b72c76-f5bd-4b43-842c-1c5c7c2a1a32-tigera-ca-bundle\") pod \"calico-typha-5975fc6685-6v2wv\" (UID: \"73b72c76-f5bd-4b43-842c-1c5c7c2a1a32\") " pod="calico-system/calico-typha-5975fc6685-6v2wv" Feb 9 06:44:21.495071 kubelet[2582]: I0209 06:44:21.494997 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6678e3be-812d-4321-b8bf-a97282ef5dc4-node-certs\") pod \"calico-node-bnjjw\" (UID: \"6678e3be-812d-4321-b8bf-a97282ef5dc4\") " pod="calico-system/calico-node-bnjjw" Feb 9 06:44:21.495269 kubelet[2582]: I0209 06:44:21.495189 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6678e3be-812d-4321-b8bf-a97282ef5dc4-var-run-calico\") pod \"calico-node-bnjjw\" (UID: \"6678e3be-812d-4321-b8bf-a97282ef5dc4\") " pod="calico-system/calico-node-bnjjw" Feb 9 06:44:21.495446 kubelet[2582]: I0209 06:44:21.495297 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6678e3be-812d-4321-b8bf-a97282ef5dc4-cni-log-dir\") pod \"calico-node-bnjjw\" (UID: \"6678e3be-812d-4321-b8bf-a97282ef5dc4\") " pod="calico-system/calico-node-bnjjw" Feb 9 06:44:21.495636 kubelet[2582]: I0209 06:44:21.495480 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6678e3be-812d-4321-b8bf-a97282ef5dc4-flexvol-driver-host\") pod \"calico-node-bnjjw\" (UID: \"6678e3be-812d-4321-b8bf-a97282ef5dc4\") " pod="calico-system/calico-node-bnjjw" Feb 9 06:44:21.596217 kubelet[2582]: I0209 06:44:21.596163 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4e359e0e-c2df-4dde-a4d4-97d73ce2a314-kubelet-dir\") pod \"csi-node-driver-zhwmq\" (UID: \"4e359e0e-c2df-4dde-a4d4-97d73ce2a314\") " pod="calico-system/csi-node-driver-zhwmq" Feb 9 06:44:21.596217 kubelet[2582]: I0209 06:44:21.596210 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4e359e0e-c2df-4dde-a4d4-97d73ce2a314-registration-dir\") pod \"csi-node-driver-zhwmq\" (UID: \"4e359e0e-c2df-4dde-a4d4-97d73ce2a314\") " pod="calico-system/csi-node-driver-zhwmq" Feb 9 06:44:21.596388 kubelet[2582]: I0209 06:44:21.596251 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9rpfj\" (UniqueName: \"kubernetes.io/projected/4e359e0e-c2df-4dde-a4d4-97d73ce2a314-kube-api-access-9rpfj\") pod \"csi-node-driver-zhwmq\" (UID: \"4e359e0e-c2df-4dde-a4d4-97d73ce2a314\") " pod="calico-system/csi-node-driver-zhwmq" Feb 9 06:44:21.596388 kubelet[2582]: I0209 06:44:21.596383 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4e359e0e-c2df-4dde-a4d4-97d73ce2a314-varrun\") pod \"csi-node-driver-zhwmq\" (UID: \"4e359e0e-c2df-4dde-a4d4-97d73ce2a314\") " pod="calico-system/csi-node-driver-zhwmq" Feb 9 06:44:21.596490 kubelet[2582]: I0209 06:44:21.596409 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4e359e0e-c2df-4dde-a4d4-97d73ce2a314-socket-dir\") pod \"csi-node-driver-zhwmq\" (UID: \"4e359e0e-c2df-4dde-a4d4-97d73ce2a314\") " pod="calico-system/csi-node-driver-zhwmq" Feb 9 06:44:21.597383 kubelet[2582]: E0209 06:44:21.597368 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.597383 kubelet[2582]: W0209 06:44:21.597381 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.597519 kubelet[2582]: E0209 06:44:21.597406 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.597574 kubelet[2582]: E0209 06:44:21.597565 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.597629 kubelet[2582]: W0209 06:44:21.597575 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.597629 kubelet[2582]: E0209 06:44:21.597597 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.599000 kubelet[2582]: E0209 06:44:21.598986 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.599000 kubelet[2582]: W0209 06:44:21.598996 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.599126 kubelet[2582]: E0209 06:44:21.599010 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.599197 kubelet[2582]: E0209 06:44:21.599186 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.599197 kubelet[2582]: W0209 06:44:21.599195 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.599302 kubelet[2582]: E0209 06:44:21.599206 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.603908 kubelet[2582]: E0209 06:44:21.603894 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.603908 kubelet[2582]: W0209 06:44:21.603904 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.604000 kubelet[2582]: E0209 06:44:21.603919 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.604090 kubelet[2582]: E0209 06:44:21.604075 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.604134 kubelet[2582]: W0209 06:44:21.604092 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.604134 kubelet[2582]: E0209 06:44:21.604110 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.630718 env[1476]: time="2024-02-09T06:44:21.630682169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5975fc6685-6v2wv,Uid:73b72c76-f5bd-4b43-842c-1c5c7c2a1a32,Namespace:calico-system,Attempt:0,}" Feb 9 06:44:21.640267 env[1476]: time="2024-02-09T06:44:21.640211276Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:44:21.640267 env[1476]: time="2024-02-09T06:44:21.640255053Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:44:21.640402 env[1476]: time="2024-02-09T06:44:21.640273525Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:44:21.640445 env[1476]: time="2024-02-09T06:44:21.640405657Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2124ab09be3d7da98f515acfa38c25ed3a0bbdd947e7af96ff24b091c5527b73 pid=3075 runtime=io.containerd.runc.v2 Feb 9 06:44:21.655927 env[1476]: time="2024-02-09T06:44:21.655894014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bnjjw,Uid:6678e3be-812d-4321-b8bf-a97282ef5dc4,Namespace:calico-system,Attempt:0,}" Feb 9 06:44:21.660714 systemd[1]: Started cri-containerd-2124ab09be3d7da98f515acfa38c25ed3a0bbdd947e7af96ff24b091c5527b73.scope. Feb 9 06:44:21.664492 env[1476]: time="2024-02-09T06:44:21.664441766Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:44:21.664492 env[1476]: time="2024-02-09T06:44:21.664475962Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:44:21.664492 env[1476]: time="2024-02-09T06:44:21.664486944Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:44:21.664712 env[1476]: time="2024-02-09T06:44:21.664598909Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/259a75ac434172c9abc5e93aae3e61e5eecb588363e2406cbfa28f7c91574466 pid=3101 runtime=io.containerd.runc.v2 Feb 9 06:44:21.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.696347 kernel: kauditd_printk_skb: 380 callbacks suppressed Feb 9 06:44:21.696433 kernel: audit: type=1400 audit(1707461061.668:1069): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.697725 kubelet[2582]: E0209 06:44:21.697696 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.697725 kubelet[2582]: W0209 06:44:21.697709 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.697725 kubelet[2582]: E0209 06:44:21.697723 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.697874 kubelet[2582]: E0209 06:44:21.697867 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.697874 kubelet[2582]: W0209 06:44:21.697873 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.697939 kubelet[2582]: E0209 06:44:21.697884 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.698013 kubelet[2582]: E0209 06:44:21.698005 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.698013 kubelet[2582]: W0209 06:44:21.698011 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.698108 kubelet[2582]: E0209 06:44:21.698020 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.698175 kubelet[2582]: E0209 06:44:21.698167 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.698175 kubelet[2582]: W0209 06:44:21.698174 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.698231 kubelet[2582]: E0209 06:44:21.698185 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.698297 kubelet[2582]: E0209 06:44:21.698290 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.698297 kubelet[2582]: W0209 06:44:21.698296 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.698369 kubelet[2582]: E0209 06:44:21.698305 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.698508 kubelet[2582]: E0209 06:44:21.698493 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.698535 kubelet[2582]: W0209 06:44:21.698512 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.698562 kubelet[2582]: E0209 06:44:21.698542 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.698717 kubelet[2582]: E0209 06:44:21.698708 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.698760 kubelet[2582]: W0209 06:44:21.698719 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.698760 kubelet[2582]: E0209 06:44:21.698747 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.698905 kubelet[2582]: E0209 06:44:21.698894 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.698929 kubelet[2582]: W0209 06:44:21.698907 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.698952 kubelet[2582]: E0209 06:44:21.698933 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.699130 kubelet[2582]: E0209 06:44:21.699119 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.699156 kubelet[2582]: W0209 06:44:21.699132 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.699187 kubelet[2582]: E0209 06:44:21.699161 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.699306 kubelet[2582]: E0209 06:44:21.699297 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.699336 kubelet[2582]: W0209 06:44:21.699309 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.699336 kubelet[2582]: E0209 06:44:21.699334 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.699481 kubelet[2582]: E0209 06:44:21.699471 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.699509 kubelet[2582]: W0209 06:44:21.699480 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.699509 kubelet[2582]: E0209 06:44:21.699500 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.699640 kubelet[2582]: E0209 06:44:21.699627 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.699640 kubelet[2582]: W0209 06:44:21.699639 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.699712 kubelet[2582]: E0209 06:44:21.699665 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.699784 kubelet[2582]: E0209 06:44:21.699774 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.699808 kubelet[2582]: W0209 06:44:21.699786 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.699833 kubelet[2582]: E0209 06:44:21.699809 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.699923 kubelet[2582]: E0209 06:44:21.699912 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.699946 kubelet[2582]: W0209 06:44:21.699926 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.699946 kubelet[2582]: E0209 06:44:21.699944 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.700064 kubelet[2582]: E0209 06:44:21.700054 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.700089 kubelet[2582]: W0209 06:44:21.700067 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.700119 kubelet[2582]: E0209 06:44:21.700089 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.700228 kubelet[2582]: E0209 06:44:21.700219 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.700251 kubelet[2582]: W0209 06:44:21.700231 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.700272 kubelet[2582]: E0209 06:44:21.700249 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.700432 kubelet[2582]: E0209 06:44:21.700423 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.700456 kubelet[2582]: W0209 06:44:21.700432 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.700479 kubelet[2582]: E0209 06:44:21.700453 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.700613 kubelet[2582]: E0209 06:44:21.700604 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.700637 kubelet[2582]: W0209 06:44:21.700616 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.700657 kubelet[2582]: E0209 06:44:21.700636 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.700791 kubelet[2582]: E0209 06:44:21.700785 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.700815 kubelet[2582]: W0209 06:44:21.700793 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.700815 kubelet[2582]: E0209 06:44:21.700808 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.700903 kubelet[2582]: E0209 06:44:21.700898 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.700927 kubelet[2582]: W0209 06:44:21.700905 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.700927 kubelet[2582]: E0209 06:44:21.700917 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.701038 kubelet[2582]: E0209 06:44:21.701032 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.701058 kubelet[2582]: W0209 06:44:21.701039 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.701058 kubelet[2582]: E0209 06:44:21.701053 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.701193 kubelet[2582]: E0209 06:44:21.701187 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.701219 kubelet[2582]: W0209 06:44:21.701194 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.701219 kubelet[2582]: E0209 06:44:21.701208 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.701305 kubelet[2582]: E0209 06:44:21.701299 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.701327 kubelet[2582]: W0209 06:44:21.701306 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.701327 kubelet[2582]: E0209 06:44:21.701319 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.701414 kubelet[2582]: E0209 06:44:21.701408 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.701436 kubelet[2582]: W0209 06:44:21.701415 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.701436 kubelet[2582]: E0209 06:44:21.701425 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.701548 kubelet[2582]: E0209 06:44:21.701540 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.701582 kubelet[2582]: W0209 06:44:21.701548 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.701582 kubelet[2582]: E0209 06:44:21.701558 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.707360 kubelet[2582]: E0209 06:44:21.707317 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:21.707360 kubelet[2582]: W0209 06:44:21.707324 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:21.707360 kubelet[2582]: E0209 06:44:21.707333 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:21.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.822716 kernel: audit: type=1400 audit(1707461061.668:1070): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.822794 kernel: audit: type=1400 audit(1707461061.668:1071): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.823979 systemd[1]: Started cri-containerd-259a75ac434172c9abc5e93aae3e61e5eecb588363e2406cbfa28f7c91574466.scope. Feb 9 06:44:21.885846 kernel: audit: type=1400 audit(1707461061.668:1072): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.949382 kernel: audit: type=1400 audit(1707461061.668:1073): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.076543 kernel: audit: type=1400 audit(1707461061.668:1074): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.076621 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 06:44:22.076641 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 06:44:22.076652 kernel: audit: backlog limit exceeded Feb 9 06:44:22.076665 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 06:44:21.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit: BPF prog-id=124 op=LOAD Feb 9 06:44:21.821000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3075 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:21.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231323461623039626533643764613938663531356163666133386332 Feb 9 06:44:21.821000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3075 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:21.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231323461623039626533643764613938663531356163666133386332 Feb 9 06:44:21.821000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.821000 audit: BPF prog-id=125 op=LOAD Feb 9 06:44:21.821000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003dc600 items=0 ppid=3075 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:21.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231323461623039626533643764613938663531356163666133386332 Feb 9 06:44:21.948000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit: BPF prog-id=126 op=LOAD Feb 9 06:44:21.948000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3101 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:21.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235396137356163343334313732633961626335653933616165336536 Feb 9 06:44:21.948000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3101 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:21.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235396137356163343334313732633961626335653933616165336536 Feb 9 06:44:21.948000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:21.948000 audit: BPF prog-id=127 op=LOAD Feb 9 06:44:21.948000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dc648 items=0 ppid=3075 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:21.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231323461623039626533643764613938663531356163666133386332 Feb 9 06:44:21.948000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000288550 items=0 ppid=3101 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:21.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235396137356163343334313732633961626335653933616165336536 Feb 9 06:44:22.181000 audit: BPF prog-id=127 op=UNLOAD Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit: BPF prog-id=125 op=UNLOAD Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit: BPF prog-id=129 op=LOAD Feb 9 06:44:22.181000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit: BPF prog-id=130 op=LOAD Feb 9 06:44:22.181000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000288598 items=0 ppid=3101 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:22.181000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dca58 items=0 ppid=3075 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:22.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235396137356163343334313732633961626335653933616165336536 Feb 9 06:44:22.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231323461623039626533643764613938663531356163666133386332 Feb 9 06:44:22.181000 audit: BPF prog-id=129 op=UNLOAD Feb 9 06:44:22.181000 audit: BPF prog-id=128 op=UNLOAD Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { perfmon } for pid=3119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit[3119]: AVC avc: denied { bpf } for pid=3119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:22.181000 audit: BPF prog-id=131 op=LOAD Feb 9 06:44:22.181000 audit[3119]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002889a8 items=0 ppid=3101 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:22.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235396137356163343334313732633961626335653933616165336536 Feb 9 06:44:22.199118 env[1476]: time="2024-02-09T06:44:22.199094907Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5975fc6685-6v2wv,Uid:73b72c76-f5bd-4b43-842c-1c5c7c2a1a32,Namespace:calico-system,Attempt:0,} returns sandbox id \"2124ab09be3d7da98f515acfa38c25ed3a0bbdd947e7af96ff24b091c5527b73\"" Feb 9 06:44:22.199648 env[1476]: time="2024-02-09T06:44:22.199633671Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bnjjw,Uid:6678e3be-812d-4321-b8bf-a97282ef5dc4,Namespace:calico-system,Attempt:0,} returns sandbox id \"259a75ac434172c9abc5e93aae3e61e5eecb588363e2406cbfa28f7c91574466\"" Feb 9 06:44:22.199748 env[1476]: time="2024-02-09T06:44:22.199736056Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 06:44:22.218000 audit[3177]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:44:22.218000 audit[3177]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fffd863c9c0 a2=0 a3=7fffd863c9ac items=0 ppid=2856 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:22.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:44:22.238000 audit[3177]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:44:22.238000 audit[3177]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fffd863c9c0 a2=0 a3=31030 items=0 ppid=2856 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:22.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:44:23.482601 kubelet[2582]: E0209 06:44:23.482546 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:25.483282 kubelet[2582]: E0209 06:44:25.483191 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:26.731880 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1091057570.mount: Deactivated successfully. Feb 9 06:44:27.482734 kubelet[2582]: E0209 06:44:27.482629 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:28.309253 systemd[1]: Started sshd@9-86.109.11.101:22-159.223.148.156:47172.service. Feb 9 06:44:28.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-86.109.11.101:22-159.223.148.156:47172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:28.335258 kernel: kauditd_printk_skb: 114 callbacks suppressed Feb 9 06:44:28.335335 kernel: audit: type=1130 audit(1707461068.308:1107): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-86.109.11.101:22-159.223.148.156:47172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:28.746053 sshd[3182]: Invalid user david from 159.223.148.156 port 47172 Feb 9 06:44:28.752144 sshd[3182]: pam_faillock(sshd:auth): User unknown Feb 9 06:44:28.753120 sshd[3182]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:44:28.753212 sshd[3182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.148.156 Feb 9 06:44:28.754078 sshd[3182]: pam_faillock(sshd:auth): User unknown Feb 9 06:44:28.754000 audit[3182]: USER_AUTH pid=3182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="david" exe="/usr/sbin/sshd" hostname=159.223.148.156 addr=159.223.148.156 terminal=ssh res=failed' Feb 9 06:44:28.847287 kernel: audit: type=1100 audit(1707461068.754:1108): pid=3182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="david" exe="/usr/sbin/sshd" hostname=159.223.148.156 addr=159.223.148.156 terminal=ssh res=failed' Feb 9 06:44:29.482646 kubelet[2582]: E0209 06:44:29.482549 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:31.435825 sshd[3182]: Failed password for invalid user david from 159.223.148.156 port 47172 ssh2 Feb 9 06:44:31.482377 kubelet[2582]: E0209 06:44:31.482330 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:31.973340 sshd[3182]: Received disconnect from 159.223.148.156 port 47172:11: Bye Bye [preauth] Feb 9 06:44:31.973340 sshd[3182]: Disconnected from invalid user david 159.223.148.156 port 47172 [preauth] Feb 9 06:44:31.975796 systemd[1]: sshd@9-86.109.11.101:22-159.223.148.156:47172.service: Deactivated successfully. Feb 9 06:44:31.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-86.109.11.101:22-159.223.148.156:47172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:32.064173 kernel: audit: type=1131 audit(1707461071.975:1109): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-86.109.11.101:22-159.223.148.156:47172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:33.226153 env[1476]: time="2024-02-09T06:44:33.226127845Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:44:33.226793 env[1476]: time="2024-02-09T06:44:33.226779809Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:44:33.227729 env[1476]: time="2024-02-09T06:44:33.227709030Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:44:33.228959 env[1476]: time="2024-02-09T06:44:33.228945466Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:44:33.229307 env[1476]: time="2024-02-09T06:44:33.229279175Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 06:44:33.229592 env[1476]: time="2024-02-09T06:44:33.229558252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 06:44:33.233467 env[1476]: time="2024-02-09T06:44:33.233427411Z" level=info msg="CreateContainer within sandbox \"2124ab09be3d7da98f515acfa38c25ed3a0bbdd947e7af96ff24b091c5527b73\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 06:44:33.237905 env[1476]: time="2024-02-09T06:44:33.237856778Z" level=info msg="CreateContainer within sandbox \"2124ab09be3d7da98f515acfa38c25ed3a0bbdd947e7af96ff24b091c5527b73\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e85d64fba99a08f23f3dfa51baed15bda5541402b820f55e6052bf2ccda62274\"" Feb 9 06:44:33.238185 env[1476]: time="2024-02-09T06:44:33.238145894Z" level=info msg="StartContainer for \"e85d64fba99a08f23f3dfa51baed15bda5541402b820f55e6052bf2ccda62274\"" Feb 9 06:44:33.258965 systemd[1]: Started cri-containerd-e85d64fba99a08f23f3dfa51baed15bda5541402b820f55e6052bf2ccda62274.scope. Feb 9 06:44:33.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.389117 kernel: audit: type=1400 audit(1707461073.264:1110): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.389172 kernel: audit: type=1400 audit(1707461073.264:1111): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.389220 kernel: audit: type=1400 audit(1707461073.264:1112): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.482837 kubelet[2582]: E0209 06:44:33.482750 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:33.513946 kernel: audit: type=1400 audit(1707461073.264:1113): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.514000 kernel: audit: type=1400 audit(1707461073.264:1114): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.701454 kernel: audit: type=1400 audit(1707461073.264:1115): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.701485 kernel: audit: type=1400 audit(1707461073.264:1116): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.701560 kernel: audit: type=1400 audit(1707461073.264:1117): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.825592 kernel: audit: type=1400 audit(1707461073.264:1118): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.825627 kernel: audit: type=1400 audit(1707461073.388:1119): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit: BPF prog-id=132 op=LOAD Feb 9 06:44:33.915381 kernel: audit: type=1334 audit(1707461073.388:1120): prog-id=132 op=LOAD Feb 9 06:44:33.388000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit[3194]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3075 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:33.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538356436346662613939613038663233663364666135316261656431 Feb 9 06:44:33.388000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit[3194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3075 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:33.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538356436346662613939613038663233663364666135316261656431 Feb 9 06:44:33.388000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.388000 audit: BPF prog-id=133 op=LOAD Feb 9 06:44:33.388000 audit[3194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00026fe40 items=0 ppid=3075 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:33.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538356436346662613939613038663233663364666135316261656431 Feb 9 06:44:33.512000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.512000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.512000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.512000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.512000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.512000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.512000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.512000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.512000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.512000 audit: BPF prog-id=134 op=LOAD Feb 9 06:44:33.512000 audit[3194]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00026fe88 items=0 ppid=3075 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:33.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538356436346662613939613038663233663364666135316261656431 Feb 9 06:44:33.638000 audit: BPF prog-id=134 op=UNLOAD Feb 9 06:44:33.638000 audit: BPF prog-id=133 op=UNLOAD Feb 9 06:44:33.638000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.638000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.638000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.638000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.638000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.638000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.638000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.638000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.638000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.638000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:33.638000 audit: BPF prog-id=135 op=LOAD Feb 9 06:44:33.638000 audit[3194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b2298 items=0 ppid=3075 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:33.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538356436346662613939613038663233663364666135316261656431 Feb 9 06:44:33.943937 env[1476]: time="2024-02-09T06:44:33.943885575Z" level=info msg="StartContainer for \"e85d64fba99a08f23f3dfa51baed15bda5541402b820f55e6052bf2ccda62274\" returns successfully" Feb 9 06:44:34.590687 kubelet[2582]: E0209 06:44:34.590624 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.590687 kubelet[2582]: W0209 06:44:34.590673 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.591943 kubelet[2582]: E0209 06:44:34.590744 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.591943 kubelet[2582]: I0209 06:44:34.590794 2582 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5975fc6685-6v2wv" podStartSLOduration=2.560829975 podCreationTimestamp="2024-02-09 06:44:21 +0000 UTC" firstStartedPulling="2024-02-09 06:44:22.199577672 +0000 UTC m=+18.768168603" lastFinishedPulling="2024-02-09 06:44:33.22944023 +0000 UTC m=+29.798031159" observedRunningTime="2024-02-09 06:44:34.590344776 +0000 UTC m=+31.158935781" watchObservedRunningTime="2024-02-09 06:44:34.590692531 +0000 UTC m=+31.159283531" Feb 9 06:44:34.591943 kubelet[2582]: E0209 06:44:34.591318 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.591943 kubelet[2582]: W0209 06:44:34.591354 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.591943 kubelet[2582]: E0209 06:44:34.591423 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.592934 kubelet[2582]: E0209 06:44:34.591966 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.592934 kubelet[2582]: W0209 06:44:34.592000 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.592934 kubelet[2582]: E0209 06:44:34.592060 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.592934 kubelet[2582]: E0209 06:44:34.592631 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.592934 kubelet[2582]: W0209 06:44:34.592666 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.592934 kubelet[2582]: E0209 06:44:34.592727 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.593864 kubelet[2582]: E0209 06:44:34.593253 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.593864 kubelet[2582]: W0209 06:44:34.593286 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.593864 kubelet[2582]: E0209 06:44:34.593334 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.593864 kubelet[2582]: E0209 06:44:34.593812 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.593864 kubelet[2582]: W0209 06:44:34.593843 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.594629 kubelet[2582]: E0209 06:44:34.593892 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.594827 kubelet[2582]: E0209 06:44:34.594639 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.594827 kubelet[2582]: W0209 06:44:34.594673 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.594827 kubelet[2582]: E0209 06:44:34.594728 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.595351 kubelet[2582]: E0209 06:44:34.595315 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.595538 kubelet[2582]: W0209 06:44:34.595349 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.595538 kubelet[2582]: E0209 06:44:34.595403 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.595924 kubelet[2582]: E0209 06:44:34.595890 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.595924 kubelet[2582]: W0209 06:44:34.595920 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.596318 kubelet[2582]: E0209 06:44:34.595971 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.596555 kubelet[2582]: E0209 06:44:34.596520 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.596555 kubelet[2582]: W0209 06:44:34.596552 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.596890 kubelet[2582]: E0209 06:44:34.596604 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.597162 kubelet[2582]: E0209 06:44:34.597128 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.597162 kubelet[2582]: W0209 06:44:34.597160 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.597515 kubelet[2582]: E0209 06:44:34.597211 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.597740 kubelet[2582]: E0209 06:44:34.597705 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.597740 kubelet[2582]: W0209 06:44:34.597737 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.598098 kubelet[2582]: E0209 06:44:34.597793 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.632000 audit[3248]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3248 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:44:34.632000 audit[3248]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd0f1f61e0 a2=0 a3=7ffd0f1f61cc items=0 ppid=2856 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:34.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:44:34.635000 audit[3248]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3248 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:44:34.635000 audit[3248]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffd0f1f61e0 a2=0 a3=7ffd0f1f61cc items=0 ppid=2856 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:34.635000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:44:34.691774 kubelet[2582]: E0209 06:44:34.691678 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.691774 kubelet[2582]: W0209 06:44:34.691722 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.691774 kubelet[2582]: E0209 06:44:34.691773 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.692495 kubelet[2582]: E0209 06:44:34.692421 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.692495 kubelet[2582]: W0209 06:44:34.692456 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.692811 kubelet[2582]: E0209 06:44:34.692514 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.693204 kubelet[2582]: E0209 06:44:34.693124 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.693204 kubelet[2582]: W0209 06:44:34.693164 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.693548 kubelet[2582]: E0209 06:44:34.693223 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.693913 kubelet[2582]: E0209 06:44:34.693837 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.693913 kubelet[2582]: W0209 06:44:34.693875 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.694275 kubelet[2582]: E0209 06:44:34.693944 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.694618 kubelet[2582]: E0209 06:44:34.694521 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.694618 kubelet[2582]: W0209 06:44:34.694554 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.694911 kubelet[2582]: E0209 06:44:34.694708 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.695185 kubelet[2582]: E0209 06:44:34.695107 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.695185 kubelet[2582]: W0209 06:44:34.695135 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.695507 kubelet[2582]: E0209 06:44:34.695251 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.695756 kubelet[2582]: E0209 06:44:34.695666 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.695756 kubelet[2582]: W0209 06:44:34.695699 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.696067 kubelet[2582]: E0209 06:44:34.695816 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.696323 kubelet[2582]: E0209 06:44:34.696287 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.696447 kubelet[2582]: W0209 06:44:34.696321 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.696447 kubelet[2582]: E0209 06:44:34.696372 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.696985 kubelet[2582]: E0209 06:44:34.696957 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.697111 kubelet[2582]: W0209 06:44:34.696985 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.697239 kubelet[2582]: E0209 06:44:34.697108 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.697618 kubelet[2582]: E0209 06:44:34.697529 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.697618 kubelet[2582]: W0209 06:44:34.697565 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.698014 kubelet[2582]: E0209 06:44:34.697714 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.698180 kubelet[2582]: E0209 06:44:34.698144 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.698294 kubelet[2582]: W0209 06:44:34.698179 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.698294 kubelet[2582]: E0209 06:44:34.698241 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.698845 kubelet[2582]: E0209 06:44:34.698755 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.698845 kubelet[2582]: W0209 06:44:34.698788 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.698845 kubelet[2582]: E0209 06:44:34.698836 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.699517 kubelet[2582]: E0209 06:44:34.699427 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.699517 kubelet[2582]: W0209 06:44:34.699460 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.699835 kubelet[2582]: E0209 06:44:34.699603 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.699996 kubelet[2582]: E0209 06:44:34.699968 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.700143 kubelet[2582]: W0209 06:44:34.699994 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.700143 kubelet[2582]: E0209 06:44:34.700101 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.700685 kubelet[2582]: E0209 06:44:34.700595 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.700685 kubelet[2582]: W0209 06:44:34.700634 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.700976 kubelet[2582]: E0209 06:44:34.700695 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.701345 kubelet[2582]: E0209 06:44:34.701260 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.701345 kubelet[2582]: W0209 06:44:34.701286 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.701345 kubelet[2582]: E0209 06:44:34.701338 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.701858 kubelet[2582]: E0209 06:44:34.701828 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.701858 kubelet[2582]: W0209 06:44:34.701853 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.702137 kubelet[2582]: E0209 06:44:34.701888 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:34.702807 kubelet[2582]: E0209 06:44:34.702716 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:34.702807 kubelet[2582]: W0209 06:44:34.702750 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:34.702807 kubelet[2582]: E0209 06:44:34.702790 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.482876 kubelet[2582]: E0209 06:44:35.482781 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:35.606437 kubelet[2582]: E0209 06:44:35.606329 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.606437 kubelet[2582]: W0209 06:44:35.606369 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.606437 kubelet[2582]: E0209 06:44:35.606420 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.607464 kubelet[2582]: E0209 06:44:35.606974 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.607464 kubelet[2582]: W0209 06:44:35.607007 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.607464 kubelet[2582]: E0209 06:44:35.607048 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.607776 kubelet[2582]: E0209 06:44:35.607590 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.607776 kubelet[2582]: W0209 06:44:35.607621 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.607776 kubelet[2582]: E0209 06:44:35.607662 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.608277 kubelet[2582]: E0209 06:44:35.608187 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.608277 kubelet[2582]: W0209 06:44:35.608211 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.608277 kubelet[2582]: E0209 06:44:35.608244 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.608830 kubelet[2582]: E0209 06:44:35.608740 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.608830 kubelet[2582]: W0209 06:44:35.608773 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.608830 kubelet[2582]: E0209 06:44:35.608812 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.609464 kubelet[2582]: E0209 06:44:35.609373 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.609464 kubelet[2582]: W0209 06:44:35.609406 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.609464 kubelet[2582]: E0209 06:44:35.609446 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.610079 kubelet[2582]: E0209 06:44:35.610050 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.610079 kubelet[2582]: W0209 06:44:35.610077 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.610357 kubelet[2582]: E0209 06:44:35.610136 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.610726 kubelet[2582]: E0209 06:44:35.610637 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.610726 kubelet[2582]: W0209 06:44:35.610670 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.610726 kubelet[2582]: E0209 06:44:35.610714 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.611296 kubelet[2582]: E0209 06:44:35.611185 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.611296 kubelet[2582]: W0209 06:44:35.611207 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.611296 kubelet[2582]: E0209 06:44:35.611240 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.611820 kubelet[2582]: E0209 06:44:35.611747 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.611820 kubelet[2582]: W0209 06:44:35.611780 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.611820 kubelet[2582]: E0209 06:44:35.611820 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.612446 kubelet[2582]: E0209 06:44:35.612357 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.612446 kubelet[2582]: W0209 06:44:35.612390 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.612446 kubelet[2582]: E0209 06:44:35.612430 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.612949 kubelet[2582]: E0209 06:44:35.612920 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.612949 kubelet[2582]: W0209 06:44:35.612946 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.613240 kubelet[2582]: E0209 06:44:35.612982 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.702188 kubelet[2582]: E0209 06:44:35.702054 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.702188 kubelet[2582]: W0209 06:44:35.702116 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.702188 kubelet[2582]: E0209 06:44:35.702175 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.702831 kubelet[2582]: E0209 06:44:35.702715 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.702831 kubelet[2582]: W0209 06:44:35.702742 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.702831 kubelet[2582]: E0209 06:44:35.702783 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.703365 kubelet[2582]: E0209 06:44:35.703277 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.703365 kubelet[2582]: W0209 06:44:35.703302 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.703365 kubelet[2582]: E0209 06:44:35.703347 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.703971 kubelet[2582]: E0209 06:44:35.703915 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.703971 kubelet[2582]: W0209 06:44:35.703951 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.704278 kubelet[2582]: E0209 06:44:35.704005 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.704622 kubelet[2582]: E0209 06:44:35.704548 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.704622 kubelet[2582]: W0209 06:44:35.704581 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.704958 kubelet[2582]: E0209 06:44:35.704709 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.705111 kubelet[2582]: E0209 06:44:35.705056 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.705111 kubelet[2582]: W0209 06:44:35.705081 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.705366 kubelet[2582]: E0209 06:44:35.705232 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.705712 kubelet[2582]: E0209 06:44:35.705619 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.705712 kubelet[2582]: W0209 06:44:35.705652 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.706033 kubelet[2582]: E0209 06:44:35.705793 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.706206 kubelet[2582]: E0209 06:44:35.706167 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.706206 kubelet[2582]: W0209 06:44:35.706190 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.706446 kubelet[2582]: E0209 06:44:35.706235 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.706877 kubelet[2582]: E0209 06:44:35.706798 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.706877 kubelet[2582]: W0209 06:44:35.706831 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.707274 kubelet[2582]: E0209 06:44:35.706976 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.707414 kubelet[2582]: E0209 06:44:35.707325 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.707414 kubelet[2582]: W0209 06:44:35.707357 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.707633 kubelet[2582]: E0209 06:44:35.707488 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.707932 kubelet[2582]: E0209 06:44:35.707866 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.707932 kubelet[2582]: W0209 06:44:35.707899 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.708188 kubelet[2582]: E0209 06:44:35.707948 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.708550 kubelet[2582]: E0209 06:44:35.708461 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.708550 kubelet[2582]: W0209 06:44:35.708494 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.708550 kubelet[2582]: E0209 06:44:35.708540 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.709072 kubelet[2582]: E0209 06:44:35.709044 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.709072 kubelet[2582]: W0209 06:44:35.709071 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.709373 kubelet[2582]: E0209 06:44:35.709145 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.709587 kubelet[2582]: E0209 06:44:35.709554 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.709706 kubelet[2582]: W0209 06:44:35.709588 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.709706 kubelet[2582]: E0209 06:44:35.709672 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.710081 kubelet[2582]: E0209 06:44:35.710057 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.710081 kubelet[2582]: W0209 06:44:35.710082 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.710370 kubelet[2582]: E0209 06:44:35.710182 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.710620 kubelet[2582]: E0209 06:44:35.710589 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.710752 kubelet[2582]: W0209 06:44:35.710622 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.710752 kubelet[2582]: E0209 06:44:35.710673 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.711185 kubelet[2582]: E0209 06:44:35.711159 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.711185 kubelet[2582]: W0209 06:44:35.711183 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.711418 kubelet[2582]: E0209 06:44:35.711217 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:35.711958 kubelet[2582]: E0209 06:44:35.711930 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:35.711958 kubelet[2582]: W0209 06:44:35.711956 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:35.712217 kubelet[2582]: E0209 06:44:35.711992 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.620989 kubelet[2582]: E0209 06:44:36.620875 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.620989 kubelet[2582]: W0209 06:44:36.620919 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.620989 kubelet[2582]: E0209 06:44:36.620965 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.622100 kubelet[2582]: E0209 06:44:36.621545 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.622100 kubelet[2582]: W0209 06:44:36.621583 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.622100 kubelet[2582]: E0209 06:44:36.621624 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.622456 kubelet[2582]: E0209 06:44:36.622198 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.622456 kubelet[2582]: W0209 06:44:36.622223 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.622456 kubelet[2582]: E0209 06:44:36.622260 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.622914 kubelet[2582]: E0209 06:44:36.622840 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.622914 kubelet[2582]: W0209 06:44:36.622874 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.622914 kubelet[2582]: E0209 06:44:36.622914 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.623542 kubelet[2582]: E0209 06:44:36.623468 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.623542 kubelet[2582]: W0209 06:44:36.623501 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.623542 kubelet[2582]: E0209 06:44:36.623546 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.624184 kubelet[2582]: E0209 06:44:36.624077 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.624184 kubelet[2582]: W0209 06:44:36.624138 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.624184 kubelet[2582]: E0209 06:44:36.624180 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.624852 kubelet[2582]: E0209 06:44:36.624773 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.624852 kubelet[2582]: W0209 06:44:36.624805 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.624852 kubelet[2582]: E0209 06:44:36.624842 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.625467 kubelet[2582]: E0209 06:44:36.625372 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.625467 kubelet[2582]: W0209 06:44:36.625406 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.625467 kubelet[2582]: E0209 06:44:36.625446 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.625982 kubelet[2582]: E0209 06:44:36.625948 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.625982 kubelet[2582]: W0209 06:44:36.625972 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.626277 kubelet[2582]: E0209 06:44:36.626008 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.626640 kubelet[2582]: E0209 06:44:36.626560 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.626640 kubelet[2582]: W0209 06:44:36.626593 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.626640 kubelet[2582]: E0209 06:44:36.626633 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.627240 kubelet[2582]: E0209 06:44:36.627154 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.627240 kubelet[2582]: W0209 06:44:36.627181 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.627240 kubelet[2582]: E0209 06:44:36.627215 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.627803 kubelet[2582]: E0209 06:44:36.627732 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.627803 kubelet[2582]: W0209 06:44:36.627766 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.627803 kubelet[2582]: E0209 06:44:36.627806 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.682363 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4069224997.mount: Deactivated successfully. Feb 9 06:44:36.711133 kubelet[2582]: E0209 06:44:36.711100 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.711133 kubelet[2582]: W0209 06:44:36.711114 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.711133 kubelet[2582]: E0209 06:44:36.711129 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.711361 kubelet[2582]: E0209 06:44:36.711321 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.711361 kubelet[2582]: W0209 06:44:36.711330 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.711361 kubelet[2582]: E0209 06:44:36.711343 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.711478 kubelet[2582]: E0209 06:44:36.711473 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.711513 kubelet[2582]: W0209 06:44:36.711479 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.711513 kubelet[2582]: E0209 06:44:36.711489 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.711676 kubelet[2582]: E0209 06:44:36.711633 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.711676 kubelet[2582]: W0209 06:44:36.711642 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.711676 kubelet[2582]: E0209 06:44:36.711655 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.711791 kubelet[2582]: E0209 06:44:36.711774 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.711791 kubelet[2582]: W0209 06:44:36.711780 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.711791 kubelet[2582]: E0209 06:44:36.711790 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.711957 kubelet[2582]: E0209 06:44:36.711929 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.711957 kubelet[2582]: W0209 06:44:36.711935 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.711957 kubelet[2582]: E0209 06:44:36.711952 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.712079 kubelet[2582]: E0209 06:44:36.712073 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.712079 kubelet[2582]: W0209 06:44:36.712079 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.712160 kubelet[2582]: E0209 06:44:36.712097 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.712331 kubelet[2582]: E0209 06:44:36.712291 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.712331 kubelet[2582]: W0209 06:44:36.712300 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.712331 kubelet[2582]: E0209 06:44:36.712317 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.712439 kubelet[2582]: E0209 06:44:36.712434 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.712480 kubelet[2582]: W0209 06:44:36.712440 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.712480 kubelet[2582]: E0209 06:44:36.712460 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.712617 kubelet[2582]: E0209 06:44:36.712576 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.712617 kubelet[2582]: W0209 06:44:36.712582 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.712617 kubelet[2582]: E0209 06:44:36.712598 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.712738 kubelet[2582]: E0209 06:44:36.712683 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.712738 kubelet[2582]: W0209 06:44:36.712689 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.712738 kubelet[2582]: E0209 06:44:36.712698 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.712874 kubelet[2582]: E0209 06:44:36.712799 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.712874 kubelet[2582]: W0209 06:44:36.712805 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.712874 kubelet[2582]: E0209 06:44:36.712815 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.712987 kubelet[2582]: E0209 06:44:36.712934 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.712987 kubelet[2582]: W0209 06:44:36.712940 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.712987 kubelet[2582]: E0209 06:44:36.712950 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.713169 kubelet[2582]: E0209 06:44:36.713147 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.713169 kubelet[2582]: W0209 06:44:36.713159 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.713258 kubelet[2582]: E0209 06:44:36.713177 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.713308 kubelet[2582]: E0209 06:44:36.713295 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.713308 kubelet[2582]: W0209 06:44:36.713304 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.713411 kubelet[2582]: E0209 06:44:36.713320 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.713497 kubelet[2582]: E0209 06:44:36.713487 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.713497 kubelet[2582]: W0209 06:44:36.713497 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.713599 kubelet[2582]: E0209 06:44:36.713515 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.713683 kubelet[2582]: E0209 06:44:36.713674 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.713683 kubelet[2582]: W0209 06:44:36.713681 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.713769 kubelet[2582]: E0209 06:44:36.713695 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:36.713806 kubelet[2582]: E0209 06:44:36.713797 2582 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:44:36.713806 kubelet[2582]: W0209 06:44:36.713804 2582 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:44:36.713867 kubelet[2582]: E0209 06:44:36.713813 2582 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:44:37.483261 kubelet[2582]: E0209 06:44:37.483172 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:39.482756 kubelet[2582]: E0209 06:44:39.482656 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:41.482910 kubelet[2582]: E0209 06:44:41.482871 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:42.835886 env[1476]: time="2024-02-09T06:44:42.835836896Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:44:42.836481 env[1476]: time="2024-02-09T06:44:42.836440474Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:44:42.837585 env[1476]: time="2024-02-09T06:44:42.837545857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:44:42.838860 env[1476]: time="2024-02-09T06:44:42.838821184Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:44:42.839267 env[1476]: time="2024-02-09T06:44:42.839226681Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 06:44:42.840710 env[1476]: time="2024-02-09T06:44:42.840674008Z" level=info msg="CreateContainer within sandbox \"259a75ac434172c9abc5e93aae3e61e5eecb588363e2406cbfa28f7c91574466\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 06:44:42.845554 env[1476]: time="2024-02-09T06:44:42.845505785Z" level=info msg="CreateContainer within sandbox \"259a75ac434172c9abc5e93aae3e61e5eecb588363e2406cbfa28f7c91574466\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4e928fc3ffbb23e146a4a87a747156785881801d8dfda4c843b53b152f536c1d\"" Feb 9 06:44:42.845910 env[1476]: time="2024-02-09T06:44:42.845882033Z" level=info msg="StartContainer for \"4e928fc3ffbb23e146a4a87a747156785881801d8dfda4c843b53b152f536c1d\"" Feb 9 06:44:42.869349 systemd[1]: Started cri-containerd-4e928fc3ffbb23e146a4a87a747156785881801d8dfda4c843b53b152f536c1d.scope. Feb 9 06:44:42.874000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.901633 kernel: kauditd_printk_skb: 52 callbacks suppressed Feb 9 06:44:42.901730 kernel: audit: type=1400 audit(1707461082.874:1130): avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.874000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3101 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:43.057377 kernel: audit: type=1300 audit(1707461082.874:1130): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3101 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:43.057445 kernel: audit: type=1327 audit(1707461082.874:1130): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465393238666333666662623233653134366134613837613734373135 Feb 9 06:44:42.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465393238666333666662623233653134366134613837613734373135 Feb 9 06:44:43.148815 kernel: audit: type=1400 audit(1707461082.874:1131): avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.874000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.874000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.273322 kernel: audit: type=1400 audit(1707461082.874:1131): avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.273399 kernel: audit: type=1400 audit(1707461082.874:1131): avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.874000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.335798 kernel: audit: type=1400 audit(1707461082.874:1131): avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.874000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.401109 kernel: audit: type=1400 audit(1707461082.874:1131): avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.874000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.465436 kernel: audit: type=1400 audit(1707461082.874:1131): avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.874000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.468426 env[1476]: time="2024-02-09T06:44:43.468400765Z" level=info msg="StartContainer for \"4e928fc3ffbb23e146a4a87a747156785881801d8dfda4c843b53b152f536c1d\" returns successfully" Feb 9 06:44:43.482399 kubelet[2582]: E0209 06:44:43.482381 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:42.874000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.530045 systemd[1]: cri-containerd-4e928fc3ffbb23e146a4a87a747156785881801d8dfda4c843b53b152f536c1d.scope: Deactivated successfully. Feb 9 06:44:43.594164 kernel: audit: type=1400 audit(1707461082.874:1131): avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.874000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.874000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.874000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.874000 audit: BPF prog-id=136 op=LOAD Feb 9 06:44:42.874000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c24f0 items=0 ppid=3101 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:42.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465393238666333666662623233653134366134613837613734373135 Feb 9 06:44:42.962000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.962000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.962000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.962000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.962000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.962000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.962000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.962000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.962000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:42.962000 audit: BPF prog-id=137 op=LOAD Feb 9 06:44:42.962000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c2538 items=0 ppid=3101 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:42.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465393238666333666662623233653134366134613837613734373135 Feb 9 06:44:43.147000 audit: BPF prog-id=137 op=UNLOAD Feb 9 06:44:43.147000 audit: BPF prog-id=136 op=UNLOAD Feb 9 06:44:43.147000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.147000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.147000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.147000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.147000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.147000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.147000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.147000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.147000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.147000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:44:43.147000 audit: BPF prog-id=138 op=LOAD Feb 9 06:44:43.147000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c25c8 items=0 ppid=3101 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:44:43.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465393238666333666662623233653134366134613837613734373135 Feb 9 06:44:43.609000 audit: BPF prog-id=138 op=UNLOAD Feb 9 06:44:43.625968 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4e928fc3ffbb23e146a4a87a747156785881801d8dfda4c843b53b152f536c1d-rootfs.mount: Deactivated successfully. Feb 9 06:44:44.000357 env[1476]: time="2024-02-09T06:44:44.000223118Z" level=info msg="shim disconnected" id=4e928fc3ffbb23e146a4a87a747156785881801d8dfda4c843b53b152f536c1d Feb 9 06:44:44.000357 env[1476]: time="2024-02-09T06:44:44.000316872Z" level=warning msg="cleaning up after shim disconnected" id=4e928fc3ffbb23e146a4a87a747156785881801d8dfda4c843b53b152f536c1d namespace=k8s.io Feb 9 06:44:44.000357 env[1476]: time="2024-02-09T06:44:44.000344125Z" level=info msg="cleaning up dead shim" Feb 9 06:44:44.016844 env[1476]: time="2024-02-09T06:44:44.016737641Z" level=warning msg="cleanup warnings time=\"2024-02-09T06:44:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3378 runtime=io.containerd.runc.v2\n" Feb 9 06:44:44.603665 env[1476]: time="2024-02-09T06:44:44.603546603Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 06:44:45.483288 kubelet[2582]: E0209 06:44:45.483190 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:47.483345 kubelet[2582]: E0209 06:44:47.483277 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:48.182208 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount758566436.mount: Deactivated successfully. Feb 9 06:44:49.482794 kubelet[2582]: E0209 06:44:49.482690 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:51.483358 kubelet[2582]: E0209 06:44:51.483298 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:53.482648 kubelet[2582]: E0209 06:44:53.482597 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:55.482980 kubelet[2582]: E0209 06:44:55.482843 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:57.362786 systemd[1]: Started sshd@10-86.109.11.101:22-195.87.80.171:31408.service. Feb 9 06:44:57.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-86.109.11.101:22-195.87.80.171:31408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:57.390324 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 06:44:57.390396 kernel: audit: type=1130 audit(1707461097.361:1137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-86.109.11.101:22-195.87.80.171:31408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:44:57.482156 kubelet[2582]: E0209 06:44:57.482144 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:58.371386 sshd[3393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.87.80.171 user=root Feb 9 06:44:58.370000 audit[3393]: USER_AUTH pid=3393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:44:58.463278 kernel: audit: type=1100 audit(1707461098.370:1138): pid=3393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:44:59.331000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:59.331000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00b115060 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:44:59.482627 kubelet[2582]: E0209 06:44:59.482587 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:44:59.523650 kernel: audit: type=1400 audit(1707461099.331:1139): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:59.523707 kernel: audit: type=1300 audit(1707461099.331:1139): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00b115060 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:44:59.523723 kernel: audit: type=1327 audit(1707461099.331:1139): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:44:59.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:44:59.617171 kernel: audit: type=1400 audit(1707461099.331:1140): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:59.331000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:59.708416 kernel: audit: type=1300 audit(1707461099.331:1140): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00eb6ba10 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:44:59.331000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00eb6ba10 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:44:59.806820 kernel: audit: type=1327 audit(1707461099.331:1140): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:44:59.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:44:59.900391 kernel: audit: type=1400 audit(1707461099.333:1141): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:59.333000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:59.333000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00eb6ba70 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:45:00.091240 kernel: audit: type=1300 audit(1707461099.333:1141): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00eb6ba70 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:44:59.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:44:59.340000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:59.340000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00de04ae0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:44:59.340000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:44:59.340000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:59.340000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00af7bdc0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:44:59.340000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:44:59.341000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:59.341000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00a8b8f30 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:44:59.341000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:44:59.460000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:59.460000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a83ad0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:44:59.460000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:44:59.460000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:44:59.460000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0018d2e60 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:44:59.460000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:45:00.617342 env[1476]: time="2024-02-09T06:45:00.617321639Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:00.617960 env[1476]: time="2024-02-09T06:45:00.617931177Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:00.618868 env[1476]: time="2024-02-09T06:45:00.618856186Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:00.620193 env[1476]: time="2024-02-09T06:45:00.620128746Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:00.620483 env[1476]: time="2024-02-09T06:45:00.620453301Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 06:45:00.621804 env[1476]: time="2024-02-09T06:45:00.621777150Z" level=info msg="CreateContainer within sandbox \"259a75ac434172c9abc5e93aae3e61e5eecb588363e2406cbfa28f7c91574466\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 06:45:00.626568 env[1476]: time="2024-02-09T06:45:00.626512331Z" level=info msg="CreateContainer within sandbox \"259a75ac434172c9abc5e93aae3e61e5eecb588363e2406cbfa28f7c91574466\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"da9cf3b6fc6591934fecce9b561fe238a5c18bc8c8f0888a2eaf508c0a98e208\"" Feb 9 06:45:00.626818 env[1476]: time="2024-02-09T06:45:00.626788835Z" level=info msg="StartContainer for \"da9cf3b6fc6591934fecce9b561fe238a5c18bc8c8f0888a2eaf508c0a98e208\"" Feb 9 06:45:00.646968 systemd[1]: Started cri-containerd-da9cf3b6fc6591934fecce9b561fe238a5c18bc8c8f0888a2eaf508c0a98e208.scope. Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3101 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:00.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461396366336236666336353931393334666563636539623536316665 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit: BPF prog-id=139 op=LOAD Feb 9 06:45:00.652000 audit[3402]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000219200 items=0 ppid=3101 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:00.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461396366336236666336353931393334666563636539623536316665 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit: BPF prog-id=140 op=LOAD Feb 9 06:45:00.652000 audit[3402]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000219248 items=0 ppid=3101 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:00.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461396366336236666336353931393334666563636539623536316665 Feb 9 06:45:00.652000 audit: BPF prog-id=140 op=UNLOAD Feb 9 06:45:00.652000 audit: BPF prog-id=139 op=UNLOAD Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { perfmon } for pid=3402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit[3402]: AVC avc: denied { bpf } for pid=3402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:00.652000 audit: BPF prog-id=141 op=LOAD Feb 9 06:45:00.652000 audit[3402]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002192d8 items=0 ppid=3101 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:00.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461396366336236666336353931393334666563636539623536316665 Feb 9 06:45:00.672441 env[1476]: time="2024-02-09T06:45:00.672416347Z" level=info msg="StartContainer for \"da9cf3b6fc6591934fecce9b561fe238a5c18bc8c8f0888a2eaf508c0a98e208\" returns successfully" Feb 9 06:45:00.837345 sshd[3393]: Failed password for root from 195.87.80.171 port 31408 ssh2 Feb 9 06:45:01.365616 systemd[1]: cri-containerd-da9cf3b6fc6591934fecce9b561fe238a5c18bc8c8f0888a2eaf508c0a98e208.scope: Deactivated successfully. Feb 9 06:45:01.382000 audit: BPF prog-id=141 op=UNLOAD Feb 9 06:45:01.413544 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-da9cf3b6fc6591934fecce9b561fe238a5c18bc8c8f0888a2eaf508c0a98e208-rootfs.mount: Deactivated successfully. Feb 9 06:45:01.420312 kubelet[2582]: I0209 06:45:01.420269 2582 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 06:45:01.456583 kubelet[2582]: I0209 06:45:01.456504 2582 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:45:01.458241 kubelet[2582]: I0209 06:45:01.458192 2582 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:45:01.459572 kubelet[2582]: I0209 06:45:01.459524 2582 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:45:01.472046 systemd[1]: Created slice kubepods-burstable-poda835e77a_4b5c_42a8_ba3b_5aa36d07d9ac.slice. Feb 9 06:45:01.483356 systemd[1]: Created slice kubepods-burstable-pod506ab73f_4273_4187_a8f5_4370e58fdf8c.slice. Feb 9 06:45:01.491220 systemd[1]: Created slice kubepods-besteffort-pod0287aba9_1afe_4105_a46e_fdb0cfcf2b59.slice. Feb 9 06:45:01.495888 systemd[1]: Created slice kubepods-besteffort-pod4e359e0e_c2df_4dde_a4d4_97d73ce2a314.slice. Feb 9 06:45:01.497948 env[1476]: time="2024-02-09T06:45:01.497887188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zhwmq,Uid:4e359e0e-c2df-4dde-a4d4-97d73ce2a314,Namespace:calico-system,Attempt:0,}" Feb 9 06:45:01.594596 kubelet[2582]: I0209 06:45:01.594493 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/506ab73f-4273-4187-a8f5-4370e58fdf8c-config-volume\") pod \"coredns-5d78c9869d-h5km6\" (UID: \"506ab73f-4273-4187-a8f5-4370e58fdf8c\") " pod="kube-system/coredns-5d78c9869d-h5km6" Feb 9 06:45:01.594596 kubelet[2582]: I0209 06:45:01.594600 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k2cfm\" (UniqueName: \"kubernetes.io/projected/0287aba9-1afe-4105-a46e-fdb0cfcf2b59-kube-api-access-k2cfm\") pod \"calico-kube-controllers-df7db6857-58cff\" (UID: \"0287aba9-1afe-4105-a46e-fdb0cfcf2b59\") " pod="calico-system/calico-kube-controllers-df7db6857-58cff" Feb 9 06:45:01.595012 kubelet[2582]: I0209 06:45:01.594830 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ljpzx\" (UniqueName: \"kubernetes.io/projected/506ab73f-4273-4187-a8f5-4370e58fdf8c-kube-api-access-ljpzx\") pod \"coredns-5d78c9869d-h5km6\" (UID: \"506ab73f-4273-4187-a8f5-4370e58fdf8c\") " pod="kube-system/coredns-5d78c9869d-h5km6" Feb 9 06:45:01.595012 kubelet[2582]: I0209 06:45:01.594898 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac-config-volume\") pod \"coredns-5d78c9869d-gqwft\" (UID: \"a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac\") " pod="kube-system/coredns-5d78c9869d-gqwft" Feb 9 06:45:01.595286 kubelet[2582]: I0209 06:45:01.595030 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fvjd6\" (UniqueName: \"kubernetes.io/projected/a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac-kube-api-access-fvjd6\") pod \"coredns-5d78c9869d-gqwft\" (UID: \"a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac\") " pod="kube-system/coredns-5d78c9869d-gqwft" Feb 9 06:45:01.595286 kubelet[2582]: I0209 06:45:01.595221 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0287aba9-1afe-4105-a46e-fdb0cfcf2b59-tigera-ca-bundle\") pod \"calico-kube-controllers-df7db6857-58cff\" (UID: \"0287aba9-1afe-4105-a46e-fdb0cfcf2b59\") " pod="calico-system/calico-kube-controllers-df7db6857-58cff" Feb 9 06:45:01.779616 env[1476]: time="2024-02-09T06:45:01.779500693Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gqwft,Uid:a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac,Namespace:kube-system,Attempt:0,}" Feb 9 06:45:01.789880 env[1476]: time="2024-02-09T06:45:01.789743057Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-h5km6,Uid:506ab73f-4273-4187-a8f5-4370e58fdf8c,Namespace:kube-system,Attempt:0,}" Feb 9 06:45:01.795120 env[1476]: time="2024-02-09T06:45:01.794999597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-df7db6857-58cff,Uid:0287aba9-1afe-4105-a46e-fdb0cfcf2b59,Namespace:calico-system,Attempt:0,}" Feb 9 06:45:01.878692 env[1476]: time="2024-02-09T06:45:01.878556213Z" level=info msg="shim disconnected" id=da9cf3b6fc6591934fecce9b561fe238a5c18bc8c8f0888a2eaf508c0a98e208 Feb 9 06:45:01.878692 env[1476]: time="2024-02-09T06:45:01.878673610Z" level=warning msg="cleaning up after shim disconnected" id=da9cf3b6fc6591934fecce9b561fe238a5c18bc8c8f0888a2eaf508c0a98e208 namespace=k8s.io Feb 9 06:45:01.879062 env[1476]: time="2024-02-09T06:45:01.878704110Z" level=info msg="cleaning up dead shim" Feb 9 06:45:01.909468 env[1476]: time="2024-02-09T06:45:01.909372327Z" level=warning msg="cleanup warnings time=\"2024-02-09T06:45:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3465 runtime=io.containerd.runc.v2\n" Feb 9 06:45:01.946633 env[1476]: time="2024-02-09T06:45:01.946557367Z" level=error msg="Failed to destroy network for sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.946844 env[1476]: time="2024-02-09T06:45:01.946800262Z" level=error msg="encountered an error cleaning up failed sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.946844 env[1476]: time="2024-02-09T06:45:01.946834316Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zhwmq,Uid:4e359e0e-c2df-4dde-a4d4-97d73ce2a314,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.947157 kubelet[2582]: E0209 06:45:01.947101 2582 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.947240 kubelet[2582]: E0209 06:45:01.947184 2582 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zhwmq" Feb 9 06:45:01.947240 kubelet[2582]: E0209 06:45:01.947215 2582 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zhwmq" Feb 9 06:45:01.947337 kubelet[2582]: E0209 06:45:01.947274 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-zhwmq_calico-system(4e359e0e-c2df-4dde-a4d4-97d73ce2a314)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-zhwmq_calico-system(4e359e0e-c2df-4dde-a4d4-97d73ce2a314)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:45:01.951552 env[1476]: time="2024-02-09T06:45:01.951515460Z" level=error msg="Failed to destroy network for sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.951777 env[1476]: time="2024-02-09T06:45:01.951734558Z" level=error msg="encountered an error cleaning up failed sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.951777 env[1476]: time="2024-02-09T06:45:01.951768166Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gqwft,Uid:a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.951947 kubelet[2582]: E0209 06:45:01.951932 2582 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.951986 kubelet[2582]: E0209 06:45:01.951979 2582 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-gqwft" Feb 9 06:45:01.952009 kubelet[2582]: E0209 06:45:01.952005 2582 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-gqwft" Feb 9 06:45:01.952060 kubelet[2582]: E0209 06:45:01.952054 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-gqwft_kube-system(a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-gqwft_kube-system(a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-gqwft" podUID=a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac Feb 9 06:45:01.952961 env[1476]: time="2024-02-09T06:45:01.952921694Z" level=error msg="Failed to destroy network for sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.953014 env[1476]: time="2024-02-09T06:45:01.952956894Z" level=error msg="Failed to destroy network for sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.953139 env[1476]: time="2024-02-09T06:45:01.953093040Z" level=error msg="encountered an error cleaning up failed sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.953139 env[1476]: time="2024-02-09T06:45:01.953114641Z" level=error msg="encountered an error cleaning up failed sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.953139 env[1476]: time="2024-02-09T06:45:01.953119820Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-h5km6,Uid:506ab73f-4273-4187-a8f5-4370e58fdf8c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.953226 env[1476]: time="2024-02-09T06:45:01.953139277Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-df7db6857-58cff,Uid:0287aba9-1afe-4105-a46e-fdb0cfcf2b59,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.953270 kubelet[2582]: E0209 06:45:01.953212 2582 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.953270 kubelet[2582]: E0209 06:45:01.953224 2582 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:01.953270 kubelet[2582]: E0209 06:45:01.953234 2582 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-h5km6" Feb 9 06:45:01.953270 kubelet[2582]: E0209 06:45:01.953248 2582 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-h5km6" Feb 9 06:45:01.953363 kubelet[2582]: E0209 06:45:01.953272 2582 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-df7db6857-58cff" Feb 9 06:45:01.953363 kubelet[2582]: E0209 06:45:01.953277 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-h5km6_kube-system(506ab73f-4273-4187-a8f5-4370e58fdf8c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-h5km6_kube-system(506ab73f-4273-4187-a8f5-4370e58fdf8c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-h5km6" podUID=506ab73f-4273-4187-a8f5-4370e58fdf8c Feb 9 06:45:01.953363 kubelet[2582]: E0209 06:45:01.953293 2582 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-df7db6857-58cff" Feb 9 06:45:01.953448 kubelet[2582]: E0209 06:45:01.953329 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-df7db6857-58cff_calico-system(0287aba9-1afe-4105-a46e-fdb0cfcf2b59)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-df7db6857-58cff_calico-system(0287aba9-1afe-4105-a46e-fdb0cfcf2b59)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-df7db6857-58cff" podUID=0287aba9-1afe-4105-a46e-fdb0cfcf2b59 Feb 9 06:45:02.384639 sshd[3393]: Received disconnect from 195.87.80.171 port 31408:11: Bye Bye [preauth] Feb 9 06:45:02.384639 sshd[3393]: Disconnected from authenticating user root 195.87.80.171 port 31408 [preauth] Feb 9 06:45:02.387166 systemd[1]: sshd@10-86.109.11.101:22-195.87.80.171:31408.service: Deactivated successfully. Feb 9 06:45:02.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-86.109.11.101:22-195.87.80.171:31408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:45:02.415762 kernel: kauditd_printk_skb: 60 callbacks suppressed Feb 9 06:45:02.415803 kernel: audit: type=1131 audit(1707461102.386:1154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-86.109.11.101:22-195.87.80.171:31408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:45:02.656835 kubelet[2582]: I0209 06:45:02.656661 2582 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:45:02.658141 env[1476]: time="2024-02-09T06:45:02.658041642Z" level=info msg="StopPodSandbox for \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\"" Feb 9 06:45:02.663355 env[1476]: time="2024-02-09T06:45:02.663281622Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 06:45:02.663627 kubelet[2582]: I0209 06:45:02.663337 2582 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:45:02.664530 env[1476]: time="2024-02-09T06:45:02.664456571Z" level=info msg="StopPodSandbox for \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\"" Feb 9 06:45:02.665933 kubelet[2582]: I0209 06:45:02.665864 2582 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:45:02.667147 env[1476]: time="2024-02-09T06:45:02.667023874Z" level=info msg="StopPodSandbox for \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\"" Feb 9 06:45:02.668279 kubelet[2582]: I0209 06:45:02.668209 2582 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:45:02.669516 env[1476]: time="2024-02-09T06:45:02.669429507Z" level=info msg="StopPodSandbox for \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\"" Feb 9 06:45:02.680882 env[1476]: time="2024-02-09T06:45:02.680847162Z" level=error msg="StopPodSandbox for \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\" failed" error="failed to destroy network for sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:02.681047 kubelet[2582]: E0209 06:45:02.681036 2582 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:45:02.681122 kubelet[2582]: E0209 06:45:02.681074 2582 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8} Feb 9 06:45:02.681122 kubelet[2582]: E0209 06:45:02.681111 2582 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0287aba9-1afe-4105-a46e-fdb0cfcf2b59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 06:45:02.681192 kubelet[2582]: E0209 06:45:02.681128 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0287aba9-1afe-4105-a46e-fdb0cfcf2b59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-df7db6857-58cff" podUID=0287aba9-1afe-4105-a46e-fdb0cfcf2b59 Feb 9 06:45:02.681784 env[1476]: time="2024-02-09T06:45:02.681764219Z" level=error msg="StopPodSandbox for \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\" failed" error="failed to destroy network for sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:02.681852 env[1476]: time="2024-02-09T06:45:02.681834170Z" level=error msg="StopPodSandbox for \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\" failed" error="failed to destroy network for sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:02.681882 kubelet[2582]: E0209 06:45:02.681856 2582 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:45:02.681882 kubelet[2582]: E0209 06:45:02.681875 2582 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7} Feb 9 06:45:02.681925 kubelet[2582]: E0209 06:45:02.681896 2582 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4e359e0e-c2df-4dde-a4d4-97d73ce2a314\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 06:45:02.681925 kubelet[2582]: E0209 06:45:02.681905 2582 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:45:02.681925 kubelet[2582]: E0209 06:45:02.681910 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4e359e0e-c2df-4dde-a4d4-97d73ce2a314\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:45:02.681925 kubelet[2582]: E0209 06:45:02.681919 2582 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d} Feb 9 06:45:02.682034 kubelet[2582]: E0209 06:45:02.681937 2582 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"506ab73f-4273-4187-a8f5-4370e58fdf8c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 06:45:02.682034 kubelet[2582]: E0209 06:45:02.681952 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"506ab73f-4273-4187-a8f5-4370e58fdf8c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-h5km6" podUID=506ab73f-4273-4187-a8f5-4370e58fdf8c Feb 9 06:45:02.682104 env[1476]: time="2024-02-09T06:45:02.681991073Z" level=error msg="StopPodSandbox for \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\" failed" error="failed to destroy network for sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:02.682131 kubelet[2582]: E0209 06:45:02.682055 2582 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:45:02.682131 kubelet[2582]: E0209 06:45:02.682064 2582 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590} Feb 9 06:45:02.682131 kubelet[2582]: E0209 06:45:02.682079 2582 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 06:45:02.682131 kubelet[2582]: E0209 06:45:02.682098 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-gqwft" podUID=a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac Feb 9 06:45:02.717615 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d-shm.mount: Deactivated successfully. Feb 9 06:45:02.717687 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590-shm.mount: Deactivated successfully. Feb 9 06:45:02.717733 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8-shm.mount: Deactivated successfully. Feb 9 06:45:02.717774 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7-shm.mount: Deactivated successfully. Feb 9 06:45:12.211000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:12.211000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014260e0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:45:12.427741 kernel: audit: type=1400 audit(1707461112.211:1155): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:12.427785 kernel: audit: type=1300 audit(1707461112.211:1155): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014260e0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:45:12.427802 kernel: audit: type=1327 audit(1707461112.211:1155): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:45:12.211000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:45:12.522003 kernel: audit: type=1400 audit(1707461112.211:1156): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:12.211000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:12.613231 kernel: audit: type=1300 audit(1707461112.211:1156): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001426100 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:45:12.211000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001426100 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:45:12.736909 kernel: audit: type=1327 audit(1707461112.211:1156): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:45:12.211000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:45:12.832554 kernel: audit: type=1400 audit(1707461112.212:1157): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:12.212000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:12.924170 kernel: audit: type=1300 audit(1707461112.212:1157): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001426120 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:45:12.212000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001426120 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:45:13.046736 kernel: audit: type=1327 audit(1707461112.212:1157): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:45:12.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:45:13.141423 kernel: audit: type=1400 audit(1707461112.212:1158): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:12.212000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:12.212000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0014c5d80 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:45:12.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:45:13.482876 env[1476]: time="2024-02-09T06:45:13.482838701Z" level=info msg="StopPodSandbox for \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\"" Feb 9 06:45:13.483243 env[1476]: time="2024-02-09T06:45:13.482843656Z" level=info msg="StopPodSandbox for \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\"" Feb 9 06:45:13.500590 env[1476]: time="2024-02-09T06:45:13.500549247Z" level=error msg="StopPodSandbox for \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\" failed" error="failed to destroy network for sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:13.500757 env[1476]: time="2024-02-09T06:45:13.500712799Z" level=error msg="StopPodSandbox for \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\" failed" error="failed to destroy network for sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:13.500833 kubelet[2582]: E0209 06:45:13.500822 2582 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:45:13.501006 kubelet[2582]: E0209 06:45:13.500832 2582 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:45:13.501006 kubelet[2582]: E0209 06:45:13.500863 2582 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8} Feb 9 06:45:13.501006 kubelet[2582]: E0209 06:45:13.500863 2582 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d} Feb 9 06:45:13.501006 kubelet[2582]: E0209 06:45:13.500884 2582 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0287aba9-1afe-4105-a46e-fdb0cfcf2b59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 06:45:13.501006 kubelet[2582]: E0209 06:45:13.500884 2582 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"506ab73f-4273-4187-a8f5-4370e58fdf8c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 06:45:13.501211 kubelet[2582]: E0209 06:45:13.500901 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"506ab73f-4273-4187-a8f5-4370e58fdf8c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-h5km6" podUID=506ab73f-4273-4187-a8f5-4370e58fdf8c Feb 9 06:45:13.501211 kubelet[2582]: E0209 06:45:13.500901 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0287aba9-1afe-4105-a46e-fdb0cfcf2b59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-df7db6857-58cff" podUID=0287aba9-1afe-4105-a46e-fdb0cfcf2b59 Feb 9 06:45:17.482548 env[1476]: time="2024-02-09T06:45:17.482476047Z" level=info msg="StopPodSandbox for \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\"" Feb 9 06:45:17.495563 env[1476]: time="2024-02-09T06:45:17.495506884Z" level=error msg="StopPodSandbox for \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\" failed" error="failed to destroy network for sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:17.495787 kubelet[2582]: E0209 06:45:17.495748 2582 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:45:17.495787 kubelet[2582]: E0209 06:45:17.495773 2582 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7} Feb 9 06:45:17.495953 kubelet[2582]: E0209 06:45:17.495795 2582 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4e359e0e-c2df-4dde-a4d4-97d73ce2a314\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 06:45:17.495953 kubelet[2582]: E0209 06:45:17.495814 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4e359e0e-c2df-4dde-a4d4-97d73ce2a314\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zhwmq" podUID=4e359e0e-c2df-4dde-a4d4-97d73ce2a314 Feb 9 06:45:18.483012 env[1476]: time="2024-02-09T06:45:18.482961470Z" level=info msg="StopPodSandbox for \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\"" Feb 9 06:45:18.496392 env[1476]: time="2024-02-09T06:45:18.496325167Z" level=error msg="StopPodSandbox for \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\" failed" error="failed to destroy network for sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:45:18.496532 kubelet[2582]: E0209 06:45:18.496519 2582 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:45:18.496734 kubelet[2582]: E0209 06:45:18.496549 2582 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590} Feb 9 06:45:18.496734 kubelet[2582]: E0209 06:45:18.496582 2582 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 06:45:18.496734 kubelet[2582]: E0209 06:45:18.496607 2582 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-gqwft" podUID=a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac Feb 9 06:45:19.616711 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1707055293.mount: Deactivated successfully. Feb 9 06:45:19.639559 env[1476]: time="2024-02-09T06:45:19.639507790Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:19.640081 env[1476]: time="2024-02-09T06:45:19.640048802Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:19.640749 env[1476]: time="2024-02-09T06:45:19.640703793Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:19.641806 env[1476]: time="2024-02-09T06:45:19.641767513Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:19.642001 env[1476]: time="2024-02-09T06:45:19.641950989Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 06:45:19.646011 env[1476]: time="2024-02-09T06:45:19.645988945Z" level=info msg="CreateContainer within sandbox \"259a75ac434172c9abc5e93aae3e61e5eecb588363e2406cbfa28f7c91574466\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 06:45:19.651691 env[1476]: time="2024-02-09T06:45:19.651637648Z" level=info msg="CreateContainer within sandbox \"259a75ac434172c9abc5e93aae3e61e5eecb588363e2406cbfa28f7c91574466\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"070daa4496552d84f6e2c8af9fa93bacc47eb60d77ac916e1de36256e85eff36\"" Feb 9 06:45:19.651881 env[1476]: time="2024-02-09T06:45:19.651866933Z" level=info msg="StartContainer for \"070daa4496552d84f6e2c8af9fa93bacc47eb60d77ac916e1de36256e85eff36\"" Feb 9 06:45:19.679286 systemd[1]: Started cri-containerd-070daa4496552d84f6e2c8af9fa93bacc47eb60d77ac916e1de36256e85eff36.scope. Feb 9 06:45:19.695000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.723599 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 06:45:19.723646 kernel: audit: type=1400 audit(1707461119.695:1159): avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.695000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3101 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:19.788161 kernel: audit: type=1300 audit(1707461119.695:1159): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3101 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:19.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037306461613434393635353264383466366532633861663966613933 Feb 9 06:45:19.977421 kernel: audit: type=1327 audit(1707461119.695:1159): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037306461613434393635353264383466366532633861663966613933 Feb 9 06:45:19.977459 kernel: audit: type=1400 audit(1707461119.695:1160): avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.695000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.041038 kernel: audit: type=1400 audit(1707461119.695:1160): avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.695000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.104801 kernel: audit: type=1400 audit(1707461119.695:1160): avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.695000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.168560 kernel: audit: type=1400 audit(1707461119.695:1160): avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.695000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.695000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.296925 kernel: audit: type=1400 audit(1707461119.695:1160): avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.296983 kernel: audit: type=1400 audit(1707461119.695:1160): avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.695000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.361136 kernel: audit: type=1400 audit(1707461119.695:1160): avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.695000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.364430 env[1476]: time="2024-02-09T06:45:20.364407902Z" level=info msg="StartContainer for \"070daa4496552d84f6e2c8af9fa93bacc47eb60d77ac916e1de36256e85eff36\" returns successfully" Feb 9 06:45:19.695000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.695000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.695000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.695000 audit: BPF prog-id=142 op=LOAD Feb 9 06:45:19.695000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001fc350 items=0 ppid=3101 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:19.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037306461613434393635353264383466366532633861663966613933 Feb 9 06:45:19.882000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.882000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.882000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.882000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.882000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.882000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.882000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.882000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.882000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:19.882000 audit: BPF prog-id=143 op=LOAD Feb 9 06:45:19.882000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001fc398 items=0 ppid=3101 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:19.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037306461613434393635353264383466366532633861663966613933 Feb 9 06:45:20.039000 audit: BPF prog-id=143 op=UNLOAD Feb 9 06:45:20.039000 audit: BPF prog-id=142 op=UNLOAD Feb 9 06:45:20.039000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.039000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.039000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.039000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.039000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.039000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.039000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.039000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.039000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.039000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:20.039000 audit: BPF prog-id=144 op=LOAD Feb 9 06:45:20.039000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001fc428 items=0 ppid=3101 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:20.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037306461613434393635353264383466366532633861663966613933 Feb 9 06:45:20.537058 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 06:45:20.537099 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 06:45:20.746944 kubelet[2582]: I0209 06:45:20.746918 2582 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-bnjjw" podStartSLOduration=2.304717004 podCreationTimestamp="2024-02-09 06:44:21 +0000 UTC" firstStartedPulling="2024-02-09 06:44:22.199971409 +0000 UTC m=+18.768562336" lastFinishedPulling="2024-02-09 06:45:19.64213689 +0000 UTC m=+76.210727819" observedRunningTime="2024-02-09 06:45:20.74631909 +0000 UTC m=+77.314910032" watchObservedRunningTime="2024-02-09 06:45:20.746882487 +0000 UTC m=+77.315473423" Feb 9 06:45:21.762000 audit[4095]: AVC avc: denied { write } for pid=4095 comm="tee" name="fd" dev="proc" ino=42178 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:45:21.762000 audit[4095]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff36f9996a a2=241 a3=1b6 items=1 ppid=4066 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.762000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 06:45:21.762000 audit: PATH item=0 name="/dev/fd/63" inode=41335 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:45:21.762000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:45:21.763000 audit[4098]: AVC avc: denied { write } for pid=4098 comm="tee" name="fd" dev="proc" ino=35173 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:45:21.763000 audit[4098]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0533197a a2=241 a3=1b6 items=1 ppid=4062 pid=4098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.763000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 06:45:21.763000 audit: PATH item=0 name="/dev/fd/63" inode=45156 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:45:21.763000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:45:21.764000 audit[4101]: AVC avc: denied { write } for pid=4101 comm="tee" name="fd" dev="proc" ino=45160 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:45:21.764000 audit[4101]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2eee1969 a2=241 a3=1b6 items=1 ppid=4069 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.764000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 06:45:21.764000 audit: PATH item=0 name="/dev/fd/63" inode=45157 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:45:21.764000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:45:21.764000 audit[4135]: AVC avc: denied { write } for pid=4135 comm="tee" name="fd" dev="proc" ino=38261 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:45:21.764000 audit[4135]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0159f979 a2=241 a3=1b6 items=1 ppid=4070 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.764000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 06:45:21.764000 audit: PATH item=0 name="/dev/fd/63" inode=40256 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:45:21.764000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:45:21.765000 audit[4139]: AVC avc: denied { write } for pid=4139 comm="tee" name="fd" dev="proc" ino=45164 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:45:21.765000 audit[4139]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec97e497b a2=241 a3=1b6 items=1 ppid=4067 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.765000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 06:45:21.765000 audit: PATH item=0 name="/dev/fd/63" inode=41336 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:45:21.765000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:45:21.765000 audit[4142]: AVC avc: denied { write } for pid=4142 comm="tee" name="fd" dev="proc" ino=37207 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:45:21.765000 audit[4142]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeba43f979 a2=241 a3=1b6 items=1 ppid=4065 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.765000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 06:45:21.765000 audit: PATH item=0 name="/dev/fd/63" inode=40259 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:45:21.765000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:45:21.770000 audit[4124]: AVC avc: denied { write } for pid=4124 comm="tee" name="fd" dev="proc" ino=34334 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:45:21.770000 audit[4124]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd8d680979 a2=241 a3=1b6 items=1 ppid=4063 pid=4124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.770000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 06:45:21.770000 audit: PATH item=0 name="/dev/fd/63" inode=40255 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:45:21.770000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit: BPF prog-id=145 op=LOAD Feb 9 06:45:21.850000 audit[4256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe68c5e40 a2=70 a3=7facc1b10000 items=0 ppid=4073 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:45:21.850000 audit: BPF prog-id=145 op=UNLOAD Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit: BPF prog-id=146 op=LOAD Feb 9 06:45:21.850000 audit[4256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe68c5e40 a2=70 a3=6e items=0 ppid=4073 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:45:21.850000 audit: BPF prog-id=146 op=UNLOAD Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffe68c5df0 a2=70 a3=7fffe68c5e40 items=0 ppid=4073 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit: BPF prog-id=147 op=LOAD Feb 9 06:45:21.850000 audit[4256]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fffe68c5dd0 a2=70 a3=7fffe68c5e40 items=0 ppid=4073 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:45:21.850000 audit: BPF prog-id=147 op=UNLOAD Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe68c5eb0 a2=70 a3=0 items=0 ppid=4073 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe68c5ea0 a2=70 a3=0 items=0 ppid=4073 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:45:21.850000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.850000 audit[4256]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fffe68c5ee0 a2=70 a3=0 items=0 ppid=4073 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.850000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:45:21.851000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.851000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.851000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.851000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.851000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.851000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.851000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.851000 audit[4256]: AVC avc: denied { perfmon } for pid=4256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.851000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.851000 audit[4256]: AVC avc: denied { bpf } for pid=4256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.851000 audit: BPF prog-id=148 op=LOAD Feb 9 06:45:21.851000 audit[4256]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fffe68c5e00 a2=70 a3=ffffffff items=0 ppid=4073 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.851000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:45:21.852000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.852000 audit[4260]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbf8e9450 a2=70 a3=fff80800 items=0 ppid=4073 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.852000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 06:45:21.852000 audit[4260]: AVC avc: denied { bpf } for pid=4260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:21.852000 audit[4260]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbf8e9320 a2=70 a3=3 items=0 ppid=4073 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.852000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 06:45:21.873000 audit: BPF prog-id=148 op=UNLOAD Feb 9 06:45:21.893000 audit[4315]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=4315 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:45:21.893000 audit[4315]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffee6226d60 a2=0 a3=7ffee6226d4c items=0 ppid=4073 pid=4315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.893000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:45:21.895000 audit[4314]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=4314 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:45:21.895000 audit[4314]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffd72ecb8c0 a2=0 a3=555a3afd8000 items=0 ppid=4073 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.895000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:45:21.896000 audit[4317]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=4317 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:45:21.896000 audit[4317]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff4ee0d780 a2=0 a3=55b67c5fe000 items=0 ppid=4073 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.896000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:45:21.897000 audit[4318]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4318 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:45:21.897000 audit[4318]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fff399b19a0 a2=0 a3=563c139bd000 items=0 ppid=4073 pid=4318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:21.897000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:45:22.844031 systemd-networkd[1305]: vxlan.calico: Link UP Feb 9 06:45:22.844043 systemd-networkd[1305]: vxlan.calico: Gained carrier Feb 9 06:45:24.642388 systemd-networkd[1305]: vxlan.calico: Gained IPv6LL Feb 9 06:45:27.484345 env[1476]: time="2024-02-09T06:45:27.484243872Z" level=info msg="StopPodSandbox for \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\"" Feb 9 06:45:27.588257 env[1476]: 2024-02-09 06:45:27.555 [INFO][4353] k8s.go 578: Cleaning up netns ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:45:27.588257 env[1476]: 2024-02-09 06:45:27.556 [INFO][4353] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" iface="eth0" netns="/var/run/netns/cni-0d0f9ef8-5010-2028-b1c8-c7cd54ee8c2d" Feb 9 06:45:27.588257 env[1476]: 2024-02-09 06:45:27.556 [INFO][4353] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" iface="eth0" netns="/var/run/netns/cni-0d0f9ef8-5010-2028-b1c8-c7cd54ee8c2d" Feb 9 06:45:27.588257 env[1476]: 2024-02-09 06:45:27.556 [INFO][4353] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" iface="eth0" netns="/var/run/netns/cni-0d0f9ef8-5010-2028-b1c8-c7cd54ee8c2d" Feb 9 06:45:27.588257 env[1476]: 2024-02-09 06:45:27.556 [INFO][4353] k8s.go 585: Releasing IP address(es) ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:45:27.588257 env[1476]: 2024-02-09 06:45:27.556 [INFO][4353] utils.go 188: Calico CNI releasing IP address ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:45:27.588257 env[1476]: 2024-02-09 06:45:27.575 [INFO][4371] ipam_plugin.go 415: Releasing address using handleID ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" HandleID="k8s-pod-network.022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:45:27.588257 env[1476]: 2024-02-09 06:45:27.575 [INFO][4371] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:45:27.588257 env[1476]: 2024-02-09 06:45:27.575 [INFO][4371] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:45:27.588257 env[1476]: 2024-02-09 06:45:27.583 [WARNING][4371] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" HandleID="k8s-pod-network.022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:45:27.588257 env[1476]: 2024-02-09 06:45:27.583 [INFO][4371] ipam_plugin.go 443: Releasing address using workloadID ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" HandleID="k8s-pod-network.022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:45:27.588257 env[1476]: 2024-02-09 06:45:27.585 [INFO][4371] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:45:27.588257 env[1476]: 2024-02-09 06:45:27.587 [INFO][4353] k8s.go 591: Teardown processing complete. ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:45:27.588946 env[1476]: time="2024-02-09T06:45:27.588385232Z" level=info msg="TearDown network for sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\" successfully" Feb 9 06:45:27.588946 env[1476]: time="2024-02-09T06:45:27.588420933Z" level=info msg="StopPodSandbox for \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\" returns successfully" Feb 9 06:45:27.589046 env[1476]: time="2024-02-09T06:45:27.589008675Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-df7db6857-58cff,Uid:0287aba9-1afe-4105-a46e-fdb0cfcf2b59,Namespace:calico-system,Attempt:1,}" Feb 9 06:45:27.591056 systemd[1]: run-netns-cni\x2d0d0f9ef8\x2d5010\x2d2028\x2db1c8\x2dc7cd54ee8c2d.mount: Deactivated successfully. Feb 9 06:45:27.693625 systemd-networkd[1305]: calicd81e29767d: Link UP Feb 9 06:45:27.750728 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 06:45:27.750776 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicd81e29767d: link becomes ready Feb 9 06:45:27.750838 systemd-networkd[1305]: calicd81e29767d: Gained carrier Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.625 [INFO][4390] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0 calico-kube-controllers-df7db6857- calico-system 0287aba9-1afe-4105-a46e-fdb0cfcf2b59 793 0 2024-02-09 06:44:21 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:df7db6857 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-4a81ef77ce calico-kube-controllers-df7db6857-58cff eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calicd81e29767d [] []}} ContainerID="9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" Namespace="calico-system" Pod="calico-kube-controllers-df7db6857-58cff" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-" Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.625 [INFO][4390] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" Namespace="calico-system" Pod="calico-kube-controllers-df7db6857-58cff" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.650 [INFO][4413] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" HandleID="k8s-pod-network.9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.662 [INFO][4413] ipam_plugin.go 268: Auto assigning IP ContainerID="9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" HandleID="k8s-pod-network.9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000137290), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-4a81ef77ce", "pod":"calico-kube-controllers-df7db6857-58cff", "timestamp":"2024-02-09 06:45:27.650960045 +0000 UTC"}, Hostname:"ci-3510.3.2-a-4a81ef77ce", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.662 [INFO][4413] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.662 [INFO][4413] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.662 [INFO][4413] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-4a81ef77ce' Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.665 [INFO][4413] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.669 [INFO][4413] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.673 [INFO][4413] ipam.go 489: Trying affinity for 192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.675 [INFO][4413] ipam.go 155: Attempting to load block cidr=192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.677 [INFO][4413] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.677 [INFO][4413] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.19.64/26 handle="k8s-pod-network.9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.679 [INFO][4413] ipam.go 1682: Creating new handle: k8s-pod-network.9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939 Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.682 [INFO][4413] ipam.go 1203: Writing block in order to claim IPs block=192.168.19.64/26 handle="k8s-pod-network.9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.687 [INFO][4413] ipam.go 1216: Successfully claimed IPs: [192.168.19.65/26] block=192.168.19.64/26 handle="k8s-pod-network.9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.688 [INFO][4413] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.19.65/26] handle="k8s-pod-network.9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.688 [INFO][4413] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:45:27.756189 env[1476]: 2024-02-09 06:45:27.688 [INFO][4413] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.19.65/26] IPv6=[] ContainerID="9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" HandleID="k8s-pod-network.9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:45:27.756656 env[1476]: 2024-02-09 06:45:27.691 [INFO][4390] k8s.go 385: Populated endpoint ContainerID="9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" Namespace="calico-system" Pod="calico-kube-controllers-df7db6857-58cff" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0", GenerateName:"calico-kube-controllers-df7db6857-", Namespace:"calico-system", SelfLink:"", UID:"0287aba9-1afe-4105-a46e-fdb0cfcf2b59", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"df7db6857", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"", Pod:"calico-kube-controllers-df7db6857-58cff", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.19.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicd81e29767d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:45:27.756656 env[1476]: 2024-02-09 06:45:27.692 [INFO][4390] k8s.go 386: Calico CNI using IPs: [192.168.19.65/32] ContainerID="9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" Namespace="calico-system" Pod="calico-kube-controllers-df7db6857-58cff" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:45:27.756656 env[1476]: 2024-02-09 06:45:27.692 [INFO][4390] dataplane_linux.go 68: Setting the host side veth name to calicd81e29767d ContainerID="9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" Namespace="calico-system" Pod="calico-kube-controllers-df7db6857-58cff" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:45:27.756656 env[1476]: 2024-02-09 06:45:27.750 [INFO][4390] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" Namespace="calico-system" Pod="calico-kube-controllers-df7db6857-58cff" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:45:27.756656 env[1476]: 2024-02-09 06:45:27.751 [INFO][4390] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" Namespace="calico-system" Pod="calico-kube-controllers-df7db6857-58cff" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0", GenerateName:"calico-kube-controllers-df7db6857-", Namespace:"calico-system", SelfLink:"", UID:"0287aba9-1afe-4105-a46e-fdb0cfcf2b59", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"df7db6857", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939", Pod:"calico-kube-controllers-df7db6857-58cff", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.19.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicd81e29767d", MAC:"42:aa:65:f7:92:8a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:45:27.756656 env[1476]: 2024-02-09 06:45:27.755 [INFO][4390] k8s.go 491: Wrote updated endpoint to datastore ContainerID="9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939" Namespace="calico-system" Pod="calico-kube-controllers-df7db6857-58cff" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:45:27.760000 audit[4450]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=4450 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:45:27.771165 env[1476]: time="2024-02-09T06:45:27.771102829Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:45:27.771165 env[1476]: time="2024-02-09T06:45:27.771125532Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:45:27.771165 env[1476]: time="2024-02-09T06:45:27.771132600Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:45:27.771273 env[1476]: time="2024-02-09T06:45:27.771234239Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939 pid=4458 runtime=io.containerd.runc.v2 Feb 9 06:45:27.788247 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 9 06:45:27.788294 kernel: audit: type=1325 audit(1707461127.760:1190): table=filter:101 family=2 entries=36 op=nft_register_chain pid=4450 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:45:27.792235 systemd[1]: Started cri-containerd-9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939.scope. Feb 9 06:45:27.760000 audit[4450]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc6cf14000 a2=0 a3=7ffc6cf13fec items=0 ppid=4073 pid=4450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:27.941736 kernel: audit: type=1300 audit(1707461127.760:1190): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc6cf14000 a2=0 a3=7ffc6cf13fec items=0 ppid=4073 pid=4450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:27.941790 kernel: audit: type=1327 audit(1707461127.760:1190): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:45:27.760000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:45:28.002417 kernel: audit: type=1400 audit(1707461127.852:1191): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:27.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.064641 kernel: audit: type=1400 audit(1707461127.852:1192): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:27.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.126862 kernel: audit: type=1400 audit(1707461127.852:1193): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:27.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.189075 kernel: audit: type=1400 audit(1707461127.852:1194): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:27.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:27.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.314488 kernel: audit: type=1400 audit(1707461127.852:1195): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.314521 kernel: audit: type=1400 audit(1707461127.852:1196): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:27.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.377168 kernel: audit: type=1400 audit(1707461127.852:1197): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:27.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:27.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:27.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit: BPF prog-id=149 op=LOAD Feb 9 06:45:28.063000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4458 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353063663433333635326232643363383838366631356330643438 Feb 9 06:45:28.063000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4458 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353063663433333635326232643363383838366631356330643438 Feb 9 06:45:28.063000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.063000 audit: BPF prog-id=150 op=LOAD Feb 9 06:45:28.063000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000296870 items=0 ppid=4458 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353063663433333635326232643363383838366631356330643438 Feb 9 06:45:28.250000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.250000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.250000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.250000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.250000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.250000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.250000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.250000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.250000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.250000 audit: BPF prog-id=151 op=LOAD Feb 9 06:45:28.250000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002968b8 items=0 ppid=4458 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353063663433333635326232643363383838366631356330643438 Feb 9 06:45:28.376000 audit: BPF prog-id=151 op=UNLOAD Feb 9 06:45:28.376000 audit: BPF prog-id=150 op=UNLOAD Feb 9 06:45:28.376000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.376000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.376000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.376000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.376000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.376000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.376000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.376000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.376000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.376000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.376000 audit: BPF prog-id=152 op=LOAD Feb 9 06:45:28.376000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000296cc8 items=0 ppid=4458 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353063663433333635326232643363383838366631356330643438 Feb 9 06:45:28.456991 env[1476]: time="2024-02-09T06:45:28.456964103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-df7db6857-58cff,Uid:0287aba9-1afe-4105-a46e-fdb0cfcf2b59,Namespace:calico-system,Attempt:1,} returns sandbox id \"9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939\"" Feb 9 06:45:28.457720 env[1476]: time="2024-02-09T06:45:28.457681026Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 06:45:28.482677 env[1476]: time="2024-02-09T06:45:28.482630873Z" level=info msg="StopPodSandbox for \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\"" Feb 9 06:45:28.528451 env[1476]: 2024-02-09 06:45:28.509 [INFO][4507] k8s.go 578: Cleaning up netns ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:45:28.528451 env[1476]: 2024-02-09 06:45:28.509 [INFO][4507] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" iface="eth0" netns="/var/run/netns/cni-55262883-8927-61b9-d894-76cc15b7e8bd" Feb 9 06:45:28.528451 env[1476]: 2024-02-09 06:45:28.509 [INFO][4507] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" iface="eth0" netns="/var/run/netns/cni-55262883-8927-61b9-d894-76cc15b7e8bd" Feb 9 06:45:28.528451 env[1476]: 2024-02-09 06:45:28.510 [INFO][4507] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" iface="eth0" netns="/var/run/netns/cni-55262883-8927-61b9-d894-76cc15b7e8bd" Feb 9 06:45:28.528451 env[1476]: 2024-02-09 06:45:28.510 [INFO][4507] k8s.go 585: Releasing IP address(es) ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:45:28.528451 env[1476]: 2024-02-09 06:45:28.510 [INFO][4507] utils.go 188: Calico CNI releasing IP address ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:45:28.528451 env[1476]: 2024-02-09 06:45:28.521 [INFO][4525] ipam_plugin.go 415: Releasing address using handleID ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" HandleID="k8s-pod-network.b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:45:28.528451 env[1476]: 2024-02-09 06:45:28.522 [INFO][4525] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:45:28.528451 env[1476]: 2024-02-09 06:45:28.522 [INFO][4525] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:45:28.528451 env[1476]: 2024-02-09 06:45:28.526 [WARNING][4525] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" HandleID="k8s-pod-network.b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:45:28.528451 env[1476]: 2024-02-09 06:45:28.526 [INFO][4525] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" HandleID="k8s-pod-network.b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:45:28.528451 env[1476]: 2024-02-09 06:45:28.527 [INFO][4525] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:45:28.528451 env[1476]: 2024-02-09 06:45:28.527 [INFO][4507] k8s.go 591: Teardown processing complete. ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:45:28.528971 env[1476]: time="2024-02-09T06:45:28.528502255Z" level=info msg="TearDown network for sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\" successfully" Feb 9 06:45:28.528971 env[1476]: time="2024-02-09T06:45:28.528521867Z" level=info msg="StopPodSandbox for \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\" returns successfully" Feb 9 06:45:28.528971 env[1476]: time="2024-02-09T06:45:28.528815556Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-h5km6,Uid:506ab73f-4273-4187-a8f5-4370e58fdf8c,Namespace:kube-system,Attempt:1,}" Feb 9 06:45:28.594259 systemd[1]: run-netns-cni\x2d55262883\x2d8927\x2d61b9\x2dd894\x2d76cc15b7e8bd.mount: Deactivated successfully. Feb 9 06:45:28.649714 systemd-networkd[1305]: cali2f0cd32a1f5: Link UP Feb 9 06:45:28.685695 systemd-networkd[1305]: cali2f0cd32a1f5: Gained carrier Feb 9 06:45:28.686101 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2f0cd32a1f5: link becomes ready Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.565 [INFO][4539] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0 coredns-5d78c9869d- kube-system 506ab73f-4273-4187-a8f5-4370e58fdf8c 801 0 2024-02-09 06:44:16 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-4a81ef77ce coredns-5d78c9869d-h5km6 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2f0cd32a1f5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" Namespace="kube-system" Pod="coredns-5d78c9869d-h5km6" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-" Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.565 [INFO][4539] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" Namespace="kube-system" Pod="coredns-5d78c9869d-h5km6" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.597 [INFO][4561] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" HandleID="k8s-pod-network.32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.611 [INFO][4561] ipam_plugin.go 268: Auto assigning IP ContainerID="32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" HandleID="k8s-pod-network.32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051900), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-4a81ef77ce", "pod":"coredns-5d78c9869d-h5km6", "timestamp":"2024-02-09 06:45:28.597565947 +0000 UTC"}, Hostname:"ci-3510.3.2-a-4a81ef77ce", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.611 [INFO][4561] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.611 [INFO][4561] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.611 [INFO][4561] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-4a81ef77ce' Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.615 [INFO][4561] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.620 [INFO][4561] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.625 [INFO][4561] ipam.go 489: Trying affinity for 192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.628 [INFO][4561] ipam.go 155: Attempting to load block cidr=192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.631 [INFO][4561] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.631 [INFO][4561] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.19.64/26 handle="k8s-pod-network.32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.633 [INFO][4561] ipam.go 1682: Creating new handle: k8s-pod-network.32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76 Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.637 [INFO][4561] ipam.go 1203: Writing block in order to claim IPs block=192.168.19.64/26 handle="k8s-pod-network.32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.644 [INFO][4561] ipam.go 1216: Successfully claimed IPs: [192.168.19.66/26] block=192.168.19.64/26 handle="k8s-pod-network.32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.644 [INFO][4561] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.19.66/26] handle="k8s-pod-network.32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.644 [INFO][4561] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:45:28.693675 env[1476]: 2024-02-09 06:45:28.644 [INFO][4561] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.19.66/26] IPv6=[] ContainerID="32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" HandleID="k8s-pod-network.32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:45:28.694723 env[1476]: 2024-02-09 06:45:28.647 [INFO][4539] k8s.go 385: Populated endpoint ContainerID="32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" Namespace="kube-system" Pod="coredns-5d78c9869d-h5km6" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"506ab73f-4273-4187-a8f5-4370e58fdf8c", ResourceVersion:"801", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"", Pod:"coredns-5d78c9869d-h5km6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.19.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2f0cd32a1f5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:45:28.694723 env[1476]: 2024-02-09 06:45:28.647 [INFO][4539] k8s.go 386: Calico CNI using IPs: [192.168.19.66/32] ContainerID="32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" Namespace="kube-system" Pod="coredns-5d78c9869d-h5km6" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:45:28.694723 env[1476]: 2024-02-09 06:45:28.647 [INFO][4539] dataplane_linux.go 68: Setting the host side veth name to cali2f0cd32a1f5 ContainerID="32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" Namespace="kube-system" Pod="coredns-5d78c9869d-h5km6" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:45:28.694723 env[1476]: 2024-02-09 06:45:28.685 [INFO][4539] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" Namespace="kube-system" Pod="coredns-5d78c9869d-h5km6" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:45:28.694723 env[1476]: 2024-02-09 06:45:28.685 [INFO][4539] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" Namespace="kube-system" Pod="coredns-5d78c9869d-h5km6" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"506ab73f-4273-4187-a8f5-4370e58fdf8c", ResourceVersion:"801", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76", Pod:"coredns-5d78c9869d-h5km6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.19.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2f0cd32a1f5", MAC:"52:02:59:a1:71:f1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:45:28.694723 env[1476]: 2024-02-09 06:45:28.692 [INFO][4539] k8s.go 491: Wrote updated endpoint to datastore ContainerID="32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76" Namespace="kube-system" Pod="coredns-5d78c9869d-h5km6" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:45:28.702135 env[1476]: time="2024-02-09T06:45:28.702066127Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:45:28.702135 env[1476]: time="2024-02-09T06:45:28.702107714Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:45:28.702135 env[1476]: time="2024-02-09T06:45:28.702119761Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:45:28.702363 env[1476]: time="2024-02-09T06:45:28.702218304Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76 pid=4604 runtime=io.containerd.runc.v2 Feb 9 06:45:28.703000 audit[4613]: NETFILTER_CFG table=filter:102 family=2 entries=40 op=nft_register_chain pid=4613 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:45:28.703000 audit[4613]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffd7eccc630 a2=0 a3=7ffd7eccc61c items=0 ppid=4073 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.703000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:45:28.724579 systemd[1]: Started cri-containerd-32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76.scope. Feb 9 06:45:28.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit: BPF prog-id=153 op=LOAD Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=4604 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656337353232316132353766643433633535636238373636643337 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=4604 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656337353232316132353766643433633535636238373636643337 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit: BPF prog-id=154 op=LOAD Feb 9 06:45:28.730000 audit[4614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c0003eaab0 items=0 ppid=4604 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656337353232316132353766643433633535636238373636643337 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit: BPF prog-id=155 op=LOAD Feb 9 06:45:28.730000 audit[4614]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c0003eaaf8 items=0 ppid=4604 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656337353232316132353766643433633535636238373636643337 Feb 9 06:45:28.730000 audit: BPF prog-id=155 op=UNLOAD Feb 9 06:45:28.730000 audit: BPF prog-id=154 op=UNLOAD Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.730000 audit: BPF prog-id=156 op=LOAD Feb 9 06:45:28.730000 audit[4614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c0003eaf08 items=0 ppid=4604 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656337353232316132353766643433633535636238373636643337 Feb 9 06:45:28.769369 env[1476]: time="2024-02-09T06:45:28.769309181Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-h5km6,Uid:506ab73f-4273-4187-a8f5-4370e58fdf8c,Namespace:kube-system,Attempt:1,} returns sandbox id \"32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76\"" Feb 9 06:45:28.770824 env[1476]: time="2024-02-09T06:45:28.770785620Z" level=info msg="CreateContainer within sandbox \"32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 06:45:28.776155 env[1476]: time="2024-02-09T06:45:28.776106346Z" level=info msg="CreateContainer within sandbox \"32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a2ec7eaf1afa75931847b5c626b99a6ceda3788dc7d4251e733b85fd320feb4d\"" Feb 9 06:45:28.776457 env[1476]: time="2024-02-09T06:45:28.776403729Z" level=info msg="StartContainer for \"a2ec7eaf1afa75931847b5c626b99a6ceda3788dc7d4251e733b85fd320feb4d\"" Feb 9 06:45:28.799888 systemd[1]: Started cri-containerd-a2ec7eaf1afa75931847b5c626b99a6ceda3788dc7d4251e733b85fd320feb4d.scope. Feb 9 06:45:28.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit: BPF prog-id=157 op=LOAD Feb 9 06:45:28.809000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4604 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132656337656166316166613735393331383437623563363236623939 Feb 9 06:45:28.809000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4604 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132656337656166316166613735393331383437623563363236623939 Feb 9 06:45:28.809000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.809000 audit: BPF prog-id=158 op=LOAD Feb 9 06:45:28.809000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024dc0 items=0 ppid=4604 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132656337656166316166613735393331383437623563363236623939 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit: BPF prog-id=159 op=LOAD Feb 9 06:45:28.810000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024e08 items=0 ppid=4604 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132656337656166316166613735393331383437623563363236623939 Feb 9 06:45:28.810000 audit: BPF prog-id=159 op=UNLOAD Feb 9 06:45:28.810000 audit: BPF prog-id=158 op=UNLOAD Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:28.810000 audit: BPF prog-id=160 op=LOAD Feb 9 06:45:28.810000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025218 items=0 ppid=4604 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:28.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132656337656166316166613735393331383437623563363236623939 Feb 9 06:45:28.824165 env[1476]: time="2024-02-09T06:45:28.824115198Z" level=info msg="StartContainer for \"a2ec7eaf1afa75931847b5c626b99a6ceda3788dc7d4251e733b85fd320feb4d\" returns successfully" Feb 9 06:45:29.377446 systemd-networkd[1305]: calicd81e29767d: Gained IPv6LL Feb 9 06:45:29.765243 kubelet[2582]: I0209 06:45:29.765214 2582 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-h5km6" podStartSLOduration=73.76516373 podCreationTimestamp="2024-02-09 06:44:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 06:45:29.764623778 +0000 UTC m=+86.333214734" watchObservedRunningTime="2024-02-09 06:45:29.76516373 +0000 UTC m=+86.333754670" Feb 9 06:45:29.776000 audit[4689]: NETFILTER_CFG table=filter:103 family=2 entries=14 op=nft_register_rule pid=4689 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:45:29.776000 audit[4689]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd21eebc00 a2=0 a3=7ffd21eebbec items=0 ppid=2856 pid=4689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:29.776000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:45:29.777000 audit[4689]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4689 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:45:29.777000 audit[4689]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffd21eebc00 a2=0 a3=31030 items=0 ppid=2856 pid=4689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:29.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:45:29.796000 audit[4691]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=4691 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:45:29.796000 audit[4691]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd3efbacc0 a2=0 a3=7ffd3efbacac items=0 ppid=2856 pid=4691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:29.796000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:45:29.808000 audit[4691]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=4691 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:45:29.808000 audit[4691]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffd3efbacc0 a2=0 a3=7ffd3efbacac items=0 ppid=2856 pid=4691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:29.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:45:30.529407 systemd-networkd[1305]: cali2f0cd32a1f5: Gained IPv6LL Feb 9 06:45:30.908392 systemd[1]: Started sshd@11-86.109.11.101:22-159.223.148.156:37604.service. Feb 9 06:45:30.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-86.109.11.101:22-159.223.148.156:37604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:45:31.346250 sshd[4694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.148.156 user=root Feb 9 06:45:31.346000 audit[4694]: USER_AUTH pid=4694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=159.223.148.156 addr=159.223.148.156 terminal=ssh res=failed' Feb 9 06:45:31.483749 env[1476]: time="2024-02-09T06:45:31.483646845Z" level=info msg="StopPodSandbox for \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\"" Feb 9 06:45:31.578329 env[1476]: 2024-02-09 06:45:31.548 [INFO][4739] k8s.go 578: Cleaning up netns ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:45:31.578329 env[1476]: 2024-02-09 06:45:31.548 [INFO][4739] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" iface="eth0" netns="/var/run/netns/cni-7584f8df-1af8-ae53-bd7c-ba23f0ebb78b" Feb 9 06:45:31.578329 env[1476]: 2024-02-09 06:45:31.548 [INFO][4739] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" iface="eth0" netns="/var/run/netns/cni-7584f8df-1af8-ae53-bd7c-ba23f0ebb78b" Feb 9 06:45:31.578329 env[1476]: 2024-02-09 06:45:31.548 [INFO][4739] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" iface="eth0" netns="/var/run/netns/cni-7584f8df-1af8-ae53-bd7c-ba23f0ebb78b" Feb 9 06:45:31.578329 env[1476]: 2024-02-09 06:45:31.548 [INFO][4739] k8s.go 585: Releasing IP address(es) ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:45:31.578329 env[1476]: 2024-02-09 06:45:31.548 [INFO][4739] utils.go 188: Calico CNI releasing IP address ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:45:31.578329 env[1476]: 2024-02-09 06:45:31.565 [INFO][4757] ipam_plugin.go 415: Releasing address using handleID ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" HandleID="k8s-pod-network.eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:45:31.578329 env[1476]: 2024-02-09 06:45:31.565 [INFO][4757] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:45:31.578329 env[1476]: 2024-02-09 06:45:31.565 [INFO][4757] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:45:31.578329 env[1476]: 2024-02-09 06:45:31.572 [WARNING][4757] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" HandleID="k8s-pod-network.eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:45:31.578329 env[1476]: 2024-02-09 06:45:31.572 [INFO][4757] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" HandleID="k8s-pod-network.eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:45:31.578329 env[1476]: 2024-02-09 06:45:31.576 [INFO][4757] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:45:31.578329 env[1476]: 2024-02-09 06:45:31.577 [INFO][4739] k8s.go 591: Teardown processing complete. ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:45:31.578985 env[1476]: time="2024-02-09T06:45:31.578437224Z" level=info msg="TearDown network for sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\" successfully" Feb 9 06:45:31.578985 env[1476]: time="2024-02-09T06:45:31.578466837Z" level=info msg="StopPodSandbox for \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\" returns successfully" Feb 9 06:45:31.579149 env[1476]: time="2024-02-09T06:45:31.579079018Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zhwmq,Uid:4e359e0e-c2df-4dde-a4d4-97d73ce2a314,Namespace:calico-system,Attempt:1,}" Feb 9 06:45:31.581368 systemd[1]: run-netns-cni\x2d7584f8df\x2d1af8\x2dae53\x2dbd7c\x2dba23f0ebb78b.mount: Deactivated successfully. Feb 9 06:45:31.670686 systemd-networkd[1305]: cali401a32f1a69: Link UP Feb 9 06:45:31.725723 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 06:45:31.725779 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali401a32f1a69: link becomes ready Feb 9 06:45:31.725809 systemd-networkd[1305]: cali401a32f1a69: Gained carrier Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.611 [INFO][4773] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0 csi-node-driver- calico-system 4e359e0e-c2df-4dde-a4d4-97d73ce2a314 824 0 2024-02-09 06:44:21 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-4a81ef77ce csi-node-driver-zhwmq eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali401a32f1a69 [] []}} ContainerID="d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" Namespace="calico-system" Pod="csi-node-driver-zhwmq" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-" Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.611 [INFO][4773] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" Namespace="calico-system" Pod="csi-node-driver-zhwmq" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.634 [INFO][4795] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" HandleID="k8s-pod-network.d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.643 [INFO][4795] ipam_plugin.go 268: Auto assigning IP ContainerID="d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" HandleID="k8s-pod-network.d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000125c20), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-4a81ef77ce", "pod":"csi-node-driver-zhwmq", "timestamp":"2024-02-09 06:45:31.634100765 +0000 UTC"}, Hostname:"ci-3510.3.2-a-4a81ef77ce", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.644 [INFO][4795] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.644 [INFO][4795] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.644 [INFO][4795] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-4a81ef77ce' Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.645 [INFO][4795] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.649 [INFO][4795] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.653 [INFO][4795] ipam.go 489: Trying affinity for 192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.655 [INFO][4795] ipam.go 155: Attempting to load block cidr=192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.657 [INFO][4795] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.657 [INFO][4795] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.19.64/26 handle="k8s-pod-network.d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.659 [INFO][4795] ipam.go 1682: Creating new handle: k8s-pod-network.d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3 Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.662 [INFO][4795] ipam.go 1203: Writing block in order to claim IPs block=192.168.19.64/26 handle="k8s-pod-network.d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.667 [INFO][4795] ipam.go 1216: Successfully claimed IPs: [192.168.19.67/26] block=192.168.19.64/26 handle="k8s-pod-network.d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.667 [INFO][4795] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.19.67/26] handle="k8s-pod-network.d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.667 [INFO][4795] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:45:31.731774 env[1476]: 2024-02-09 06:45:31.667 [INFO][4795] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.19.67/26] IPv6=[] ContainerID="d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" HandleID="k8s-pod-network.d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:45:31.732426 env[1476]: 2024-02-09 06:45:31.669 [INFO][4773] k8s.go 385: Populated endpoint ContainerID="d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" Namespace="calico-system" Pod="csi-node-driver-zhwmq" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4e359e0e-c2df-4dde-a4d4-97d73ce2a314", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"", Pod:"csi-node-driver-zhwmq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali401a32f1a69", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:45:31.732426 env[1476]: 2024-02-09 06:45:31.669 [INFO][4773] k8s.go 386: Calico CNI using IPs: [192.168.19.67/32] ContainerID="d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" Namespace="calico-system" Pod="csi-node-driver-zhwmq" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:45:31.732426 env[1476]: 2024-02-09 06:45:31.669 [INFO][4773] dataplane_linux.go 68: Setting the host side veth name to cali401a32f1a69 ContainerID="d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" Namespace="calico-system" Pod="csi-node-driver-zhwmq" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:45:31.732426 env[1476]: 2024-02-09 06:45:31.725 [INFO][4773] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" Namespace="calico-system" Pod="csi-node-driver-zhwmq" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:45:31.732426 env[1476]: 2024-02-09 06:45:31.726 [INFO][4773] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" Namespace="calico-system" Pod="csi-node-driver-zhwmq" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4e359e0e-c2df-4dde-a4d4-97d73ce2a314", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3", Pod:"csi-node-driver-zhwmq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali401a32f1a69", MAC:"46:9b:9c:f0:07:b9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:45:31.732426 env[1476]: 2024-02-09 06:45:31.730 [INFO][4773] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3" Namespace="calico-system" Pod="csi-node-driver-zhwmq" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:45:31.737180 env[1476]: time="2024-02-09T06:45:31.737142583Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:45:31.737180 env[1476]: time="2024-02-09T06:45:31.737164323Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:45:31.737180 env[1476]: time="2024-02-09T06:45:31.737172882Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:45:31.737304 env[1476]: time="2024-02-09T06:45:31.737244236Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3 pid=4835 runtime=io.containerd.runc.v2 Feb 9 06:45:31.737000 audit[4841]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=4841 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:45:31.737000 audit[4841]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7fff384b9f90 a2=0 a3=7fff384b9f7c items=0 ppid=4073 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:31.737000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:45:31.754185 systemd[1]: Started cri-containerd-d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3.scope. Feb 9 06:45:31.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit: BPF prog-id=161 op=LOAD Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4835 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:31.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333832623031663533396562663664623365616334663166313332 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4835 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:31.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333832623031663533396562663664623365616334663166313332 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit: BPF prog-id=162 op=LOAD Feb 9 06:45:31.759000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001ddba0 items=0 ppid=4835 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:31.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333832623031663533396562663664623365616334663166313332 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit: BPF prog-id=163 op=LOAD Feb 9 06:45:31.759000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001ddbe8 items=0 ppid=4835 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:31.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333832623031663533396562663664623365616334663166313332 Feb 9 06:45:31.759000 audit: BPF prog-id=163 op=UNLOAD Feb 9 06:45:31.759000 audit: BPF prog-id=162 op=UNLOAD Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:31.759000 audit: BPF prog-id=164 op=LOAD Feb 9 06:45:31.759000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001ddff8 items=0 ppid=4835 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:31.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333832623031663533396562663664623365616334663166313332 Feb 9 06:45:31.766128 env[1476]: time="2024-02-09T06:45:31.766102805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zhwmq,Uid:4e359e0e-c2df-4dde-a4d4-97d73ce2a314,Namespace:calico-system,Attempt:1,} returns sandbox id \"d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3\"" Feb 9 06:45:32.483559 env[1476]: time="2024-02-09T06:45:32.483444392Z" level=info msg="StopPodSandbox for \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\"" Feb 9 06:45:32.587613 env[1476]: 2024-02-09 06:45:32.555 [INFO][4892] k8s.go 578: Cleaning up netns ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:45:32.587613 env[1476]: 2024-02-09 06:45:32.555 [INFO][4892] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" iface="eth0" netns="/var/run/netns/cni-b5fc4558-9224-f79d-047a-0a099b5db2bb" Feb 9 06:45:32.587613 env[1476]: 2024-02-09 06:45:32.555 [INFO][4892] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" iface="eth0" netns="/var/run/netns/cni-b5fc4558-9224-f79d-047a-0a099b5db2bb" Feb 9 06:45:32.587613 env[1476]: 2024-02-09 06:45:32.555 [INFO][4892] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" iface="eth0" netns="/var/run/netns/cni-b5fc4558-9224-f79d-047a-0a099b5db2bb" Feb 9 06:45:32.587613 env[1476]: 2024-02-09 06:45:32.556 [INFO][4892] k8s.go 585: Releasing IP address(es) ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:45:32.587613 env[1476]: 2024-02-09 06:45:32.556 [INFO][4892] utils.go 188: Calico CNI releasing IP address ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:45:32.587613 env[1476]: 2024-02-09 06:45:32.574 [INFO][4910] ipam_plugin.go 415: Releasing address using handleID ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" HandleID="k8s-pod-network.1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:45:32.587613 env[1476]: 2024-02-09 06:45:32.574 [INFO][4910] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:45:32.587613 env[1476]: 2024-02-09 06:45:32.574 [INFO][4910] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:45:32.587613 env[1476]: 2024-02-09 06:45:32.583 [WARNING][4910] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" HandleID="k8s-pod-network.1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:45:32.587613 env[1476]: 2024-02-09 06:45:32.583 [INFO][4910] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" HandleID="k8s-pod-network.1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:45:32.587613 env[1476]: 2024-02-09 06:45:32.585 [INFO][4910] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:45:32.587613 env[1476]: 2024-02-09 06:45:32.586 [INFO][4892] k8s.go 591: Teardown processing complete. ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:45:32.588620 env[1476]: time="2024-02-09T06:45:32.587754532Z" level=info msg="TearDown network for sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\" successfully" Feb 9 06:45:32.588620 env[1476]: time="2024-02-09T06:45:32.587802917Z" level=info msg="StopPodSandbox for \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\" returns successfully" Feb 9 06:45:32.588620 env[1476]: time="2024-02-09T06:45:32.588488634Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gqwft,Uid:a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac,Namespace:kube-system,Attempt:1,}" Feb 9 06:45:32.590474 systemd[1]: run-netns-cni\x2db5fc4558\x2d9224\x2df79d\x2d047a\x2d0a099b5db2bb.mount: Deactivated successfully. Feb 9 06:45:32.692724 systemd-networkd[1305]: cali8cfb98f88d0: Link UP Feb 9 06:45:32.747741 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 06:45:32.747789 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8cfb98f88d0: link becomes ready Feb 9 06:45:32.747943 systemd-networkd[1305]: cali8cfb98f88d0: Gained carrier Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.625 [INFO][4927] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0 coredns-5d78c9869d- kube-system a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac 833 0 2024-02-09 06:44:16 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-4a81ef77ce coredns-5d78c9869d-gqwft eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8cfb98f88d0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" Namespace="kube-system" Pod="coredns-5d78c9869d-gqwft" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-" Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.625 [INFO][4927] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" Namespace="kube-system" Pod="coredns-5d78c9869d-gqwft" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.652 [INFO][4951] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" HandleID="k8s-pod-network.e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.664 [INFO][4951] ipam_plugin.go 268: Auto assigning IP ContainerID="e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" HandleID="k8s-pod-network.e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b5910), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-4a81ef77ce", "pod":"coredns-5d78c9869d-gqwft", "timestamp":"2024-02-09 06:45:32.652502536 +0000 UTC"}, Hostname:"ci-3510.3.2-a-4a81ef77ce", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.664 [INFO][4951] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.664 [INFO][4951] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.664 [INFO][4951] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-4a81ef77ce' Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.666 [INFO][4951] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.670 [INFO][4951] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.674 [INFO][4951] ipam.go 489: Trying affinity for 192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.676 [INFO][4951] ipam.go 155: Attempting to load block cidr=192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.679 [INFO][4951] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.679 [INFO][4951] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.19.64/26 handle="k8s-pod-network.e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.680 [INFO][4951] ipam.go 1682: Creating new handle: k8s-pod-network.e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51 Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.684 [INFO][4951] ipam.go 1203: Writing block in order to claim IPs block=192.168.19.64/26 handle="k8s-pod-network.e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.689 [INFO][4951] ipam.go 1216: Successfully claimed IPs: [192.168.19.68/26] block=192.168.19.64/26 handle="k8s-pod-network.e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.689 [INFO][4951] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.19.68/26] handle="k8s-pod-network.e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.689 [INFO][4951] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:45:32.753286 env[1476]: 2024-02-09 06:45:32.689 [INFO][4951] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.19.68/26] IPv6=[] ContainerID="e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" HandleID="k8s-pod-network.e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:45:32.753767 env[1476]: 2024-02-09 06:45:32.691 [INFO][4927] k8s.go 385: Populated endpoint ContainerID="e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" Namespace="kube-system" Pod="coredns-5d78c9869d-gqwft" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"", Pod:"coredns-5d78c9869d-gqwft", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.19.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8cfb98f88d0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:45:32.753767 env[1476]: 2024-02-09 06:45:32.691 [INFO][4927] k8s.go 386: Calico CNI using IPs: [192.168.19.68/32] ContainerID="e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" Namespace="kube-system" Pod="coredns-5d78c9869d-gqwft" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:45:32.753767 env[1476]: 2024-02-09 06:45:32.691 [INFO][4927] dataplane_linux.go 68: Setting the host side veth name to cali8cfb98f88d0 ContainerID="e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" Namespace="kube-system" Pod="coredns-5d78c9869d-gqwft" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:45:32.753767 env[1476]: 2024-02-09 06:45:32.747 [INFO][4927] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" Namespace="kube-system" Pod="coredns-5d78c9869d-gqwft" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:45:32.753767 env[1476]: 2024-02-09 06:45:32.748 [INFO][4927] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" Namespace="kube-system" Pod="coredns-5d78c9869d-gqwft" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51", Pod:"coredns-5d78c9869d-gqwft", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.19.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8cfb98f88d0", MAC:"06:76:eb:f4:50:70", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:45:32.753767 env[1476]: 2024-02-09 06:45:32.752 [INFO][4927] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51" Namespace="kube-system" Pod="coredns-5d78c9869d-gqwft" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:45:32.757000 audit[4983]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=4983 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:45:32.757000 audit[4983]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7fff97970400 a2=0 a3=7fff979703ec items=0 ppid=4073 pid=4983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:32.757000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:45:32.768444 env[1476]: time="2024-02-09T06:45:32.768383471Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:45:32.768444 env[1476]: time="2024-02-09T06:45:32.768404557Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:45:32.768444 env[1476]: time="2024-02-09T06:45:32.768411322Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:45:32.768577 env[1476]: time="2024-02-09T06:45:32.768515182Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51 pid=4991 runtime=io.containerd.runc.v2 Feb 9 06:45:32.797145 systemd[1]: Started cri-containerd-e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51.scope. Feb 9 06:45:32.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.856514 kernel: kauditd_printk_skb: 244 callbacks suppressed Feb 9 06:45:32.856618 kernel: audit: type=1400 audit(1707461132.820:1272): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.897253 systemd-networkd[1305]: cali401a32f1a69: Gained IPv6LL Feb 9 06:45:32.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.976400 kernel: audit: type=1400 audit(1707461132.820:1273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.976431 kernel: audit: type=1400 audit(1707461132.820:1274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.036374 kernel: audit: type=1400 audit(1707461132.820:1275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.096640 kernel: audit: type=1400 audit(1707461132.820:1276): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.156885 kernel: audit: type=1400 audit(1707461132.820:1277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.217164 kernel: audit: type=1400 audit(1707461132.820:1278): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.277583 kernel: audit: type=1400 audit(1707461132.820:1279): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.340164 sshd[4694]: Failed password for root from 159.223.148.156 port 37604 ssh2 Feb 9 06:45:33.398316 kernel: audit: type=1400 audit(1707461132.820:1280): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.398347 kernel: audit: type=1400 audit(1707461132.975:1281): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit: BPF prog-id=165 op=LOAD Feb 9 06:45:32.975000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit[5000]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4991 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:32.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530663734373439626563306666626537626162626636363062623035 Feb 9 06:45:32.975000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit[5000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4991 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:32.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530663734373439626563306666626537626162626636363062623035 Feb 9 06:45:32.975000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:32.975000 audit: BPF prog-id=166 op=LOAD Feb 9 06:45:32.975000 audit[5000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000384440 items=0 ppid=4991 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:32.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530663734373439626563306666626537626162626636363062623035 Feb 9 06:45:33.095000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.095000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.095000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.095000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.095000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.095000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.095000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.095000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.095000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.095000 audit: BPF prog-id=167 op=LOAD Feb 9 06:45:33.095000 audit[5000]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000384488 items=0 ppid=4991 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:33.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530663734373439626563306666626537626162626636363062623035 Feb 9 06:45:33.216000 audit: BPF prog-id=167 op=UNLOAD Feb 9 06:45:33.216000 audit: BPF prog-id=166 op=UNLOAD Feb 9 06:45:33.216000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.216000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.216000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.216000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.216000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.216000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.216000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.216000 audit[5000]: AVC avc: denied { perfmon } for pid=5000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.216000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.216000 audit[5000]: AVC avc: denied { bpf } for pid=5000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.216000 audit: BPF prog-id=168 op=LOAD Feb 9 06:45:33.216000 audit[5000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000384898 items=0 ppid=4991 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:33.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530663734373439626563306666626537626162626636363062623035 Feb 9 06:45:33.488900 env[1476]: time="2024-02-09T06:45:33.488871912Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gqwft,Uid:a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac,Namespace:kube-system,Attempt:1,} returns sandbox id \"e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51\"" Feb 9 06:45:33.489955 env[1476]: time="2024-02-09T06:45:33.489941417Z" level=info msg="CreateContainer within sandbox \"e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 06:45:33.493794 env[1476]: time="2024-02-09T06:45:33.493775833Z" level=info msg="CreateContainer within sandbox \"e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f5e0c8ce71de35ccab213de00f5580b248df36d6dc610c4c0d5caee9094f4052\"" Feb 9 06:45:33.493992 env[1476]: time="2024-02-09T06:45:33.493981813Z" level=info msg="StartContainer for \"f5e0c8ce71de35ccab213de00f5580b248df36d6dc610c4c0d5caee9094f4052\"" Feb 9 06:45:33.524216 systemd[1]: Started cri-containerd-f5e0c8ce71de35ccab213de00f5580b248df36d6dc610c4c0d5caee9094f4052.scope. Feb 9 06:45:33.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit: BPF prog-id=169 op=LOAD Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4991 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:33.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635653063386365373164653335636361623231336465303066353538 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4991 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:33.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635653063386365373164653335636361623231336465303066353538 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit: BPF prog-id=170 op=LOAD Feb 9 06:45:33.528000 audit[5030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001dfca0 items=0 ppid=4991 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:33.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635653063386365373164653335636361623231336465303066353538 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit: BPF prog-id=171 op=LOAD Feb 9 06:45:33.528000 audit[5030]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001dfce8 items=0 ppid=4991 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:33.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635653063386365373164653335636361623231336465303066353538 Feb 9 06:45:33.528000 audit: BPF prog-id=171 op=UNLOAD Feb 9 06:45:33.528000 audit: BPF prog-id=170 op=UNLOAD Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { perfmon } for pid=5030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit[5030]: AVC avc: denied { bpf } for pid=5030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:33.528000 audit: BPF prog-id=172 op=LOAD Feb 9 06:45:33.528000 audit[5030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002180f8 items=0 ppid=4991 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:33.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635653063386365373164653335636361623231336465303066353538 Feb 9 06:45:33.548647 env[1476]: time="2024-02-09T06:45:33.548620164Z" level=info msg="StartContainer for \"f5e0c8ce71de35ccab213de00f5580b248df36d6dc610c4c0d5caee9094f4052\" returns successfully" Feb 9 06:45:33.790246 kubelet[2582]: I0209 06:45:33.790178 2582 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-gqwft" podStartSLOduration=77.790070027 podCreationTimestamp="2024-02-09 06:44:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 06:45:33.789459037 +0000 UTC m=+90.358050031" watchObservedRunningTime="2024-02-09 06:45:33.790070027 +0000 UTC m=+90.358660997" Feb 9 06:45:33.811000 audit[5074]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=5074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:45:33.811000 audit[5074]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff4659a400 a2=0 a3=7fff4659a3ec items=0 ppid=2856 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:33.811000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:45:33.815000 audit[5074]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=5074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:45:33.815000 audit[5074]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fff4659a400 a2=0 a3=7fff4659a3ec items=0 ppid=2856 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:33.815000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:45:33.840000 audit[5076]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=5076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:45:33.840000 audit[5076]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff262de220 a2=0 a3=7fff262de20c items=0 ppid=2856 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:33.840000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:45:33.849000 audit[5076]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=5076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:45:33.849000 audit[5076]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7fff262de220 a2=0 a3=7fff262de20c items=0 ppid=2856 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:33.849000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:45:34.561406 systemd-networkd[1305]: cali8cfb98f88d0: Gained IPv6LL Feb 9 06:45:35.245113 sshd[4694]: Received disconnect from 159.223.148.156 port 37604:11: Bye Bye [preauth] Feb 9 06:45:35.245113 sshd[4694]: Disconnected from authenticating user root 159.223.148.156 port 37604 [preauth] Feb 9 06:45:35.246347 systemd[1]: sshd@11-86.109.11.101:22-159.223.148.156:37604.service: Deactivated successfully. Feb 9 06:45:35.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-86.109.11.101:22-159.223.148.156:37604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:45:37.949264 env[1476]: time="2024-02-09T06:45:37.949204057Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:37.950394 env[1476]: time="2024-02-09T06:45:37.950346384Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:37.951405 env[1476]: time="2024-02-09T06:45:37.951391787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:37.952465 env[1476]: time="2024-02-09T06:45:37.952452890Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:37.953447 env[1476]: time="2024-02-09T06:45:37.953431593Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 06:45:37.953924 env[1476]: time="2024-02-09T06:45:37.953893523Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 06:45:37.957514 env[1476]: time="2024-02-09T06:45:37.957454839Z" level=info msg="CreateContainer within sandbox \"9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 06:45:37.962464 env[1476]: time="2024-02-09T06:45:37.962447651Z" level=info msg="CreateContainer within sandbox \"9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"f1a89d4ad78bea43e6ac6285d47972f163ba8d9702d5443b89932c1fde749967\"" Feb 9 06:45:37.962864 env[1476]: time="2024-02-09T06:45:37.962827910Z" level=info msg="StartContainer for \"f1a89d4ad78bea43e6ac6285d47972f163ba8d9702d5443b89932c1fde749967\"" Feb 9 06:45:37.983092 systemd[1]: Started cri-containerd-f1a89d4ad78bea43e6ac6285d47972f163ba8d9702d5443b89932c1fde749967.scope. Feb 9 06:45:37.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.016540 kernel: kauditd_printk_skb: 117 callbacks suppressed Feb 9 06:45:38.016575 kernel: audit: type=1400 audit(1707461137.990:1313): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:37.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.139786 kernel: audit: type=1400 audit(1707461137.990:1314): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.139851 kernel: audit: type=1400 audit(1707461137.990:1315): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:37.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.203165 kernel: audit: type=1400 audit(1707461137.990:1316): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.325873 kernel: audit: type=1400 audit(1707461137.990:1317): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.325905 kernel: audit: type=1400 audit(1707461137.990:1318): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.387605 kernel: audit: type=1400 audit(1707461137.990:1319): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.449272 kernel: audit: type=1400 audit(1707461137.990:1320): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:37.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.511003 kernel: audit: type=1400 audit(1707461137.990:1321): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:37.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.572337 kernel: audit: type=1400 audit(1707461138.077:1322): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.077000 audit: BPF prog-id=173 op=LOAD Feb 9 06:45:38.078000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.078000 audit[5090]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4458 pid=5090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:38.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631613839643461643738626561343365366163363238356434373937 Feb 9 06:45:38.078000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.078000 audit[5090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4458 pid=5090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:38.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631613839643461643738626561343365366163363238356434373937 Feb 9 06:45:38.078000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.078000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.078000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.078000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.078000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.078000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.078000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.078000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.078000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.078000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.078000 audit: BPF prog-id=174 op=LOAD Feb 9 06:45:38.078000 audit[5090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000241df0 items=0 ppid=4458 pid=5090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:38.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631613839643461643738626561343365366163363238356434373937 Feb 9 06:45:38.202000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.202000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.202000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.202000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.202000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.202000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.202000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.202000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.202000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.202000 audit: BPF prog-id=175 op=LOAD Feb 9 06:45:38.202000 audit[5090]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000241e38 items=0 ppid=4458 pid=5090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:38.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631613839643461643738626561343365366163363238356434373937 Feb 9 06:45:38.325000 audit: BPF prog-id=175 op=UNLOAD Feb 9 06:45:38.325000 audit: BPF prog-id=174 op=UNLOAD Feb 9 06:45:38.325000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.325000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.325000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.325000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.325000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.325000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.325000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.325000 audit[5090]: AVC avc: denied { perfmon } for pid=5090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.325000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.325000 audit[5090]: AVC avc: denied { bpf } for pid=5090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:38.325000 audit: BPF prog-id=176 op=LOAD Feb 9 06:45:38.325000 audit[5090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000386248 items=0 ppid=4458 pid=5090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:38.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631613839643461643738626561343365366163363238356434373937 Feb 9 06:45:38.661979 env[1476]: time="2024-02-09T06:45:38.661955646Z" level=info msg="StartContainer for \"f1a89d4ad78bea43e6ac6285d47972f163ba8d9702d5443b89932c1fde749967\" returns successfully" Feb 9 06:45:38.802369 kubelet[2582]: I0209 06:45:38.802251 2582 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-df7db6857-58cff" podStartSLOduration=68.306026784 podCreationTimestamp="2024-02-09 06:44:21 +0000 UTC" firstStartedPulling="2024-02-09 06:45:28.4575552 +0000 UTC m=+85.026146127" lastFinishedPulling="2024-02-09 06:45:37.953725516 +0000 UTC m=+94.522316442" observedRunningTime="2024-02-09 06:45:38.801527754 +0000 UTC m=+95.370118730" watchObservedRunningTime="2024-02-09 06:45:38.802197099 +0000 UTC m=+95.370788048" Feb 9 06:45:40.555992 systemd[1]: Started sshd@12-86.109.11.101:22-141.98.11.11:47188.service. Feb 9 06:45:40.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-86.109.11.101:22-141.98.11.11:47188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:45:41.121000 audit[5154]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=5154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:45:41.121000 audit[5154]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff10fa7e30 a2=0 a3=7fff10fa7e1c items=0 ppid=2856 pid=5154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:41.121000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:45:41.135461 kubelet[2582]: I0209 06:45:41.135439 2582 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:45:41.122000 audit[5154]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:45:41.122000 audit[5154]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff10fa7e30 a2=0 a3=7fff10fa7e1c items=0 ppid=2856 pid=5154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:41.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:45:41.139097 systemd[1]: Created slice kubepods-besteffort-podbdb67b6d_fb5f_4fcb_b81a_823e59821584.slice. Feb 9 06:45:41.140930 kubelet[2582]: I0209 06:45:41.140909 2582 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:45:41.144306 systemd[1]: Created slice kubepods-besteffort-pod5d5fa150_43f8_4c41_ba2d_78186392b951.slice. Feb 9 06:45:41.140000 audit[5156]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=5156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:45:41.140000 audit[5156]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffdaa79b520 a2=0 a3=7ffdaa79b50c items=0 ppid=2856 pid=5156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:41.140000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:45:41.145000 audit[5156]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:45:41.145000 audit[5156]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffdaa79b520 a2=0 a3=7ffdaa79b50c items=0 ppid=2856 pid=5156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:41.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:45:41.272917 kubelet[2582]: I0209 06:45:41.272860 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/bdb67b6d-fb5f-4fcb-b81a-823e59821584-calico-apiserver-certs\") pod \"calico-apiserver-78dc7fdbf6-rrwrg\" (UID: \"bdb67b6d-fb5f-4fcb-b81a-823e59821584\") " pod="calico-apiserver/calico-apiserver-78dc7fdbf6-rrwrg" Feb 9 06:45:41.273208 kubelet[2582]: I0209 06:45:41.272979 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6zf5l\" (UniqueName: \"kubernetes.io/projected/bdb67b6d-fb5f-4fcb-b81a-823e59821584-kube-api-access-6zf5l\") pod \"calico-apiserver-78dc7fdbf6-rrwrg\" (UID: \"bdb67b6d-fb5f-4fcb-b81a-823e59821584\") " pod="calico-apiserver/calico-apiserver-78dc7fdbf6-rrwrg" Feb 9 06:45:41.273331 kubelet[2582]: I0209 06:45:41.273228 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5d5fa150-43f8-4c41-ba2d-78186392b951-calico-apiserver-certs\") pod \"calico-apiserver-78dc7fdbf6-7872r\" (UID: \"5d5fa150-43f8-4c41-ba2d-78186392b951\") " pod="calico-apiserver/calico-apiserver-78dc7fdbf6-7872r" Feb 9 06:45:41.273331 kubelet[2582]: I0209 06:45:41.273325 2582 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8s5bk\" (UniqueName: \"kubernetes.io/projected/5d5fa150-43f8-4c41-ba2d-78186392b951-kube-api-access-8s5bk\") pod \"calico-apiserver-78dc7fdbf6-7872r\" (UID: \"5d5fa150-43f8-4c41-ba2d-78186392b951\") " pod="calico-apiserver/calico-apiserver-78dc7fdbf6-7872r" Feb 9 06:45:41.375183 kubelet[2582]: E0209 06:45:41.374903 2582 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 06:45:41.375183 kubelet[2582]: E0209 06:45:41.374955 2582 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 06:45:41.375183 kubelet[2582]: E0209 06:45:41.375084 2582 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/5d5fa150-43f8-4c41-ba2d-78186392b951-calico-apiserver-certs podName:5d5fa150-43f8-4c41-ba2d-78186392b951 nodeName:}" failed. No retries permitted until 2024-02-09 06:45:41.875033717 +0000 UTC m=+98.443624724 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/5d5fa150-43f8-4c41-ba2d-78186392b951-calico-apiserver-certs") pod "calico-apiserver-78dc7fdbf6-7872r" (UID: "5d5fa150-43f8-4c41-ba2d-78186392b951") : secret "calico-apiserver-certs" not found Feb 9 06:45:41.375183 kubelet[2582]: E0209 06:45:41.375183 2582 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/bdb67b6d-fb5f-4fcb-b81a-823e59821584-calico-apiserver-certs podName:bdb67b6d-fb5f-4fcb-b81a-823e59821584 nodeName:}" failed. No retries permitted until 2024-02-09 06:45:41.87515279 +0000 UTC m=+98.443743772 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/bdb67b6d-fb5f-4fcb-b81a-823e59821584-calico-apiserver-certs") pod "calico-apiserver-78dc7fdbf6-rrwrg" (UID: "bdb67b6d-fb5f-4fcb-b81a-823e59821584") : secret "calico-apiserver-certs" not found Feb 9 06:45:42.002974 sshd[5151]: Invalid user test from 141.98.11.11 port 47188 Feb 9 06:45:42.041742 env[1476]: time="2024-02-09T06:45:42.041634499Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78dc7fdbf6-rrwrg,Uid:bdb67b6d-fb5f-4fcb-b81a-823e59821584,Namespace:calico-apiserver,Attempt:0,}" Feb 9 06:45:42.047521 env[1476]: time="2024-02-09T06:45:42.047429819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78dc7fdbf6-7872r,Uid:5d5fa150-43f8-4c41-ba2d-78186392b951,Namespace:calico-apiserver,Attempt:0,}" Feb 9 06:45:42.156436 systemd-networkd[1305]: cali914414095f8: Link UP Feb 9 06:45:42.202633 sshd[5151]: pam_faillock(sshd:auth): User unknown Feb 9 06:45:42.203092 sshd[5151]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:45:42.203111 sshd[5151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.11 Feb 9 06:45:42.203295 sshd[5151]: pam_faillock(sshd:auth): User unknown Feb 9 06:45:42.210774 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 06:45:42.210813 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali914414095f8: link becomes ready Feb 9 06:45:42.209000 audit[5151]: USER_AUTH pid=5151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 9 06:45:42.210857 systemd-networkd[1305]: cali914414095f8: Gained carrier Feb 9 06:45:42.211319 systemd-networkd[1305]: cali0a7cba9ee14: Link UP Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.105 [INFO][5168] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-eth0 calico-apiserver-78dc7fdbf6- calico-apiserver bdb67b6d-fb5f-4fcb-b81a-823e59821584 920 0 2024-02-09 06:45:41 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:78dc7fdbf6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-4a81ef77ce calico-apiserver-78dc7fdbf6-rrwrg eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali914414095f8 [] []}} ContainerID="11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-rrwrg" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-" Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.105 [INFO][5168] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-rrwrg" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-eth0" Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.125 [INFO][5216] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" HandleID="k8s-pod-network.11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-eth0" Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.133 [INFO][5216] ipam_plugin.go 268: Auto assigning IP ContainerID="11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" HandleID="k8s-pod-network.11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00051c1a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-4a81ef77ce", "pod":"calico-apiserver-78dc7fdbf6-rrwrg", "timestamp":"2024-02-09 06:45:42.125661215 +0000 UTC"}, Hostname:"ci-3510.3.2-a-4a81ef77ce", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.134 [INFO][5216] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.134 [INFO][5216] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.134 [INFO][5216] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-4a81ef77ce' Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.135 [INFO][5216] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.139 [INFO][5216] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.142 [INFO][5216] ipam.go 489: Trying affinity for 192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.144 [INFO][5216] ipam.go 155: Attempting to load block cidr=192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.146 [INFO][5216] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.146 [INFO][5216] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.19.64/26 handle="k8s-pod-network.11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.147 [INFO][5216] ipam.go 1682: Creating new handle: k8s-pod-network.11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83 Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.150 [INFO][5216] ipam.go 1203: Writing block in order to claim IPs block=192.168.19.64/26 handle="k8s-pod-network.11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.154 [INFO][5216] ipam.go 1216: Successfully claimed IPs: [192.168.19.69/26] block=192.168.19.64/26 handle="k8s-pod-network.11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.154 [INFO][5216] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.19.69/26] handle="k8s-pod-network.11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.154 [INFO][5216] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:45:42.216429 env[1476]: 2024-02-09 06:45:42.154 [INFO][5216] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.19.69/26] IPv6=[] ContainerID="11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" HandleID="k8s-pod-network.11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-eth0" Feb 9 06:45:42.216902 env[1476]: 2024-02-09 06:45:42.155 [INFO][5168] k8s.go 385: Populated endpoint ContainerID="11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-rrwrg" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-eth0", GenerateName:"calico-apiserver-78dc7fdbf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"bdb67b6d-fb5f-4fcb-b81a-823e59821584", ResourceVersion:"920", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 45, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78dc7fdbf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"", Pod:"calico-apiserver-78dc7fdbf6-rrwrg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.19.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali914414095f8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:45:42.216902 env[1476]: 2024-02-09 06:45:42.155 [INFO][5168] k8s.go 386: Calico CNI using IPs: [192.168.19.69/32] ContainerID="11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-rrwrg" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-eth0" Feb 9 06:45:42.216902 env[1476]: 2024-02-09 06:45:42.155 [INFO][5168] dataplane_linux.go 68: Setting the host side veth name to cali914414095f8 ContainerID="11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-rrwrg" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-eth0" Feb 9 06:45:42.216902 env[1476]: 2024-02-09 06:45:42.210 [INFO][5168] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-rrwrg" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-eth0" Feb 9 06:45:42.216902 env[1476]: 2024-02-09 06:45:42.211 [INFO][5168] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-rrwrg" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-eth0", GenerateName:"calico-apiserver-78dc7fdbf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"bdb67b6d-fb5f-4fcb-b81a-823e59821584", ResourceVersion:"920", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 45, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78dc7fdbf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83", Pod:"calico-apiserver-78dc7fdbf6-rrwrg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.19.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali914414095f8", MAC:"b6:73:16:44:5d:94", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:45:42.216902 env[1476]: 2024-02-09 06:45:42.215 [INFO][5168] k8s.go 491: Wrote updated endpoint to datastore ContainerID="11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-rrwrg" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--rrwrg-eth0" Feb 9 06:45:42.224000 audit[5271]: NETFILTER_CFG table=filter:117 family=2 entries=59 op=nft_register_chain pid=5271 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:45:42.224000 audit[5271]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7fff48837d10 a2=0 a3=7fff48837cfc items=0 ppid=4073 pid=5271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:42.224000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:45:42.239096 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0a7cba9ee14: link becomes ready Feb 9 06:45:42.239241 systemd-networkd[1305]: cali0a7cba9ee14: Gained carrier Feb 9 06:45:42.242285 env[1476]: time="2024-02-09T06:45:42.242199549Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:45:42.242285 env[1476]: time="2024-02-09T06:45:42.242222314Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:45:42.242285 env[1476]: time="2024-02-09T06:45:42.242229226Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:45:42.242405 env[1476]: time="2024-02-09T06:45:42.242296829Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83 pid=5280 runtime=io.containerd.runc.v2 Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.107 [INFO][5179] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-eth0 calico-apiserver-78dc7fdbf6- calico-apiserver 5d5fa150-43f8-4c41-ba2d-78186392b951 922 0 2024-02-09 06:45:41 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:78dc7fdbf6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-4a81ef77ce calico-apiserver-78dc7fdbf6-7872r eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0a7cba9ee14 [] []}} ContainerID="0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-7872r" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-" Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.107 [INFO][5179] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-7872r" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-eth0" Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.128 [INFO][5221] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" HandleID="k8s-pod-network.0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-eth0" Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.136 [INFO][5221] ipam_plugin.go 268: Auto assigning IP ContainerID="0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" HandleID="k8s-pod-network.0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051ad0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-4a81ef77ce", "pod":"calico-apiserver-78dc7fdbf6-7872r", "timestamp":"2024-02-09 06:45:42.128041243 +0000 UTC"}, Hostname:"ci-3510.3.2-a-4a81ef77ce", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.136 [INFO][5221] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.154 [INFO][5221] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.154 [INFO][5221] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-4a81ef77ce' Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.155 [INFO][5221] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.159 [INFO][5221] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.162 [INFO][5221] ipam.go 489: Trying affinity for 192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.164 [INFO][5221] ipam.go 155: Attempting to load block cidr=192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.166 [INFO][5221] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.19.64/26 host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.166 [INFO][5221] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.19.64/26 handle="k8s-pod-network.0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.168 [INFO][5221] ipam.go 1682: Creating new handle: k8s-pod-network.0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379 Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.171 [INFO][5221] ipam.go 1203: Writing block in order to claim IPs block=192.168.19.64/26 handle="k8s-pod-network.0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.174 [INFO][5221] ipam.go 1216: Successfully claimed IPs: [192.168.19.70/26] block=192.168.19.64/26 handle="k8s-pod-network.0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.174 [INFO][5221] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.19.70/26] handle="k8s-pod-network.0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" host="ci-3510.3.2-a-4a81ef77ce" Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.174 [INFO][5221] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:45:42.256293 env[1476]: 2024-02-09 06:45:42.174 [INFO][5221] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.19.70/26] IPv6=[] ContainerID="0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" HandleID="k8s-pod-network.0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-eth0" Feb 9 06:45:42.256877 env[1476]: 2024-02-09 06:45:42.175 [INFO][5179] k8s.go 385: Populated endpoint ContainerID="0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-7872r" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-eth0", GenerateName:"calico-apiserver-78dc7fdbf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"5d5fa150-43f8-4c41-ba2d-78186392b951", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 45, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78dc7fdbf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"", Pod:"calico-apiserver-78dc7fdbf6-7872r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.19.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0a7cba9ee14", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:45:42.256877 env[1476]: 2024-02-09 06:45:42.175 [INFO][5179] k8s.go 386: Calico CNI using IPs: [192.168.19.70/32] ContainerID="0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-7872r" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-eth0" Feb 9 06:45:42.256877 env[1476]: 2024-02-09 06:45:42.175 [INFO][5179] dataplane_linux.go 68: Setting the host side veth name to cali0a7cba9ee14 ContainerID="0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-7872r" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-eth0" Feb 9 06:45:42.256877 env[1476]: 2024-02-09 06:45:42.239 [INFO][5179] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-7872r" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-eth0" Feb 9 06:45:42.256877 env[1476]: 2024-02-09 06:45:42.246 [INFO][5179] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-7872r" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-eth0", GenerateName:"calico-apiserver-78dc7fdbf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"5d5fa150-43f8-4c41-ba2d-78186392b951", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 45, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78dc7fdbf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379", Pod:"calico-apiserver-78dc7fdbf6-7872r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.19.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0a7cba9ee14", MAC:"ee:46:b5:05:23:39", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:45:42.256877 env[1476]: 2024-02-09 06:45:42.255 [INFO][5179] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379" Namespace="calico-apiserver" Pod="calico-apiserver-78dc7fdbf6-7872r" WorkloadEndpoint="ci--3510.3.2--a--4a81ef77ce-k8s-calico--apiserver--78dc7fdbf6--7872r-eth0" Feb 9 06:45:42.260826 systemd[1]: Started cri-containerd-11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83.scope. Feb 9 06:45:42.262278 env[1476]: time="2024-02-09T06:45:42.262247165Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:45:42.262278 env[1476]: time="2024-02-09T06:45:42.262268608Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:45:42.262390 env[1476]: time="2024-02-09T06:45:42.262278581Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:45:42.262390 env[1476]: time="2024-02-09T06:45:42.262366996Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379 pid=5318 runtime=io.containerd.runc.v2 Feb 9 06:45:42.262000 audit[5324]: NETFILTER_CFG table=filter:118 family=2 entries=50 op=nft_register_chain pid=5324 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:45:42.262000 audit[5324]: SYSCALL arch=c000003e syscall=46 success=yes exit=24496 a0=3 a1=7ffd6386ffe0 a2=0 a3=7ffd6386ffcc items=0 ppid=4073 pid=5324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:42.262000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:45:42.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit: BPF prog-id=177 op=LOAD Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5280 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:42.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131623438333037323238613661383166303530633132306433376465 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5280 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:42.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131623438333037323238613661383166303530633132306433376465 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit: BPF prog-id=178 op=LOAD Feb 9 06:45:42.266000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000308e80 items=0 ppid=5280 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:42.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131623438333037323238613661383166303530633132306433376465 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit: BPF prog-id=179 op=LOAD Feb 9 06:45:42.266000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308ec8 items=0 ppid=5280 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:42.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131623438333037323238613661383166303530633132306433376465 Feb 9 06:45:42.266000 audit: BPF prog-id=179 op=UNLOAD Feb 9 06:45:42.266000 audit: BPF prog-id=178 op=UNLOAD Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.266000 audit: BPF prog-id=180 op=LOAD Feb 9 06:45:42.266000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003092d8 items=0 ppid=5280 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:42.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131623438333037323238613661383166303530633132306433376465 Feb 9 06:45:42.281373 systemd[1]: Started cri-containerd-0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379.scope. Feb 9 06:45:42.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit: BPF prog-id=181 op=LOAD Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5318 pid=5331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:42.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061623261656236383932383839613837323961323364333236656661 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5318 pid=5331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:42.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061623261656236383932383839613837323961323364333236656661 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit: BPF prog-id=182 op=LOAD Feb 9 06:45:42.286000 audit[5331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a0510 items=0 ppid=5318 pid=5331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:42.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061623261656236383932383839613837323961323364333236656661 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit: BPF prog-id=183 op=LOAD Feb 9 06:45:42.286000 audit[5331]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a0558 items=0 ppid=5318 pid=5331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:42.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061623261656236383932383839613837323961323364333236656661 Feb 9 06:45:42.286000 audit: BPF prog-id=183 op=UNLOAD Feb 9 06:45:42.286000 audit: BPF prog-id=182 op=UNLOAD Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:42.286000 audit: BPF prog-id=184 op=LOAD Feb 9 06:45:42.286000 audit[5331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a0968 items=0 ppid=5318 pid=5331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:42.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061623261656236383932383839613837323961323364333236656661 Feb 9 06:45:42.295674 env[1476]: time="2024-02-09T06:45:42.295653638Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78dc7fdbf6-rrwrg,Uid:bdb67b6d-fb5f-4fcb-b81a-823e59821584,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"11b48307228a6a81f050c120d37de26dd46312c0b96ecd9c49ffeb5998616d83\"" Feb 9 06:45:42.315532 env[1476]: time="2024-02-09T06:45:42.315510436Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78dc7fdbf6-7872r,Uid:5d5fa150-43f8-4c41-ba2d-78186392b951,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"0ab2aeb6892889a8729a23d326efa52576a2f6190020123d91386a09e5d6d379\"" Feb 9 06:45:42.831932 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1821751409.mount: Deactivated successfully. Feb 9 06:45:44.049354 sshd[5151]: Failed password for invalid user test from 141.98.11.11 port 47188 ssh2 Feb 9 06:45:44.161240 systemd-networkd[1305]: cali0a7cba9ee14: Gained IPv6LL Feb 9 06:45:44.225470 systemd-networkd[1305]: cali914414095f8: Gained IPv6LL Feb 9 06:45:44.822572 env[1476]: time="2024-02-09T06:45:44.822547942Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:44.823151 env[1476]: time="2024-02-09T06:45:44.823097280Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:44.823871 env[1476]: time="2024-02-09T06:45:44.823832210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:44.825087 env[1476]: time="2024-02-09T06:45:44.825037359Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:45:44.825350 env[1476]: time="2024-02-09T06:45:44.825304012Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 06:45:44.825680 env[1476]: time="2024-02-09T06:45:44.825668306Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 06:45:44.826418 env[1476]: time="2024-02-09T06:45:44.826405724Z" level=info msg="CreateContainer within sandbox \"d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 06:45:44.832343 env[1476]: time="2024-02-09T06:45:44.832297682Z" level=info msg="CreateContainer within sandbox \"d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"633c7ffc5c257ed37071737bc6a1e8ca0861a5e4e62258f8ef6157cf03d07225\"" Feb 9 06:45:44.832652 env[1476]: time="2024-02-09T06:45:44.832639176Z" level=info msg="StartContainer for \"633c7ffc5c257ed37071737bc6a1e8ca0861a5e4e62258f8ef6157cf03d07225\"" Feb 9 06:45:44.854649 systemd[1]: Started cri-containerd-633c7ffc5c257ed37071737bc6a1e8ca0861a5e4e62258f8ef6157cf03d07225.scope. Feb 9 06:45:44.860000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.887831 kernel: kauditd_printk_skb: 181 callbacks suppressed Feb 9 06:45:44.887922 kernel: audit: type=1400 audit(1707461144.860:1375): avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.860000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4835 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:45.045170 kernel: audit: type=1300 audit(1707461144.860:1375): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4835 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:45.045226 kernel: audit: type=1327 audit(1707461144.860:1375): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633336337666663356332353765643337303731373337626336613165 Feb 9 06:45:44.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633336337666663356332353765643337303731373337626336613165 Feb 9 06:45:45.137874 kernel: audit: type=1400 audit(1707461144.860:1376): avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.860000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.200841 kernel: audit: type=1400 audit(1707461144.860:1376): avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.860000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.263921 kernel: audit: type=1400 audit(1707461144.860:1376): avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.860000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.326990 kernel: audit: type=1400 audit(1707461144.860:1376): avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.860000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.344904 env[1476]: time="2024-02-09T06:45:45.344878199Z" level=info msg="StartContainer for \"633c7ffc5c257ed37071737bc6a1e8ca0861a5e4e62258f8ef6157cf03d07225\" returns successfully" Feb 9 06:45:45.389650 kernel: audit: type=1400 audit(1707461144.860:1376): avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.860000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.452327 kernel: audit: type=1400 audit(1707461144.860:1376): avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.860000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.465207 sshd[5151]: Connection closed by invalid user test 141.98.11.11 port 47188 [preauth] Feb 9 06:45:45.465965 systemd[1]: sshd@12-86.109.11.101:22-141.98.11.11:47188.service: Deactivated successfully. Feb 9 06:45:45.514973 kernel: audit: type=1400 audit(1707461144.860:1376): avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.860000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.860000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.860000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.860000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.860000 audit: BPF prog-id=185 op=LOAD Feb 9 06:45:44.860000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000259be0 items=0 ppid=4835 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:44.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633336337666663356332353765643337303731373337626336613165 Feb 9 06:45:44.949000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.949000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.949000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.949000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.949000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.949000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.949000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.949000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.949000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:44.949000 audit: BPF prog-id=186 op=LOAD Feb 9 06:45:44.949000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000259c28 items=0 ppid=4835 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:44.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633336337666663356332353765643337303731373337626336613165 Feb 9 06:45:45.136000 audit: BPF prog-id=186 op=UNLOAD Feb 9 06:45:45.136000 audit: BPF prog-id=185 op=UNLOAD Feb 9 06:45:45.136000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.136000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.136000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.136000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.136000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.136000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.136000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.136000 audit[5374]: AVC avc: denied { perfmon } for pid=5374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.136000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.136000 audit[5374]: AVC avc: denied { bpf } for pid=5374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:45:45.136000 audit: BPF prog-id=187 op=LOAD Feb 9 06:45:45.136000 audit[5374]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000259cb8 items=0 ppid=4835 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:45:45.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633336337666663356332353765643337303731373337626336613165 Feb 9 06:45:45.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-86.109.11.101:22-141.98.11.11:47188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:45:59.332000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:59.361396 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 06:45:59.361435 kernel: audit: type=1400 audit(1707461159.332:1382): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:59.332000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c003d27ac0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:45:59.549744 kernel: audit: type=1300 audit(1707461159.332:1382): arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c003d27ac0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:45:59.549821 kernel: audit: type=1327 audit(1707461159.332:1382): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:45:59.332000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:45:59.642270 kernel: audit: type=1400 audit(1707461159.333:1383): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:59.333000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:59.731510 kernel: audit: type=1300 audit(1707461159.333:1383): arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0042d0960 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:45:59.333000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0042d0960 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:45:59.827879 kernel: audit: type=1327 audit(1707461159.333:1383): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:45:59.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:45:59.919044 kernel: audit: type=1400 audit(1707461159.333:1384): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:59.333000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:00.007681 kernel: audit: type=1300 audit(1707461159.333:1384): arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0042d09f0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:45:59.333000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0042d09f0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:46:00.106020 kernel: audit: type=1327 audit(1707461159.333:1384): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:45:59.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:46:00.200287 kernel: audit: type=1400 audit(1707461159.341:1385): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:59.341000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:59.341000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c003d27bc0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:45:59.341000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:45:59.341000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:59.341000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0096d8f60 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:45:59.341000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:45:59.342000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:59.342000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0109fe870 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:45:59.342000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:45:59.462000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:59.462000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010b6e40 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:45:59.462000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:45:59.462000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:45:59.462000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c9f020 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:45:59.462000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:46:02.518653 systemd[1]: Started sshd@13-86.109.11.101:22-195.87.80.171:40611.service. Feb 9 06:46:02.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-86.109.11.101:22-195.87.80.171:40611 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:46:03.484152 env[1476]: time="2024-02-09T06:46:03.484098747Z" level=info msg="StopPodSandbox for \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\"" Feb 9 06:46:03.525396 env[1476]: 2024-02-09 06:46:03.503 [WARNING][5504] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4e359e0e-c2df-4dde-a4d4-97d73ce2a314", ResourceVersion:"828", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3", Pod:"csi-node-driver-zhwmq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali401a32f1a69", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:46:03.525396 env[1476]: 2024-02-09 06:46:03.504 [INFO][5504] k8s.go 578: Cleaning up netns ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:46:03.525396 env[1476]: 2024-02-09 06:46:03.504 [INFO][5504] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" iface="eth0" netns="" Feb 9 06:46:03.525396 env[1476]: 2024-02-09 06:46:03.504 [INFO][5504] k8s.go 585: Releasing IP address(es) ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:46:03.525396 env[1476]: 2024-02-09 06:46:03.504 [INFO][5504] utils.go 188: Calico CNI releasing IP address ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:46:03.525396 env[1476]: 2024-02-09 06:46:03.516 [INFO][5516] ipam_plugin.go 415: Releasing address using handleID ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" HandleID="k8s-pod-network.eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:46:03.525396 env[1476]: 2024-02-09 06:46:03.516 [INFO][5516] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:46:03.525396 env[1476]: 2024-02-09 06:46:03.516 [INFO][5516] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:46:03.525396 env[1476]: 2024-02-09 06:46:03.522 [WARNING][5516] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" HandleID="k8s-pod-network.eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:46:03.525396 env[1476]: 2024-02-09 06:46:03.522 [INFO][5516] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" HandleID="k8s-pod-network.eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:46:03.525396 env[1476]: 2024-02-09 06:46:03.523 [INFO][5516] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:46:03.525396 env[1476]: 2024-02-09 06:46:03.524 [INFO][5504] k8s.go 591: Teardown processing complete. ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:46:03.525961 env[1476]: time="2024-02-09T06:46:03.525422976Z" level=info msg="TearDown network for sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\" successfully" Feb 9 06:46:03.525961 env[1476]: time="2024-02-09T06:46:03.525455336Z" level=info msg="StopPodSandbox for \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\" returns successfully" Feb 9 06:46:03.525961 env[1476]: time="2024-02-09T06:46:03.525877538Z" level=info msg="RemovePodSandbox for \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\"" Feb 9 06:46:03.525961 env[1476]: time="2024-02-09T06:46:03.525903628Z" level=info msg="Forcibly stopping sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\"" Feb 9 06:46:03.574210 env[1476]: 2024-02-09 06:46:03.550 [WARNING][5549] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4e359e0e-c2df-4dde-a4d4-97d73ce2a314", ResourceVersion:"828", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"d3382b01f539ebf6db3eac4f1f132ca3ccca081f8bf070678d16042bae326ec3", Pod:"csi-node-driver-zhwmq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.19.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali401a32f1a69", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:46:03.574210 env[1476]: 2024-02-09 06:46:03.550 [INFO][5549] k8s.go 578: Cleaning up netns ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:46:03.574210 env[1476]: 2024-02-09 06:46:03.550 [INFO][5549] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" iface="eth0" netns="" Feb 9 06:46:03.574210 env[1476]: 2024-02-09 06:46:03.550 [INFO][5549] k8s.go 585: Releasing IP address(es) ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:46:03.574210 env[1476]: 2024-02-09 06:46:03.550 [INFO][5549] utils.go 188: Calico CNI releasing IP address ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:46:03.574210 env[1476]: 2024-02-09 06:46:03.565 [INFO][5564] ipam_plugin.go 415: Releasing address using handleID ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" HandleID="k8s-pod-network.eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:46:03.574210 env[1476]: 2024-02-09 06:46:03.565 [INFO][5564] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:46:03.574210 env[1476]: 2024-02-09 06:46:03.565 [INFO][5564] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:46:03.574210 env[1476]: 2024-02-09 06:46:03.571 [WARNING][5564] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" HandleID="k8s-pod-network.eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:46:03.574210 env[1476]: 2024-02-09 06:46:03.571 [INFO][5564] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" HandleID="k8s-pod-network.eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-csi--node--driver--zhwmq-eth0" Feb 9 06:46:03.574210 env[1476]: 2024-02-09 06:46:03.572 [INFO][5564] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:46:03.574210 env[1476]: 2024-02-09 06:46:03.573 [INFO][5549] k8s.go 591: Teardown processing complete. ContainerID="eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7" Feb 9 06:46:03.574679 env[1476]: time="2024-02-09T06:46:03.574228703Z" level=info msg="TearDown network for sandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\" successfully" Feb 9 06:46:03.575983 env[1476]: time="2024-02-09T06:46:03.575964992Z" level=info msg="RemovePodSandbox \"eebebef5329c18d2e65d3ba2a332afd396595115325608272f87ac93190789c7\" returns successfully" Feb 9 06:46:03.576371 env[1476]: time="2024-02-09T06:46:03.576350480Z" level=info msg="StopPodSandbox for \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\"" Feb 9 06:46:03.629318 env[1476]: 2024-02-09 06:46:03.604 [WARNING][5596] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51", Pod:"coredns-5d78c9869d-gqwft", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.19.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8cfb98f88d0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:46:03.629318 env[1476]: 2024-02-09 06:46:03.604 [INFO][5596] k8s.go 578: Cleaning up netns ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:46:03.629318 env[1476]: 2024-02-09 06:46:03.604 [INFO][5596] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" iface="eth0" netns="" Feb 9 06:46:03.629318 env[1476]: 2024-02-09 06:46:03.604 [INFO][5596] k8s.go 585: Releasing IP address(es) ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:46:03.629318 env[1476]: 2024-02-09 06:46:03.605 [INFO][5596] utils.go 188: Calico CNI releasing IP address ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:46:03.629318 env[1476]: 2024-02-09 06:46:03.619 [INFO][5614] ipam_plugin.go 415: Releasing address using handleID ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" HandleID="k8s-pod-network.1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:46:03.629318 env[1476]: 2024-02-09 06:46:03.619 [INFO][5614] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:46:03.629318 env[1476]: 2024-02-09 06:46:03.619 [INFO][5614] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:46:03.629318 env[1476]: 2024-02-09 06:46:03.626 [WARNING][5614] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" HandleID="k8s-pod-network.1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:46:03.629318 env[1476]: 2024-02-09 06:46:03.626 [INFO][5614] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" HandleID="k8s-pod-network.1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:46:03.629318 env[1476]: 2024-02-09 06:46:03.627 [INFO][5614] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:46:03.629318 env[1476]: 2024-02-09 06:46:03.628 [INFO][5596] k8s.go 591: Teardown processing complete. ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:46:03.629954 env[1476]: time="2024-02-09T06:46:03.629370991Z" level=info msg="TearDown network for sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\" successfully" Feb 9 06:46:03.629954 env[1476]: time="2024-02-09T06:46:03.629406750Z" level=info msg="StopPodSandbox for \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\" returns successfully" Feb 9 06:46:03.629954 env[1476]: time="2024-02-09T06:46:03.629776834Z" level=info msg="RemovePodSandbox for \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\"" Feb 9 06:46:03.629954 env[1476]: time="2024-02-09T06:46:03.629807082Z" level=info msg="Forcibly stopping sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\"" Feb 9 06:46:03.687292 env[1476]: 2024-02-09 06:46:03.659 [WARNING][5641] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a835e77a-4b5c-42a8-ba3b-5aa36d07d9ac", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"e0f74749bec0ffbe7babbf660bb055ac4ded024c2bb7155ee6d5e304ce309e51", Pod:"coredns-5d78c9869d-gqwft", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.19.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8cfb98f88d0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:46:03.687292 env[1476]: 2024-02-09 06:46:03.659 [INFO][5641] k8s.go 578: Cleaning up netns ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:46:03.687292 env[1476]: 2024-02-09 06:46:03.659 [INFO][5641] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" iface="eth0" netns="" Feb 9 06:46:03.687292 env[1476]: 2024-02-09 06:46:03.659 [INFO][5641] k8s.go 585: Releasing IP address(es) ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:46:03.687292 env[1476]: 2024-02-09 06:46:03.659 [INFO][5641] utils.go 188: Calico CNI releasing IP address ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:46:03.687292 env[1476]: 2024-02-09 06:46:03.675 [INFO][5660] ipam_plugin.go 415: Releasing address using handleID ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" HandleID="k8s-pod-network.1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:46:03.687292 env[1476]: 2024-02-09 06:46:03.676 [INFO][5660] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:46:03.687292 env[1476]: 2024-02-09 06:46:03.676 [INFO][5660] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:46:03.687292 env[1476]: 2024-02-09 06:46:03.683 [WARNING][5660] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" HandleID="k8s-pod-network.1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:46:03.687292 env[1476]: 2024-02-09 06:46:03.683 [INFO][5660] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" HandleID="k8s-pod-network.1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--gqwft-eth0" Feb 9 06:46:03.687292 env[1476]: 2024-02-09 06:46:03.684 [INFO][5660] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:46:03.687292 env[1476]: 2024-02-09 06:46:03.686 [INFO][5641] k8s.go 591: Teardown processing complete. ContainerID="1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590" Feb 9 06:46:03.687975 env[1476]: time="2024-02-09T06:46:03.687282581Z" level=info msg="TearDown network for sandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\" successfully" Feb 9 06:46:03.689676 env[1476]: time="2024-02-09T06:46:03.689614708Z" level=info msg="RemovePodSandbox \"1f7b205d9eae399596e38af4af1e1e0a958a12ebb3a12f8fc6f22ee811085590\" returns successfully" Feb 9 06:46:03.690179 env[1476]: time="2024-02-09T06:46:03.690109750Z" level=info msg="StopPodSandbox for \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\"" Feb 9 06:46:03.766698 env[1476]: 2024-02-09 06:46:03.730 [WARNING][5688] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"506ab73f-4273-4187-a8f5-4370e58fdf8c", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76", Pod:"coredns-5d78c9869d-h5km6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.19.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2f0cd32a1f5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:46:03.766698 env[1476]: 2024-02-09 06:46:03.730 [INFO][5688] k8s.go 578: Cleaning up netns ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:46:03.766698 env[1476]: 2024-02-09 06:46:03.730 [INFO][5688] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" iface="eth0" netns="" Feb 9 06:46:03.766698 env[1476]: 2024-02-09 06:46:03.730 [INFO][5688] k8s.go 585: Releasing IP address(es) ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:46:03.766698 env[1476]: 2024-02-09 06:46:03.731 [INFO][5688] utils.go 188: Calico CNI releasing IP address ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:46:03.766698 env[1476]: 2024-02-09 06:46:03.754 [INFO][5706] ipam_plugin.go 415: Releasing address using handleID ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" HandleID="k8s-pod-network.b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:46:03.766698 env[1476]: 2024-02-09 06:46:03.754 [INFO][5706] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:46:03.766698 env[1476]: 2024-02-09 06:46:03.754 [INFO][5706] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:46:03.766698 env[1476]: 2024-02-09 06:46:03.762 [WARNING][5706] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" HandleID="k8s-pod-network.b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:46:03.766698 env[1476]: 2024-02-09 06:46:03.762 [INFO][5706] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" HandleID="k8s-pod-network.b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:46:03.766698 env[1476]: 2024-02-09 06:46:03.764 [INFO][5706] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:46:03.766698 env[1476]: 2024-02-09 06:46:03.765 [INFO][5688] k8s.go 591: Teardown processing complete. ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:46:03.766698 env[1476]: time="2024-02-09T06:46:03.766654951Z" level=info msg="TearDown network for sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\" successfully" Feb 9 06:46:03.766698 env[1476]: time="2024-02-09T06:46:03.766686036Z" level=info msg="StopPodSandbox for \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\" returns successfully" Feb 9 06:46:03.767416 env[1476]: time="2024-02-09T06:46:03.767121444Z" level=info msg="RemovePodSandbox for \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\"" Feb 9 06:46:03.767416 env[1476]: time="2024-02-09T06:46:03.767159082Z" level=info msg="Forcibly stopping sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\"" Feb 9 06:46:03.855907 env[1476]: 2024-02-09 06:46:03.802 [WARNING][5740] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"506ab73f-4273-4187-a8f5-4370e58fdf8c", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"32ec75221a257fd43c55cb8766d37647c917edbe61d6322eeae896edbccb4c76", Pod:"coredns-5d78c9869d-h5km6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.19.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2f0cd32a1f5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:46:03.855907 env[1476]: 2024-02-09 06:46:03.803 [INFO][5740] k8s.go 578: Cleaning up netns ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:46:03.855907 env[1476]: 2024-02-09 06:46:03.803 [INFO][5740] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" iface="eth0" netns="" Feb 9 06:46:03.855907 env[1476]: 2024-02-09 06:46:03.803 [INFO][5740] k8s.go 585: Releasing IP address(es) ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:46:03.855907 env[1476]: 2024-02-09 06:46:03.803 [INFO][5740] utils.go 188: Calico CNI releasing IP address ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:46:03.855907 env[1476]: 2024-02-09 06:46:03.844 [INFO][5757] ipam_plugin.go 415: Releasing address using handleID ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" HandleID="k8s-pod-network.b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:46:03.855907 env[1476]: 2024-02-09 06:46:03.844 [INFO][5757] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:46:03.855907 env[1476]: 2024-02-09 06:46:03.844 [INFO][5757] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:46:03.855907 env[1476]: 2024-02-09 06:46:03.852 [WARNING][5757] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" HandleID="k8s-pod-network.b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:46:03.855907 env[1476]: 2024-02-09 06:46:03.852 [INFO][5757] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" HandleID="k8s-pod-network.b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-coredns--5d78c9869d--h5km6-eth0" Feb 9 06:46:03.855907 env[1476]: 2024-02-09 06:46:03.854 [INFO][5757] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:46:03.855907 env[1476]: 2024-02-09 06:46:03.854 [INFO][5740] k8s.go 591: Teardown processing complete. ContainerID="b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d" Feb 9 06:46:03.856464 env[1476]: time="2024-02-09T06:46:03.855906753Z" level=info msg="TearDown network for sandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\" successfully" Feb 9 06:46:03.857910 env[1476]: time="2024-02-09T06:46:03.857882471Z" level=info msg="RemovePodSandbox \"b0488bca5fbaf55519776eefba76a184ae675440f27de07360165b85eece942d\" returns successfully" Feb 9 06:46:03.858270 env[1476]: time="2024-02-09T06:46:03.858244207Z" level=info msg="StopPodSandbox for \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\"" Feb 9 06:46:03.916234 env[1476]: 2024-02-09 06:46:03.886 [WARNING][5789] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0", GenerateName:"calico-kube-controllers-df7db6857-", Namespace:"calico-system", SelfLink:"", UID:"0287aba9-1afe-4105-a46e-fdb0cfcf2b59", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"df7db6857", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939", Pod:"calico-kube-controllers-df7db6857-58cff", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.19.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicd81e29767d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:46:03.916234 env[1476]: 2024-02-09 06:46:03.886 [INFO][5789] k8s.go 578: Cleaning up netns ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:46:03.916234 env[1476]: 2024-02-09 06:46:03.886 [INFO][5789] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" iface="eth0" netns="" Feb 9 06:46:03.916234 env[1476]: 2024-02-09 06:46:03.886 [INFO][5789] k8s.go 585: Releasing IP address(es) ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:46:03.916234 env[1476]: 2024-02-09 06:46:03.886 [INFO][5789] utils.go 188: Calico CNI releasing IP address ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:46:03.916234 env[1476]: 2024-02-09 06:46:03.901 [INFO][5806] ipam_plugin.go 415: Releasing address using handleID ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" HandleID="k8s-pod-network.022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:46:03.916234 env[1476]: 2024-02-09 06:46:03.901 [INFO][5806] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:46:03.916234 env[1476]: 2024-02-09 06:46:03.901 [INFO][5806] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:46:03.916234 env[1476]: 2024-02-09 06:46:03.907 [WARNING][5806] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" HandleID="k8s-pod-network.022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:46:03.916234 env[1476]: 2024-02-09 06:46:03.907 [INFO][5806] ipam_plugin.go 443: Releasing address using workloadID ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" HandleID="k8s-pod-network.022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:46:03.916234 env[1476]: 2024-02-09 06:46:03.910 [INFO][5806] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:46:03.916234 env[1476]: 2024-02-09 06:46:03.913 [INFO][5789] k8s.go 591: Teardown processing complete. ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:46:03.917675 env[1476]: time="2024-02-09T06:46:03.916303662Z" level=info msg="TearDown network for sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\" successfully" Feb 9 06:46:03.917675 env[1476]: time="2024-02-09T06:46:03.916371109Z" level=info msg="StopPodSandbox for \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\" returns successfully" Feb 9 06:46:03.917675 env[1476]: time="2024-02-09T06:46:03.917159474Z" level=info msg="RemovePodSandbox for \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\"" Feb 9 06:46:03.917675 env[1476]: time="2024-02-09T06:46:03.917234406Z" level=info msg="Forcibly stopping sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\"" Feb 9 06:46:04.009668 env[1476]: 2024-02-09 06:46:03.978 [WARNING][5837] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0", GenerateName:"calico-kube-controllers-df7db6857-", Namespace:"calico-system", SelfLink:"", UID:"0287aba9-1afe-4105-a46e-fdb0cfcf2b59", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 44, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"df7db6857", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-4a81ef77ce", ContainerID:"9350cf433652b2d3c8886f15c0d484d006110e9c7fd71bf4f139408122246939", Pod:"calico-kube-controllers-df7db6857-58cff", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.19.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicd81e29767d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:46:04.009668 env[1476]: 2024-02-09 06:46:03.978 [INFO][5837] k8s.go 578: Cleaning up netns ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:46:04.009668 env[1476]: 2024-02-09 06:46:03.978 [INFO][5837] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" iface="eth0" netns="" Feb 9 06:46:04.009668 env[1476]: 2024-02-09 06:46:03.978 [INFO][5837] k8s.go 585: Releasing IP address(es) ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:46:04.009668 env[1476]: 2024-02-09 06:46:03.978 [INFO][5837] utils.go 188: Calico CNI releasing IP address ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:46:04.009668 env[1476]: 2024-02-09 06:46:03.998 [INFO][5854] ipam_plugin.go 415: Releasing address using handleID ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" HandleID="k8s-pod-network.022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:46:04.009668 env[1476]: 2024-02-09 06:46:03.998 [INFO][5854] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:46:04.009668 env[1476]: 2024-02-09 06:46:03.998 [INFO][5854] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:46:04.009668 env[1476]: 2024-02-09 06:46:04.005 [WARNING][5854] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" HandleID="k8s-pod-network.022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:46:04.009668 env[1476]: 2024-02-09 06:46:04.005 [INFO][5854] ipam_plugin.go 443: Releasing address using workloadID ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" HandleID="k8s-pod-network.022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Workload="ci--3510.3.2--a--4a81ef77ce-k8s-calico--kube--controllers--df7db6857--58cff-eth0" Feb 9 06:46:04.009668 env[1476]: 2024-02-09 06:46:04.007 [INFO][5854] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:46:04.009668 env[1476]: 2024-02-09 06:46:04.008 [INFO][5837] k8s.go 591: Teardown processing complete. ContainerID="022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8" Feb 9 06:46:04.010416 env[1476]: time="2024-02-09T06:46:04.009694587Z" level=info msg="TearDown network for sandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\" successfully" Feb 9 06:46:04.012066 env[1476]: time="2024-02-09T06:46:04.012040574Z" level=info msg="RemovePodSandbox \"022e147c92f45b80686a2cde0a867cc33aed194b46f92601d69519cf1ac32ff8\" returns successfully" Feb 9 06:46:04.329760 sshd[5486]: Invalid user ingrid from 195.87.80.171 port 40611 Feb 9 06:46:04.335945 sshd[5486]: pam_faillock(sshd:auth): User unknown Feb 9 06:46:04.336909 sshd[5486]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:46:04.337048 sshd[5486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.87.80.171 Feb 9 06:46:04.338074 sshd[5486]: pam_faillock(sshd:auth): User unknown Feb 9 06:46:04.337000 audit[5486]: USER_AUTH pid=5486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ingrid" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:46:04.381840 kernel: kauditd_printk_skb: 15 callbacks suppressed Feb 9 06:46:04.381922 kernel: audit: type=1100 audit(1707461164.337:1391): pid=5486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ingrid" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:46:06.864351 sshd[5486]: Failed password for invalid user ingrid from 195.87.80.171 port 40611 ssh2 Feb 9 06:46:09.373750 sshd[5486]: Received disconnect from 195.87.80.171 port 40611:11: Bye Bye [preauth] Feb 9 06:46:09.373750 sshd[5486]: Disconnected from invalid user ingrid 195.87.80.171 port 40611 [preauth] Feb 9 06:46:09.376256 systemd[1]: sshd@13-86.109.11.101:22-195.87.80.171:40611.service: Deactivated successfully. Feb 9 06:46:09.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-86.109.11.101:22-195.87.80.171:40611 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:46:09.468271 kernel: audit: type=1131 audit(1707461169.376:1392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-86.109.11.101:22-195.87.80.171:40611 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:46:12.211000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:12.211000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001104520 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:46:12.425509 kernel: audit: type=1400 audit(1707461172.211:1393): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:12.425555 kernel: audit: type=1300 audit(1707461172.211:1393): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001104520 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:46:12.425575 kernel: audit: type=1327 audit(1707461172.211:1393): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:46:12.211000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:46:12.518722 kernel: audit: type=1400 audit(1707461172.211:1394): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:12.211000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:12.609164 kernel: audit: type=1300 audit(1707461172.211:1394): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001104560 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:46:12.211000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001104560 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:46:12.211000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:46:12.823621 kernel: audit: type=1327 audit(1707461172.211:1394): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:46:12.823667 kernel: audit: type=1400 audit(1707461172.213:1395): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:12.213000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:12.914130 kernel: audit: type=1300 audit(1707461172.213:1395): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000762ec0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:46:12.213000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000762ec0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:46:12.213000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:46:13.128539 kernel: audit: type=1327 audit(1707461172.213:1395): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:46:12.213000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:12.213000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001104580 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:46:12.213000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:46:35.963018 systemd[1]: Started sshd@14-86.109.11.101:22-159.223.148.156:56272.service. Feb 9 06:46:35.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-86.109.11.101:22-159.223.148.156:56272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:46:35.990331 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 06:46:35.990392 kernel: audit: type=1130 audit(1707461195.962:1397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-86.109.11.101:22-159.223.148.156:56272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:46:36.404052 sshd[5924]: Invalid user wms from 159.223.148.156 port 56272 Feb 9 06:46:36.410212 sshd[5924]: pam_faillock(sshd:auth): User unknown Feb 9 06:46:36.411238 sshd[5924]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:46:36.411328 sshd[5924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.148.156 Feb 9 06:46:36.412347 sshd[5924]: pam_faillock(sshd:auth): User unknown Feb 9 06:46:36.411000 audit[5924]: USER_AUTH pid=5924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="wms" exe="/usr/sbin/sshd" hostname=159.223.148.156 addr=159.223.148.156 terminal=ssh res=failed' Feb 9 06:46:36.509143 kernel: audit: type=1100 audit(1707461196.411:1398): pid=5924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="wms" exe="/usr/sbin/sshd" hostname=159.223.148.156 addr=159.223.148.156 terminal=ssh res=failed' Feb 9 06:46:38.329966 sshd[5924]: Failed password for invalid user wms from 159.223.148.156 port 56272 ssh2 Feb 9 06:46:39.552192 sshd[5924]: Received disconnect from 159.223.148.156 port 56272:11: Bye Bye [preauth] Feb 9 06:46:39.552192 sshd[5924]: Disconnected from invalid user wms 159.223.148.156 port 56272 [preauth] Feb 9 06:46:39.554695 systemd[1]: sshd@14-86.109.11.101:22-159.223.148.156:56272.service: Deactivated successfully. Feb 9 06:46:39.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-86.109.11.101:22-159.223.148.156:56272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:46:39.647278 kernel: audit: type=1131 audit(1707461199.554:1399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-86.109.11.101:22-159.223.148.156:56272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:46:59.333000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:59.333000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0098ea060 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:46:59.429093 kernel: audit: type=1400 audit(1707461219.333:1400): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:59.429181 kernel: audit: type=1300 audit(1707461219.333:1400): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0098ea060 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:46:59.333000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:46:59.622810 kernel: audit: type=1327 audit(1707461219.333:1400): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:46:59.622851 kernel: audit: type=1400 audit(1707461219.334:1401): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:59.334000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:59.334000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c008389d10 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:46:59.813156 kernel: audit: type=1300 audit(1707461219.334:1401): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c008389d10 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:46:59.813192 kernel: audit: type=1327 audit(1707461219.334:1401): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:46:59.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:46:59.906890 kernel: audit: type=1400 audit(1707461219.334:1402): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:59.334000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:59.997332 kernel: audit: type=1300 audit(1707461219.334:1402): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c015fc45c0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:46:59.334000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c015fc45c0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:47:00.095940 kernel: audit: type=1327 audit(1707461219.334:1402): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:46:59.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:47:00.189575 kernel: audit: type=1400 audit(1707461219.342:1403): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:59.342000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:59.342000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00b9da780 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:46:59.342000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:46:59.342000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:59.342000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00a101380 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:46:59.342000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:46:59.343000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:59.343000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00ad04000 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:46:59.343000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:46:59.459000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:59.459000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001765a00 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:46:59.459000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:46:59.463000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:46:59.463000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00128e9f0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:46:59.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:47:07.413259 systemd[1]: Started sshd@15-86.109.11.101:22-195.87.80.171:49809.service. Feb 9 06:47:07.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-86.109.11.101:22-195.87.80.171:49809 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:47:07.440423 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 06:47:07.440509 kernel: audit: type=1130 audit(1707461227.412:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-86.109.11.101:22-195.87.80.171:49809 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:47:11.582215 sshd[6025]: Invalid user bitwarden from 195.87.80.171 port 49809 Feb 9 06:47:11.588223 sshd[6025]: pam_faillock(sshd:auth): User unknown Feb 9 06:47:11.589370 sshd[6025]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:47:11.589461 sshd[6025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.87.80.171 Feb 9 06:47:11.590451 sshd[6025]: pam_faillock(sshd:auth): User unknown Feb 9 06:47:11.589000 audit[6025]: USER_AUTH pid=6025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bitwarden" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:47:11.682257 kernel: audit: type=1100 audit(1707461231.589:1409): pid=6025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bitwarden" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:47:12.213000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:12.213000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a29b20 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:47:12.427488 kernel: audit: type=1400 audit(1707461232.213:1410): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:12.427527 kernel: audit: type=1300 audit(1707461232.213:1410): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a29b20 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:47:12.427548 kernel: audit: type=1327 audit(1707461232.213:1410): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:47:12.213000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:47:12.213000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:12.613871 kernel: audit: type=1400 audit(1707461232.213:1411): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:12.613903 kernel: audit: type=1300 audit(1707461232.213:1411): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aa5d20 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:47:12.213000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aa5d20 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:47:12.736361 kernel: audit: type=1327 audit(1707461232.213:1411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:47:12.213000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:47:12.214000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:12.922018 kernel: audit: type=1400 audit(1707461232.214:1412): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:12.922078 kernel: audit: type=1300 audit(1707461232.214:1412): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aa5d40 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:47:12.214000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aa5d40 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:47:13.042931 kernel: audit: type=1327 audit(1707461232.214:1412): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:47:12.214000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:47:13.136628 kernel: audit: type=1400 audit(1707461232.214:1413): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:12.214000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:13.227249 kernel: audit: type=1300 audit(1707461232.214:1413): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001d11560 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:47:12.214000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001d11560 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:47:13.313174 sshd[6025]: Failed password for invalid user bitwarden from 195.87.80.171 port 49809 ssh2 Feb 9 06:47:13.348240 kernel: audit: type=1327 audit(1707461232.214:1413): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:47:12.214000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:47:14.272541 sshd[6025]: Received disconnect from 195.87.80.171 port 49809:11: Bye Bye [preauth] Feb 9 06:47:14.272541 sshd[6025]: Disconnected from invalid user bitwarden 195.87.80.171 port 49809 [preauth] Feb 9 06:47:14.274903 systemd[1]: sshd@15-86.109.11.101:22-195.87.80.171:49809.service: Deactivated successfully. Feb 9 06:47:14.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-86.109.11.101:22-195.87.80.171:49809 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:47:33.880514 systemd[1]: Started sshd@16-86.109.11.101:22-159.223.148.156:46700.service. Feb 9 06:47:33.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-86.109.11.101:22-159.223.148.156:46700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:47:33.907939 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:47:33.907978 kernel: audit: type=1130 audit(1707461253.879:1415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-86.109.11.101:22-159.223.148.156:46700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:47:34.339633 sshd[6081]: Invalid user emma from 159.223.148.156 port 46700 Feb 9 06:47:34.345824 sshd[6081]: pam_faillock(sshd:auth): User unknown Feb 9 06:47:34.346878 sshd[6081]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:47:34.346967 sshd[6081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.148.156 Feb 9 06:47:34.347911 sshd[6081]: pam_faillock(sshd:auth): User unknown Feb 9 06:47:34.347000 audit[6081]: USER_AUTH pid=6081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="emma" exe="/usr/sbin/sshd" hostname=159.223.148.156 addr=159.223.148.156 terminal=ssh res=failed' Feb 9 06:47:34.446287 kernel: audit: type=1100 audit(1707461254.347:1416): pid=6081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="emma" exe="/usr/sbin/sshd" hostname=159.223.148.156 addr=159.223.148.156 terminal=ssh res=failed' Feb 9 06:47:36.563271 sshd[6081]: Failed password for invalid user emma from 159.223.148.156 port 46700 ssh2 Feb 9 06:47:37.076426 sshd[6081]: Received disconnect from 159.223.148.156 port 46700:11: Bye Bye [preauth] Feb 9 06:47:37.076426 sshd[6081]: Disconnected from invalid user emma 159.223.148.156 port 46700 [preauth] Feb 9 06:47:37.078896 systemd[1]: sshd@16-86.109.11.101:22-159.223.148.156:46700.service: Deactivated successfully. Feb 9 06:47:37.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-86.109.11.101:22-159.223.148.156:46700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:47:37.172219 kernel: audit: type=1131 audit(1707461257.078:1417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-86.109.11.101:22-159.223.148.156:46700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:47:59.334000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:59.334000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c008b859e0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:47:59.530445 kernel: audit: type=1400 audit(1707461279.334:1418): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:59.530499 kernel: audit: type=1300 audit(1707461279.334:1418): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c008b859e0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:47:59.530516 kernel: audit: type=1327 audit(1707461279.334:1418): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:47:59.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:47:59.624322 kernel: audit: type=1400 audit(1707461279.334:1419): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:59.334000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:59.715931 kernel: audit: type=1300 audit(1707461279.334:1419): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c008312480 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:47:59.334000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c008312480 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:47:59.814661 kernel: audit: type=1327 audit(1707461279.334:1419): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:47:59.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:47:59.908447 kernel: audit: type=1400 audit(1707461279.334:1420): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:59.334000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:59.334000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01543e3c0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:48:00.097741 kernel: audit: type=1300 audit(1707461279.334:1420): arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01543e3c0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:48:00.097773 kernel: audit: type=1327 audit(1707461279.334:1420): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:47:59.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:48:00.191415 kernel: audit: type=1400 audit(1707461279.343:1421): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:59.343000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:59.343000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0098518f0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:47:59.343000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:47:59.343000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:59.343000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c014dec140 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:47:59.343000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:47:59.343000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:59.343000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00a43cf90 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:47:59.343000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:47:59.463000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:59.463000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0018d2400 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:47:59.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:47:59.463000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:47:59.463000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002f8f170 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:47:59.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:48:10.491038 systemd[1]: Started sshd@17-86.109.11.101:22-195.87.80.171:59006.service. Feb 9 06:48:10.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-86.109.11.101:22-195.87.80.171:59006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:10.518589 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 06:48:10.518658 kernel: audit: type=1130 audit(1707461290.490:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-86.109.11.101:22-195.87.80.171:59006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:12.212000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:12.212000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001295f00 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:48:12.425326 kernel: audit: type=1400 audit(1707461292.212:1427): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:12.425362 kernel: audit: type=1300 audit(1707461292.212:1427): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001295f00 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:48:12.425379 kernel: audit: type=1327 audit(1707461292.212:1427): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:48:12.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:48:12.438778 sshd[6164]: Invalid user whatsapp from 195.87.80.171 port 59006 Feb 9 06:48:12.439925 sshd[6164]: pam_faillock(sshd:auth): User unknown Feb 9 06:48:12.440197 sshd[6164]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:48:12.440216 sshd[6164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.87.80.171 Feb 9 06:48:12.440417 sshd[6164]: pam_faillock(sshd:auth): User unknown Feb 9 06:48:12.518882 kernel: audit: type=1400 audit(1707461292.212:1428): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:12.212000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:12.609522 kernel: audit: type=1300 audit(1707461292.212:1428): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000ac65c0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:48:12.212000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000ac65c0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:48:12.730327 kernel: audit: type=1327 audit(1707461292.212:1428): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:48:12.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:48:12.823812 kernel: audit: type=1400 audit(1707461292.214:1429): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:12.214000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:12.914355 kernel: audit: type=1300 audit(1707461292.214:1429): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c7fd60 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:48:12.214000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c7fd60 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:48:13.035165 kernel: audit: type=1327 audit(1707461292.214:1429): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:48:12.214000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:48:12.214000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:12.214000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ac65e0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:48:12.214000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:48:12.439000 audit[6164]: USER_AUTH pid=6164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="whatsapp" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:48:14.208698 sshd[6164]: Failed password for invalid user whatsapp from 195.87.80.171 port 59006 ssh2 Feb 9 06:48:15.058591 sshd[6164]: Received disconnect from 195.87.80.171 port 59006:11: Bye Bye [preauth] Feb 9 06:48:15.058591 sshd[6164]: Disconnected from invalid user whatsapp 195.87.80.171 port 59006 [preauth] Feb 9 06:48:15.061257 systemd[1]: sshd@17-86.109.11.101:22-195.87.80.171:59006.service: Deactivated successfully. Feb 9 06:48:15.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-86.109.11.101:22-195.87.80.171:59006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:59.334000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:59.368748 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 9 06:48:59.368842 kernel: audit: type=1400 audit(1707461339.334:1433): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:59.334000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c009b53830 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:48:59.558838 kernel: audit: type=1300 audit(1707461339.334:1433): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c009b53830 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:48:59.558883 kernel: audit: type=1327 audit(1707461339.334:1433): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:48:59.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:48:59.651576 kernel: audit: type=1400 audit(1707461339.334:1434): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:59.334000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:59.742169 kernel: audit: type=1300 audit(1707461339.334:1434): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a10f080 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:48:59.334000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a10f080 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:48:59.840818 kernel: audit: type=1327 audit(1707461339.334:1434): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:48:59.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:48:59.934418 kernel: audit: type=1400 audit(1707461339.334:1435): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:59.334000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:00.024717 kernel: audit: type=1300 audit(1707461339.334:1435): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c009f66e60 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:48:59.334000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c009f66e60 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:49:00.123171 kernel: audit: type=1327 audit(1707461339.334:1435): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:48:59.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:49:00.216836 kernel: audit: type=1400 audit(1707461339.343:1436): avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:59.343000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:59.343000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00dd66000 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:48:59.343000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:48:59.343000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:59.343000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c009b53920 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:48:59.343000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:48:59.343000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:59.343000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0001f0d20 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:48:59.343000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:48:59.464000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:59.464000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023160f0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:48:59.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:48:59.464000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:48:59.464000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002f124a0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:48:59.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:49:09.918238 systemd[1]: Started sshd@18-86.109.11.101:22-195.87.80.171:11699.service. Feb 9 06:49:09.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-86.109.11.101:22-195.87.80.171:11699 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:09.945806 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 06:49:09.945893 kernel: audit: type=1130 audit(1707461349.918:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-86.109.11.101:22-195.87.80.171:11699 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.213000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:12.213000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000945900 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:49:12.427179 kernel: audit: type=1400 audit(1707461352.213:1442): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:12.427283 kernel: audit: type=1300 audit(1707461352.213:1442): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000945900 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:49:12.427317 kernel: audit: type=1327 audit(1707461352.213:1442): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:49:12.213000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:49:12.213000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:12.610178 kernel: audit: type=1400 audit(1707461352.213:1443): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:12.610228 kernel: audit: type=1300 audit(1707461352.213:1443): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000945920 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:49:12.213000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000945920 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:49:12.213000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:49:12.824452 kernel: audit: type=1327 audit(1707461352.213:1443): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:49:12.824490 kernel: audit: type=1400 audit(1707461352.215:1444): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:12.215000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:12.914910 kernel: audit: type=1300 audit(1707461352.215:1444): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000945940 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:49:12.215000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000945940 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:49:13.035716 kernel: audit: type=1327 audit(1707461352.215:1444): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:49:12.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:49:12.215000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:12.215000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ac6600 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:49:12.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:49:14.130745 sshd[6308]: Invalid user jang from 195.87.80.171 port 11699 Feb 9 06:49:14.137192 sshd[6308]: pam_faillock(sshd:auth): User unknown Feb 9 06:49:14.138349 sshd[6308]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:49:14.138440 sshd[6308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.87.80.171 Feb 9 06:49:14.139443 sshd[6308]: pam_faillock(sshd:auth): User unknown Feb 9 06:49:14.138000 audit[6308]: USER_AUTH pid=6308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jang" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:49:15.416263 sshd[6308]: Failed password for invalid user jang from 195.87.80.171 port 11699 ssh2 Feb 9 06:49:15.807482 sshd[6308]: Received disconnect from 195.87.80.171 port 11699:11: Bye Bye [preauth] Feb 9 06:49:15.807482 sshd[6308]: Disconnected from invalid user jang 195.87.80.171 port 11699 [preauth] Feb 9 06:49:15.810036 systemd[1]: sshd@18-86.109.11.101:22-195.87.80.171:11699.service: Deactivated successfully. Feb 9 06:49:15.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-86.109.11.101:22-195.87.80.171:11699 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:15.837885 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 9 06:49:15.837946 kernel: audit: type=1131 audit(1707461355.809:1447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-86.109.11.101:22-195.87.80.171:11699 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:50.647697 systemd[1]: Started sshd@19-86.109.11.101:22-147.75.109.163:39972.service. Feb 9 06:49:50.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-86.109.11.101:22-147.75.109.163:39972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:50.742099 kernel: audit: type=1130 audit(1707461390.647:1448): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-86.109.11.101:22-147.75.109.163:39972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:50.764558 sshd[6371]: Accepted publickey for core from 147.75.109.163 port 39972 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:49:50.763000 audit[6371]: USER_ACCT pid=6371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:50.766192 sshd[6371]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:49:50.768501 systemd-logind[1464]: New session 10 of user core. Feb 9 06:49:50.769195 systemd[1]: Started session-10.scope. Feb 9 06:49:50.853369 sshd[6371]: pam_unix(sshd:session): session closed for user core Feb 9 06:49:50.854782 systemd[1]: sshd@19-86.109.11.101:22-147.75.109.163:39972.service: Deactivated successfully. Feb 9 06:49:50.855227 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 06:49:50.855585 systemd-logind[1464]: Session 10 logged out. Waiting for processes to exit. Feb 9 06:49:50.855993 systemd-logind[1464]: Removed session 10. Feb 9 06:49:50.764000 audit[6371]: CRED_ACQ pid=6371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:50.947650 kernel: audit: type=1101 audit(1707461390.763:1449): pid=6371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:50.947688 kernel: audit: type=1103 audit(1707461390.764:1450): pid=6371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:50.947704 kernel: audit: type=1006 audit(1707461390.764:1451): pid=6371 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 06:49:51.007005 kernel: audit: type=1300 audit(1707461390.764:1451): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7440e630 a2=3 a3=0 items=0 ppid=1 pid=6371 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:50.764000 audit[6371]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7440e630 a2=3 a3=0 items=0 ppid=1 pid=6371 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:51.100262 kernel: audit: type=1327 audit(1707461390.764:1451): proctitle=737368643A20636F7265205B707269765D Feb 9 06:49:50.764000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:49:50.770000 audit[6371]: USER_START pid=6371 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:51.227022 kernel: audit: type=1105 audit(1707461390.770:1452): pid=6371 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:51.227118 kernel: audit: type=1103 audit(1707461390.770:1453): pid=6373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:50.770000 audit[6373]: CRED_ACQ pid=6373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:50.852000 audit[6371]: USER_END pid=6371 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:51.412800 kernel: audit: type=1106 audit(1707461390.852:1454): pid=6371 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:51.412843 kernel: audit: type=1104 audit(1707461390.853:1455): pid=6371 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:50.853000 audit[6371]: CRED_DISP pid=6371 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:50.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-86.109.11.101:22-147.75.109.163:39972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:54.270368 update_engine[1466]: I0209 06:49:54.270251 1466 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 06:49:54.270368 update_engine[1466]: I0209 06:49:54.270330 1466 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 06:49:54.272186 update_engine[1466]: I0209 06:49:54.272130 1466 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 06:49:54.273072 update_engine[1466]: I0209 06:49:54.272994 1466 omaha_request_params.cc:62] Current group set to lts Feb 9 06:49:54.273351 update_engine[1466]: I0209 06:49:54.273301 1466 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 06:49:54.273351 update_engine[1466]: I0209 06:49:54.273324 1466 update_attempter.cc:643] Scheduling an action processor start. Feb 9 06:49:54.273351 update_engine[1466]: I0209 06:49:54.273355 1466 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 06:49:54.273667 update_engine[1466]: I0209 06:49:54.273423 1466 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 06:49:54.273667 update_engine[1466]: I0209 06:49:54.273576 1466 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 06:49:54.273667 update_engine[1466]: I0209 06:49:54.273591 1466 omaha_request_action.cc:271] Request: Feb 9 06:49:54.273667 update_engine[1466]: Feb 9 06:49:54.273667 update_engine[1466]: Feb 9 06:49:54.273667 update_engine[1466]: Feb 9 06:49:54.273667 update_engine[1466]: Feb 9 06:49:54.273667 update_engine[1466]: Feb 9 06:49:54.273667 update_engine[1466]: Feb 9 06:49:54.273667 update_engine[1466]: Feb 9 06:49:54.273667 update_engine[1466]: Feb 9 06:49:54.273667 update_engine[1466]: I0209 06:49:54.273602 1466 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 06:49:54.274772 locksmithd[1509]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 06:49:54.276722 update_engine[1466]: I0209 06:49:54.276640 1466 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 06:49:54.276930 update_engine[1466]: E0209 06:49:54.276868 1466 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 06:49:54.277056 update_engine[1466]: I0209 06:49:54.277026 1466 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 06:49:55.866424 systemd[1]: Started sshd@20-86.109.11.101:22-147.75.109.163:58064.service. Feb 9 06:49:55.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-86.109.11.101:22-147.75.109.163:58064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:55.893795 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:49:55.893873 kernel: audit: type=1130 audit(1707461395.866:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-86.109.11.101:22-147.75.109.163:58064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:56.006000 audit[6399]: USER_ACCT pid=6399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:56.006571 sshd[6399]: Accepted publickey for core from 147.75.109.163 port 58064 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:49:56.007345 sshd[6399]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:49:56.009678 systemd-logind[1464]: New session 11 of user core. Feb 9 06:49:56.010219 systemd[1]: Started session-11.scope. Feb 9 06:49:56.090617 sshd[6399]: pam_unix(sshd:session): session closed for user core Feb 9 06:49:56.092000 systemd[1]: sshd@20-86.109.11.101:22-147.75.109.163:58064.service: Deactivated successfully. Feb 9 06:49:56.092439 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 06:49:56.092722 systemd-logind[1464]: Session 11 logged out. Waiting for processes to exit. Feb 9 06:49:56.093112 systemd-logind[1464]: Removed session 11. Feb 9 06:49:56.007000 audit[6399]: CRED_ACQ pid=6399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:56.190162 kernel: audit: type=1101 audit(1707461396.006:1458): pid=6399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:56.190208 kernel: audit: type=1103 audit(1707461396.007:1459): pid=6399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:56.190225 kernel: audit: type=1006 audit(1707461396.007:1460): pid=6399 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 06:49:56.248685 kernel: audit: type=1300 audit(1707461396.007:1460): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc460c6f50 a2=3 a3=0 items=0 ppid=1 pid=6399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:56.007000 audit[6399]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc460c6f50 a2=3 a3=0 items=0 ppid=1 pid=6399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:56.340617 kernel: audit: type=1327 audit(1707461396.007:1460): proctitle=737368643A20636F7265205B707269765D Feb 9 06:49:56.007000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:49:56.371171 kernel: audit: type=1105 audit(1707461396.012:1461): pid=6399 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:56.012000 audit[6399]: USER_START pid=6399 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:56.466592 kernel: audit: type=1103 audit(1707461396.012:1462): pid=6401 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:56.012000 audit[6401]: CRED_ACQ pid=6401 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:56.555900 kernel: audit: type=1106 audit(1707461396.091:1463): pid=6399 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:56.091000 audit[6399]: USER_END pid=6399 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:56.651444 kernel: audit: type=1104 audit(1707461396.091:1464): pid=6399 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:56.091000 audit[6399]: CRED_DISP pid=6399 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:56.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-86.109.11.101:22-147.75.109.163:58064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:59.335000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:59.335000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c003844ed0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:49:59.335000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:49:59.335000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:59.335000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:59.335000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c008f24930 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:49:59.335000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:49:59.335000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0127ec400 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:49:59.335000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:49:59.343000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:59.343000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0038451a0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:49:59.343000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:49:59.344000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:59.344000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0127ec420 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:49:59.344000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:49:59.344000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:59.344000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00836b710 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:49:59.344000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:49:59.465000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:59.465000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014a7e30 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:49:59.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:49:59.465000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:49:59.465000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001295660 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:49:59.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:50:01.095393 systemd[1]: Started sshd@21-86.109.11.101:22-147.75.109.163:58066.service. Feb 9 06:50:01.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-86.109.11.101:22-147.75.109.163:58066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:01.121975 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 06:50:01.122027 kernel: audit: type=1130 audit(1707461401.094:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-86.109.11.101:22-147.75.109.163:58066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:01.232000 audit[6473]: USER_ACCT pid=6473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:01.233586 sshd[6473]: Accepted publickey for core from 147.75.109.163 port 58066 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:01.234840 sshd[6473]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:01.237123 systemd-logind[1464]: New session 12 of user core. Feb 9 06:50:01.237734 systemd[1]: Started session-12.scope. Feb 9 06:50:01.316405 sshd[6473]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:01.317752 systemd[1]: sshd@21-86.109.11.101:22-147.75.109.163:58066.service: Deactivated successfully. Feb 9 06:50:01.318199 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 06:50:01.318584 systemd-logind[1464]: Session 12 logged out. Waiting for processes to exit. Feb 9 06:50:01.318971 systemd-logind[1464]: Removed session 12. Feb 9 06:50:01.233000 audit[6473]: CRED_ACQ pid=6473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:01.415447 kernel: audit: type=1101 audit(1707461401.232:1475): pid=6473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:01.415488 kernel: audit: type=1103 audit(1707461401.233:1476): pid=6473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:01.415505 kernel: audit: type=1006 audit(1707461401.233:1477): pid=6473 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 06:50:01.474079 kernel: audit: type=1300 audit(1707461401.233:1477): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca64d9010 a2=3 a3=0 items=0 ppid=1 pid=6473 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:01.233000 audit[6473]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca64d9010 a2=3 a3=0 items=0 ppid=1 pid=6473 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:01.566147 kernel: audit: type=1327 audit(1707461401.233:1477): proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:01.233000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:01.596631 kernel: audit: type=1105 audit(1707461401.238:1478): pid=6473 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:01.238000 audit[6473]: USER_START pid=6473 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:01.691192 kernel: audit: type=1103 audit(1707461401.239:1479): pid=6475 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:01.239000 audit[6475]: CRED_ACQ pid=6475 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:01.780584 kernel: audit: type=1106 audit(1707461401.315:1480): pid=6473 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:01.315000 audit[6473]: USER_END pid=6473 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:01.315000 audit[6473]: CRED_DISP pid=6473 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:01.965558 kernel: audit: type=1104 audit(1707461401.315:1481): pid=6473 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:01.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-86.109.11.101:22-147.75.109.163:58066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:04.273200 update_engine[1466]: I0209 06:50:04.273056 1466 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 06:50:04.274012 update_engine[1466]: I0209 06:50:04.273540 1466 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 06:50:04.274012 update_engine[1466]: E0209 06:50:04.273744 1466 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 06:50:04.274012 update_engine[1466]: I0209 06:50:04.273918 1466 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 06:50:06.327124 systemd[1]: Started sshd@22-86.109.11.101:22-147.75.109.163:44518.service. Feb 9 06:50:06.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-86.109.11.101:22-147.75.109.163:44518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:06.354091 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:50:06.354169 kernel: audit: type=1130 audit(1707461406.326:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-86.109.11.101:22-147.75.109.163:44518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:06.465000 audit[6534]: USER_ACCT pid=6534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:06.467263 sshd[6534]: Accepted publickey for core from 147.75.109.163 port 44518 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:06.468419 sshd[6534]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:06.470964 systemd-logind[1464]: New session 13 of user core. Feb 9 06:50:06.471667 systemd[1]: Started session-13.scope. Feb 9 06:50:06.467000 audit[6534]: CRED_ACQ pid=6534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:06.562559 sshd[6534]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:06.563860 systemd[1]: sshd@22-86.109.11.101:22-147.75.109.163:44518.service: Deactivated successfully. Feb 9 06:50:06.564308 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 06:50:06.564673 systemd-logind[1464]: Session 13 logged out. Waiting for processes to exit. Feb 9 06:50:06.565071 systemd-logind[1464]: Removed session 13. Feb 9 06:50:06.649070 kernel: audit: type=1101 audit(1707461406.465:1484): pid=6534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:06.649120 kernel: audit: type=1103 audit(1707461406.467:1485): pid=6534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:06.649139 kernel: audit: type=1006 audit(1707461406.467:1486): pid=6534 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 06:50:06.707753 kernel: audit: type=1300 audit(1707461406.467:1486): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc17e630a0 a2=3 a3=0 items=0 ppid=1 pid=6534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:06.467000 audit[6534]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc17e630a0 a2=3 a3=0 items=0 ppid=1 pid=6534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:06.799811 kernel: audit: type=1327 audit(1707461406.467:1486): proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:06.467000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:06.830367 kernel: audit: type=1105 audit(1707461406.472:1487): pid=6534 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:06.472000 audit[6534]: USER_START pid=6534 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:06.473000 audit[6536]: CRED_ACQ pid=6536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:07.014270 kernel: audit: type=1103 audit(1707461406.473:1488): pid=6536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:07.014304 kernel: audit: type=1106 audit(1707461406.562:1489): pid=6534 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:06.562000 audit[6534]: USER_END pid=6534 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:07.109859 kernel: audit: type=1104 audit(1707461406.562:1490): pid=6534 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:06.562000 audit[6534]: CRED_DISP pid=6534 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:06.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-86.109.11.101:22-147.75.109.163:44518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:10.176510 systemd[1]: Started sshd@23-86.109.11.101:22-195.87.80.171:20896.service. Feb 9 06:50:10.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-86.109.11.101:22-195.87.80.171:20896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:11.193216 sshd[6559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.87.80.171 user=root Feb 9 06:50:11.192000 audit[6559]: USER_AUTH pid=6559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:50:11.573159 systemd[1]: Started sshd@24-86.109.11.101:22-147.75.109.163:44530.service. Feb 9 06:50:11.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-86.109.11.101:22-147.75.109.163:44530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:11.600102 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 06:50:11.600262 kernel: audit: type=1130 audit(1707461411.572:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-86.109.11.101:22-147.75.109.163:44530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:11.622510 sshd[6562]: Accepted publickey for core from 147.75.109.163 port 44530 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:11.624400 sshd[6562]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:11.626743 systemd-logind[1464]: New session 14 of user core. Feb 9 06:50:11.627528 systemd[1]: Started session-14.scope. Feb 9 06:50:11.621000 audit[6562]: USER_ACCT pid=6562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:11.707816 sshd[6562]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:11.709165 systemd[1]: sshd@24-86.109.11.101:22-147.75.109.163:44530.service: Deactivated successfully. Feb 9 06:50:11.709612 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 06:50:11.709929 systemd-logind[1464]: Session 14 logged out. Waiting for processes to exit. Feb 9 06:50:11.710410 systemd-logind[1464]: Removed session 14. Feb 9 06:50:11.782067 kernel: audit: type=1101 audit(1707461411.621:1495): pid=6562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:11.782118 kernel: audit: type=1103 audit(1707461411.623:1496): pid=6562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:11.623000 audit[6562]: CRED_ACQ pid=6562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:11.931321 kernel: audit: type=1006 audit(1707461411.623:1497): pid=6562 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 06:50:11.931358 kernel: audit: type=1300 audit(1707461411.623:1497): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb5d2bd00 a2=3 a3=0 items=0 ppid=1 pid=6562 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:11.623000 audit[6562]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb5d2bd00 a2=3 a3=0 items=0 ppid=1 pid=6562 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:11.623000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:12.024155 kernel: audit: type=1327 audit(1707461411.623:1497): proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:11.628000 audit[6562]: USER_START pid=6562 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:12.148552 kernel: audit: type=1105 audit(1707461411.628:1498): pid=6562 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:12.148617 kernel: audit: type=1103 audit(1707461411.629:1499): pid=6564 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:11.629000 audit[6564]: CRED_ACQ pid=6564 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:11.707000 audit[6562]: USER_END pid=6562 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:12.333513 kernel: audit: type=1106 audit(1707461411.707:1500): pid=6562 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:12.333564 kernel: audit: type=1104 audit(1707461411.707:1501): pid=6562 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:11.707000 audit[6562]: CRED_DISP pid=6562 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:11.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-86.109.11.101:22-147.75.109.163:44530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:12.214000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:50:12.214000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b9b760 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:50:12.214000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:50:12.214000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:50:12.214000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002db7980 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:50:12.214000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:50:12.215000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:50:12.215000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d11540 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:50:12.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:50:12.215000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:50:12.215000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001104d60 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:50:12.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:50:13.297669 sshd[6559]: Failed password for root from 195.87.80.171 port 20896 ssh2 Feb 9 06:50:14.271504 update_engine[1466]: I0209 06:50:14.271378 1466 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 06:50:14.272343 update_engine[1466]: I0209 06:50:14.271845 1466 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 06:50:14.272343 update_engine[1466]: E0209 06:50:14.272045 1466 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 06:50:14.272343 update_engine[1466]: I0209 06:50:14.272255 1466 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 06:50:15.208506 sshd[6559]: Received disconnect from 195.87.80.171 port 20896:11: Bye Bye [preauth] Feb 9 06:50:15.208506 sshd[6559]: Disconnected from authenticating user root 195.87.80.171 port 20896 [preauth] Feb 9 06:50:15.211038 systemd[1]: sshd@23-86.109.11.101:22-195.87.80.171:20896.service: Deactivated successfully. Feb 9 06:50:15.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-86.109.11.101:22-195.87.80.171:20896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:16.717331 systemd[1]: Started sshd@25-86.109.11.101:22-147.75.109.163:53510.service. Feb 9 06:50:16.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-86.109.11.101:22-147.75.109.163:53510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:16.744483 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 06:50:16.744590 kernel: audit: type=1130 audit(1707461416.716:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-86.109.11.101:22-147.75.109.163:53510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:16.855806 sshd[6590]: Accepted publickey for core from 147.75.109.163 port 53510 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:16.854000 audit[6590]: USER_ACCT pid=6590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:16.859381 sshd[6590]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:16.861703 systemd-logind[1464]: New session 15 of user core. Feb 9 06:50:16.862388 systemd[1]: Started session-15.scope. Feb 9 06:50:16.858000 audit[6590]: CRED_ACQ pid=6590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:17.037822 kernel: audit: type=1101 audit(1707461416.854:1509): pid=6590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:17.037892 kernel: audit: type=1103 audit(1707461416.858:1510): pid=6590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:17.037910 kernel: audit: type=1006 audit(1707461416.858:1511): pid=6590 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 06:50:16.858000 audit[6590]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe5161640 a2=3 a3=0 items=0 ppid=1 pid=6590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:17.188618 kernel: audit: type=1300 audit(1707461416.858:1511): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe5161640 a2=3 a3=0 items=0 ppid=1 pid=6590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:17.188700 kernel: audit: type=1327 audit(1707461416.858:1511): proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:16.858000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:17.188904 sshd[6590]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:17.190300 systemd[1]: sshd@25-86.109.11.101:22-147.75.109.163:53510.service: Deactivated successfully. Feb 9 06:50:17.190836 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 06:50:17.191113 systemd-logind[1464]: Session 15 logged out. Waiting for processes to exit. Feb 9 06:50:17.191564 systemd-logind[1464]: Removed session 15. Feb 9 06:50:16.863000 audit[6590]: USER_START pid=6590 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:17.313785 kernel: audit: type=1105 audit(1707461416.863:1512): pid=6590 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:17.313836 kernel: audit: type=1103 audit(1707461416.864:1513): pid=6592 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:16.864000 audit[6592]: CRED_ACQ pid=6592 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:17.403127 kernel: audit: type=1106 audit(1707461417.188:1514): pid=6590 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:17.188000 audit[6590]: USER_END pid=6590 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:17.188000 audit[6590]: CRED_DISP pid=6590 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:17.588019 kernel: audit: type=1104 audit(1707461417.188:1515): pid=6590 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:17.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-86.109.11.101:22-147.75.109.163:53510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:22.144708 systemd[1]: Started sshd@26-86.109.11.101:22-147.75.109.163:53512.service. Feb 9 06:50:22.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-86.109.11.101:22-147.75.109.163:53512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:22.171872 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:50:22.171939 kernel: audit: type=1130 audit(1707461422.143:1517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-86.109.11.101:22-147.75.109.163:53512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:22.284000 audit[6618]: USER_ACCT pid=6618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:22.285435 sshd[6618]: Accepted publickey for core from 147.75.109.163 port 53512 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:22.287405 sshd[6618]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:22.289811 systemd-logind[1464]: New session 16 of user core. Feb 9 06:50:22.290254 systemd[1]: Started session-16.scope. Feb 9 06:50:22.286000 audit[6618]: CRED_ACQ pid=6618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:22.467299 kernel: audit: type=1101 audit(1707461422.284:1518): pid=6618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:22.467343 kernel: audit: type=1103 audit(1707461422.286:1519): pid=6618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:22.467361 kernel: audit: type=1006 audit(1707461422.286:1520): pid=6618 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 06:50:22.502922 sshd[6618]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:22.504643 systemd[1]: sshd@26-86.109.11.101:22-147.75.109.163:53512.service: Deactivated successfully. Feb 9 06:50:22.505434 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 06:50:22.505984 systemd-logind[1464]: Session 16 logged out. Waiting for processes to exit. Feb 9 06:50:22.506658 systemd-logind[1464]: Removed session 16. Feb 9 06:50:22.286000 audit[6618]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3853bb20 a2=3 a3=0 items=0 ppid=1 pid=6618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:22.526175 kernel: audit: type=1300 audit(1707461422.286:1520): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3853bb20 a2=3 a3=0 items=0 ppid=1 pid=6618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:22.286000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:22.648499 kernel: audit: type=1327 audit(1707461422.286:1520): proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:22.648529 kernel: audit: type=1105 audit(1707461422.291:1521): pid=6618 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:22.291000 audit[6618]: USER_START pid=6618 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:22.743102 kernel: audit: type=1103 audit(1707461422.291:1522): pid=6620 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:22.291000 audit[6620]: CRED_ACQ pid=6620 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:22.502000 audit[6618]: USER_END pid=6618 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:22.927981 kernel: audit: type=1106 audit(1707461422.502:1523): pid=6618 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:22.928046 kernel: audit: type=1104 audit(1707461422.502:1524): pid=6618 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:22.502000 audit[6618]: CRED_DISP pid=6618 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:22.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-86.109.11.101:22-147.75.109.163:53512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:24.271827 update_engine[1466]: I0209 06:50:24.271697 1466 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 06:50:24.272693 update_engine[1466]: I0209 06:50:24.272233 1466 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 06:50:24.272693 update_engine[1466]: E0209 06:50:24.272440 1466 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 06:50:24.272693 update_engine[1466]: I0209 06:50:24.272596 1466 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 06:50:24.272693 update_engine[1466]: I0209 06:50:24.272611 1466 omaha_request_action.cc:621] Omaha request response: Feb 9 06:50:24.273111 update_engine[1466]: E0209 06:50:24.272756 1466 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 06:50:24.273111 update_engine[1466]: I0209 06:50:24.272783 1466 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 06:50:24.273111 update_engine[1466]: I0209 06:50:24.272792 1466 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 06:50:24.273111 update_engine[1466]: I0209 06:50:24.272800 1466 update_attempter.cc:306] Processing Done. Feb 9 06:50:24.273111 update_engine[1466]: E0209 06:50:24.272826 1466 update_attempter.cc:619] Update failed. Feb 9 06:50:24.273111 update_engine[1466]: I0209 06:50:24.272836 1466 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 06:50:24.273111 update_engine[1466]: I0209 06:50:24.272845 1466 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 06:50:24.273111 update_engine[1466]: I0209 06:50:24.272854 1466 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 06:50:24.273111 update_engine[1466]: I0209 06:50:24.273006 1466 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 06:50:24.273111 update_engine[1466]: I0209 06:50:24.273059 1466 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 06:50:24.273111 update_engine[1466]: I0209 06:50:24.273069 1466 omaha_request_action.cc:271] Request: Feb 9 06:50:24.273111 update_engine[1466]: Feb 9 06:50:24.273111 update_engine[1466]: Feb 9 06:50:24.273111 update_engine[1466]: Feb 9 06:50:24.273111 update_engine[1466]: Feb 9 06:50:24.273111 update_engine[1466]: Feb 9 06:50:24.273111 update_engine[1466]: Feb 9 06:50:24.273111 update_engine[1466]: I0209 06:50:24.273078 1466 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 06:50:24.274717 update_engine[1466]: I0209 06:50:24.273406 1466 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 06:50:24.274717 update_engine[1466]: E0209 06:50:24.273566 1466 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 06:50:24.274717 update_engine[1466]: I0209 06:50:24.273697 1466 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 06:50:24.274717 update_engine[1466]: I0209 06:50:24.273710 1466 omaha_request_action.cc:621] Omaha request response: Feb 9 06:50:24.274717 update_engine[1466]: I0209 06:50:24.273720 1466 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 06:50:24.274717 update_engine[1466]: I0209 06:50:24.273728 1466 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 06:50:24.274717 update_engine[1466]: I0209 06:50:24.273736 1466 update_attempter.cc:306] Processing Done. Feb 9 06:50:24.274717 update_engine[1466]: I0209 06:50:24.273744 1466 update_attempter.cc:310] Error event sent. Feb 9 06:50:24.274717 update_engine[1466]: I0209 06:50:24.273764 1466 update_check_scheduler.cc:74] Next update check in 40m43s Feb 9 06:50:24.275528 locksmithd[1509]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 06:50:24.275528 locksmithd[1509]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 06:50:27.513858 systemd[1]: Started sshd@27-86.109.11.101:22-147.75.109.163:35870.service. Feb 9 06:50:27.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-86.109.11.101:22-147.75.109.163:35870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:27.540641 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:50:27.540680 kernel: audit: type=1130 audit(1707461427.512:1526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-86.109.11.101:22-147.75.109.163:35870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:27.653000 audit[6645]: USER_ACCT pid=6645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:27.653565 sshd[6645]: Accepted publickey for core from 147.75.109.163 port 35870 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:27.654864 sshd[6645]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:27.657421 systemd-logind[1464]: New session 17 of user core. Feb 9 06:50:27.657936 systemd[1]: Started session-17.scope. Feb 9 06:50:27.737699 sshd[6645]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:27.739532 systemd[1]: sshd@27-86.109.11.101:22-147.75.109.163:35870.service: Deactivated successfully. Feb 9 06:50:27.739880 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 06:50:27.740219 systemd-logind[1464]: Session 17 logged out. Waiting for processes to exit. Feb 9 06:50:27.740847 systemd[1]: Started sshd@28-86.109.11.101:22-147.75.109.163:35876.service. Feb 9 06:50:27.741285 systemd-logind[1464]: Removed session 17. Feb 9 06:50:27.654000 audit[6645]: CRED_ACQ pid=6645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:27.835505 kernel: audit: type=1101 audit(1707461427.653:1527): pid=6645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:27.835557 kernel: audit: type=1103 audit(1707461427.654:1528): pid=6645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:27.835573 kernel: audit: type=1006 audit(1707461427.654:1529): pid=6645 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 06:50:27.894111 kernel: audit: type=1300 audit(1707461427.654:1529): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb40d2550 a2=3 a3=0 items=0 ppid=1 pid=6645 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:27.654000 audit[6645]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb40d2550 a2=3 a3=0 items=0 ppid=1 pid=6645 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:27.916494 sshd[6671]: Accepted publickey for core from 147.75.109.163 port 35876 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:27.918416 sshd[6671]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:27.920951 systemd-logind[1464]: New session 18 of user core. Feb 9 06:50:27.921620 systemd[1]: Started session-18.scope. Feb 9 06:50:27.654000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:28.016690 kernel: audit: type=1327 audit(1707461427.654:1529): proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:28.016779 kernel: audit: type=1105 audit(1707461427.660:1530): pid=6645 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:27.660000 audit[6645]: USER_START pid=6645 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:27.660000 audit[6647]: CRED_ACQ pid=6647 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:28.200617 kernel: audit: type=1103 audit(1707461427.660:1531): pid=6647 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:28.200695 kernel: audit: type=1106 audit(1707461427.738:1532): pid=6645 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:27.738000 audit[6645]: USER_END pid=6645 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:27.738000 audit[6645]: CRED_DISP pid=6645 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:28.379607 sshd[6671]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:28.380920 systemd[1]: sshd@28-86.109.11.101:22-147.75.109.163:35876.service: Deactivated successfully. Feb 9 06:50:28.381376 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 06:50:28.381722 systemd-logind[1464]: Session 18 logged out. Waiting for processes to exit. Feb 9 06:50:28.382107 systemd-logind[1464]: Removed session 18. Feb 9 06:50:28.385632 kernel: audit: type=1104 audit(1707461427.738:1533): pid=6645 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:27.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-86.109.11.101:22-147.75.109.163:35870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:27.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-86.109.11.101:22-147.75.109.163:35876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:27.916000 audit[6671]: USER_ACCT pid=6671 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:27.918000 audit[6671]: CRED_ACQ pid=6671 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:27.918000 audit[6671]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcfcb38b0 a2=3 a3=0 items=0 ppid=1 pid=6671 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:27.918000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:27.923000 audit[6671]: USER_START pid=6671 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:27.924000 audit[6673]: CRED_ACQ pid=6673 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:28.379000 audit[6671]: USER_END pid=6671 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:28.379000 audit[6671]: CRED_DISP pid=6671 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:28.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-86.109.11.101:22-147.75.109.163:35876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:28.388718 systemd[1]: Started sshd@29-86.109.11.101:22-147.75.109.163:35880.service. Feb 9 06:50:28.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-86.109.11.101:22-147.75.109.163:35880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:28.416000 audit[6694]: USER_ACCT pid=6694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:28.417194 sshd[6694]: Accepted publickey for core from 147.75.109.163 port 35880 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:28.416000 audit[6694]: CRED_ACQ pid=6694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:28.416000 audit[6694]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdec0913c0 a2=3 a3=0 items=0 ppid=1 pid=6694 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:28.416000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:28.417792 sshd[6694]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:28.420285 systemd-logind[1464]: New session 19 of user core. Feb 9 06:50:28.420820 systemd[1]: Started session-19.scope. Feb 9 06:50:28.421000 audit[6694]: USER_START pid=6694 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:28.422000 audit[6698]: CRED_ACQ pid=6698 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:28.534678 sshd[6694]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:28.534000 audit[6694]: USER_END pid=6694 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:28.534000 audit[6694]: CRED_DISP pid=6694 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:28.536764 systemd[1]: sshd@29-86.109.11.101:22-147.75.109.163:35880.service: Deactivated successfully. Feb 9 06:50:28.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-86.109.11.101:22-147.75.109.163:35880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:28.537417 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 06:50:28.537918 systemd-logind[1464]: Session 19 logged out. Waiting for processes to exit. Feb 9 06:50:28.538672 systemd-logind[1464]: Removed session 19. Feb 9 06:50:33.546668 systemd[1]: Started sshd@30-86.109.11.101:22-147.75.109.163:35882.service. Feb 9 06:50:33.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-86.109.11.101:22-147.75.109.163:35882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:33.574371 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 06:50:33.574422 kernel: audit: type=1130 audit(1707461433.546:1553): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-86.109.11.101:22-147.75.109.163:35882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:33.686000 audit[6767]: USER_ACCT pid=6767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:33.687512 sshd[6767]: Accepted publickey for core from 147.75.109.163 port 35882 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:33.688368 sshd[6767]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:33.690702 systemd-logind[1464]: New session 20 of user core. Feb 9 06:50:33.691140 systemd[1]: Started session-20.scope. Feb 9 06:50:33.770297 sshd[6767]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:33.771787 systemd[1]: sshd@30-86.109.11.101:22-147.75.109.163:35882.service: Deactivated successfully. Feb 9 06:50:33.772232 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 06:50:33.772622 systemd-logind[1464]: Session 20 logged out. Waiting for processes to exit. Feb 9 06:50:33.773035 systemd-logind[1464]: Removed session 20. Feb 9 06:50:33.687000 audit[6767]: CRED_ACQ pid=6767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:33.869628 kernel: audit: type=1101 audit(1707461433.686:1554): pid=6767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:33.869675 kernel: audit: type=1103 audit(1707461433.687:1555): pid=6767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:33.869693 kernel: audit: type=1006 audit(1707461433.687:1556): pid=6767 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Feb 9 06:50:33.687000 audit[6767]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff94760770 a2=3 a3=0 items=0 ppid=1 pid=6767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:34.020537 kernel: audit: type=1300 audit(1707461433.687:1556): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff94760770 a2=3 a3=0 items=0 ppid=1 pid=6767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:34.020569 kernel: audit: type=1327 audit(1707461433.687:1556): proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:33.687000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:34.051174 kernel: audit: type=1105 audit(1707461433.692:1557): pid=6767 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:33.692000 audit[6767]: USER_START pid=6767 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:33.692000 audit[6769]: CRED_ACQ pid=6769 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:34.235161 kernel: audit: type=1103 audit(1707461433.692:1558): pid=6769 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:34.235194 kernel: audit: type=1106 audit(1707461433.769:1559): pid=6767 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:33.769000 audit[6767]: USER_END pid=6767 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:33.770000 audit[6767]: CRED_DISP pid=6767 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:34.420178 kernel: audit: type=1104 audit(1707461433.770:1560): pid=6767 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:33.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-86.109.11.101:22-147.75.109.163:35882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:38.780569 systemd[1]: Started sshd@31-86.109.11.101:22-147.75.109.163:48202.service. Feb 9 06:50:38.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-86.109.11.101:22-147.75.109.163:48202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:38.807621 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:50:38.807689 kernel: audit: type=1130 audit(1707461438.779:1562): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-86.109.11.101:22-147.75.109.163:48202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:38.919000 audit[6793]: USER_ACCT pid=6793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:38.921136 sshd[6793]: Accepted publickey for core from 147.75.109.163 port 48202 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:38.924016 sshd[6793]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:38.931737 systemd-logind[1464]: New session 21 of user core. Feb 9 06:50:38.933572 systemd[1]: Started session-21.scope. Feb 9 06:50:38.922000 audit[6793]: CRED_ACQ pid=6793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:39.019088 sshd[6793]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:39.020531 systemd[1]: sshd@31-86.109.11.101:22-147.75.109.163:48202.service: Deactivated successfully. Feb 9 06:50:39.020971 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 06:50:39.021400 systemd-logind[1464]: Session 21 logged out. Waiting for processes to exit. Feb 9 06:50:39.022063 systemd-logind[1464]: Removed session 21. Feb 9 06:50:39.103274 kernel: audit: type=1101 audit(1707461438.919:1563): pid=6793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:39.103309 kernel: audit: type=1103 audit(1707461438.922:1564): pid=6793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:39.103345 kernel: audit: type=1006 audit(1707461438.922:1565): pid=6793 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 9 06:50:39.161922 kernel: audit: type=1300 audit(1707461438.922:1565): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb6ff5280 a2=3 a3=0 items=0 ppid=1 pid=6793 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:38.922000 audit[6793]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb6ff5280 a2=3 a3=0 items=0 ppid=1 pid=6793 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:39.254034 kernel: audit: type=1327 audit(1707461438.922:1565): proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:38.922000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:39.284562 kernel: audit: type=1105 audit(1707461438.939:1566): pid=6793 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:38.939000 audit[6793]: USER_START pid=6793 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:39.379170 kernel: audit: type=1103 audit(1707461438.940:1567): pid=6795 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:38.940000 audit[6795]: CRED_ACQ pid=6795 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:39.468512 kernel: audit: type=1106 audit(1707461439.018:1568): pid=6793 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:39.018000 audit[6793]: USER_END pid=6793 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:39.018000 audit[6793]: CRED_DISP pid=6793 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:39.653505 kernel: audit: type=1104 audit(1707461439.018:1569): pid=6793 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:39.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-86.109.11.101:22-147.75.109.163:48202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:44.029257 systemd[1]: Started sshd@32-86.109.11.101:22-147.75.109.163:48210.service. Feb 9 06:50:44.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-86.109.11.101:22-147.75.109.163:48210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:44.056301 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:50:44.056350 kernel: audit: type=1130 audit(1707461444.028:1571): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-86.109.11.101:22-147.75.109.163:48210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:44.168000 audit[6825]: USER_ACCT pid=6825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:44.169548 sshd[6825]: Accepted publickey for core from 147.75.109.163 port 48210 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:44.170365 sshd[6825]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:44.172789 systemd-logind[1464]: New session 22 of user core. Feb 9 06:50:44.173287 systemd[1]: Started session-22.scope. Feb 9 06:50:44.254540 sshd[6825]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:44.255951 systemd[1]: sshd@32-86.109.11.101:22-147.75.109.163:48210.service: Deactivated successfully. Feb 9 06:50:44.256392 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 06:50:44.256761 systemd-logind[1464]: Session 22 logged out. Waiting for processes to exit. Feb 9 06:50:44.257222 systemd-logind[1464]: Removed session 22. Feb 9 06:50:44.169000 audit[6825]: CRED_ACQ pid=6825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:44.351553 kernel: audit: type=1101 audit(1707461444.168:1572): pid=6825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:44.351631 kernel: audit: type=1103 audit(1707461444.169:1573): pid=6825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:44.351648 kernel: audit: type=1006 audit(1707461444.169:1574): pid=6825 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 06:50:44.410171 kernel: audit: type=1300 audit(1707461444.169:1574): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0be04a70 a2=3 a3=0 items=0 ppid=1 pid=6825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:44.169000 audit[6825]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0be04a70 a2=3 a3=0 items=0 ppid=1 pid=6825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:44.502290 kernel: audit: type=1327 audit(1707461444.169:1574): proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:44.169000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:44.532817 kernel: audit: type=1105 audit(1707461444.174:1575): pid=6825 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:44.174000 audit[6825]: USER_START pid=6825 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:44.627367 kernel: audit: type=1103 audit(1707461444.175:1576): pid=6827 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:44.175000 audit[6827]: CRED_ACQ pid=6827 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:44.716656 kernel: audit: type=1106 audit(1707461444.254:1577): pid=6825 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:44.254000 audit[6825]: USER_END pid=6825 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:44.812284 kernel: audit: type=1104 audit(1707461444.254:1578): pid=6825 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:44.254000 audit[6825]: CRED_DISP pid=6825 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:44.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-86.109.11.101:22-147.75.109.163:48210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:49.264733 systemd[1]: Started sshd@33-86.109.11.101:22-147.75.109.163:41016.service. Feb 9 06:50:49.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-86.109.11.101:22-147.75.109.163:41016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:49.291718 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:50:49.291789 kernel: audit: type=1130 audit(1707461449.264:1580): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-86.109.11.101:22-147.75.109.163:41016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:49.404000 audit[6858]: USER_ACCT pid=6858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:49.404539 sshd[6858]: Accepted publickey for core from 147.75.109.163 port 41016 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:49.406393 sshd[6858]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:49.408786 systemd-logind[1464]: New session 23 of user core. Feb 9 06:50:49.409277 systemd[1]: Started session-23.scope. Feb 9 06:50:49.490462 sshd[6858]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:49.491814 systemd[1]: sshd@33-86.109.11.101:22-147.75.109.163:41016.service: Deactivated successfully. Feb 9 06:50:49.492254 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 06:50:49.492663 systemd-logind[1464]: Session 23 logged out. Waiting for processes to exit. Feb 9 06:50:49.493066 systemd-logind[1464]: Removed session 23. Feb 9 06:50:49.405000 audit[6858]: CRED_ACQ pid=6858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:49.586481 kernel: audit: type=1101 audit(1707461449.404:1581): pid=6858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:49.586521 kernel: audit: type=1103 audit(1707461449.405:1582): pid=6858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:49.586541 kernel: audit: type=1006 audit(1707461449.405:1583): pid=6858 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 06:50:49.645091 kernel: audit: type=1300 audit(1707461449.405:1583): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdeb1b5ef0 a2=3 a3=0 items=0 ppid=1 pid=6858 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:49.405000 audit[6858]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdeb1b5ef0 a2=3 a3=0 items=0 ppid=1 pid=6858 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:49.405000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:49.767714 kernel: audit: type=1327 audit(1707461449.405:1583): proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:49.767745 kernel: audit: type=1105 audit(1707461449.410:1584): pid=6858 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:49.410000 audit[6858]: USER_START pid=6858 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:49.862296 kernel: audit: type=1103 audit(1707461449.410:1585): pid=6860 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:49.410000 audit[6860]: CRED_ACQ pid=6860 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:49.951611 kernel: audit: type=1106 audit(1707461449.490:1586): pid=6858 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:49.490000 audit[6858]: USER_END pid=6858 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:49.490000 audit[6858]: CRED_DISP pid=6858 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:50.136766 kernel: audit: type=1104 audit(1707461449.490:1587): pid=6858 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:49.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-86.109.11.101:22-147.75.109.163:41016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:54.500886 systemd[1]: Started sshd@34-86.109.11.101:22-147.75.109.163:43534.service. Feb 9 06:50:54.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-86.109.11.101:22-147.75.109.163:43534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:54.527901 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:50:54.527940 kernel: audit: type=1130 audit(1707461454.499:1589): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-86.109.11.101:22-147.75.109.163:43534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:54.639000 audit[6882]: USER_ACCT pid=6882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:54.641170 sshd[6882]: Accepted publickey for core from 147.75.109.163 port 43534 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:54.644105 sshd[6882]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:54.648708 systemd-logind[1464]: New session 24 of user core. Feb 9 06:50:54.649303 systemd[1]: Started session-24.scope. Feb 9 06:50:54.727498 sshd[6882]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:54.728862 systemd[1]: sshd@34-86.109.11.101:22-147.75.109.163:43534.service: Deactivated successfully. Feb 9 06:50:54.729330 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 06:50:54.729642 systemd-logind[1464]: Session 24 logged out. Waiting for processes to exit. Feb 9 06:50:54.729993 systemd-logind[1464]: Removed session 24. Feb 9 06:50:54.642000 audit[6882]: CRED_ACQ pid=6882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:54.822861 kernel: audit: type=1101 audit(1707461454.639:1590): pid=6882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:54.822899 kernel: audit: type=1103 audit(1707461454.642:1591): pid=6882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:54.822917 kernel: audit: type=1006 audit(1707461454.642:1592): pid=6882 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 06:50:54.881557 kernel: audit: type=1300 audit(1707461454.642:1592): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd00f06f80 a2=3 a3=0 items=0 ppid=1 pid=6882 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:54.642000 audit[6882]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd00f06f80 a2=3 a3=0 items=0 ppid=1 pid=6882 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:54.973611 kernel: audit: type=1327 audit(1707461454.642:1592): proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:54.642000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:55.004091 kernel: audit: type=1105 audit(1707461454.650:1593): pid=6882 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:54.650000 audit[6882]: USER_START pid=6882 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:54.650000 audit[6884]: CRED_ACQ pid=6884 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:55.188013 kernel: audit: type=1103 audit(1707461454.650:1594): pid=6884 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:55.188051 kernel: audit: type=1106 audit(1707461454.726:1595): pid=6882 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:54.726000 audit[6882]: USER_END pid=6882 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:55.283652 kernel: audit: type=1104 audit(1707461454.727:1596): pid=6882 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:54.727000 audit[6882]: CRED_DISP pid=6882 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:54.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-86.109.11.101:22-147.75.109.163:43534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:59.336000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:50:59.336000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00e3b6600 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:50:59.336000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:50:59.336000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:50:59.336000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0046eac80 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:50:59.336000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:50:59.336000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:50:59.336000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00e3b6630 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:50:59.336000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:50:59.344000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:50:59.344000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0098eb710 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:50:59.344000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:50:59.344000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:50:59.344000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0087ba6e0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:50:59.344000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:50:59.344000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:50:59.344000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00a8f2060 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:50:59.344000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:50:59.466000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:50:59.466000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:50:59.466000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001426760 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:50:59.466000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00241d410 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:50:59.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:50:59.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:50:59.738490 systemd[1]: Started sshd@35-86.109.11.101:22-147.75.109.163:43540.service. Feb 9 06:50:59.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-86.109.11.101:22-147.75.109.163:43540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:59.765843 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 06:50:59.765938 kernel: audit: type=1130 audit(1707461459.737:1606): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-86.109.11.101:22-147.75.109.163:43540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:59.877000 audit[6927]: USER_ACCT pid=6927 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:59.879252 sshd[6927]: Accepted publickey for core from 147.75.109.163 port 43540 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:50:59.882410 sshd[6927]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:50:59.884791 systemd-logind[1464]: New session 25 of user core. Feb 9 06:50:59.885351 systemd[1]: Started session-25.scope. Feb 9 06:50:59.965424 sshd[6927]: pam_unix(sshd:session): session closed for user core Feb 9 06:50:59.966710 systemd[1]: sshd@35-86.109.11.101:22-147.75.109.163:43540.service: Deactivated successfully. Feb 9 06:50:59.967164 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 06:50:59.967487 systemd-logind[1464]: Session 25 logged out. Waiting for processes to exit. Feb 9 06:50:59.967885 systemd-logind[1464]: Removed session 25. Feb 9 06:50:59.881000 audit[6927]: CRED_ACQ pid=6927 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:00.060980 kernel: audit: type=1101 audit(1707461459.877:1607): pid=6927 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:00.061015 kernel: audit: type=1103 audit(1707461459.881:1608): pid=6927 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:00.061036 kernel: audit: type=1006 audit(1707461459.881:1609): pid=6927 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 06:50:59.881000 audit[6927]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddfe75e70 a2=3 a3=0 items=0 ppid=1 pid=6927 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:00.211958 kernel: audit: type=1300 audit(1707461459.881:1609): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddfe75e70 a2=3 a3=0 items=0 ppid=1 pid=6927 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:00.212030 kernel: audit: type=1327 audit(1707461459.881:1609): proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:59.881000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:50:59.886000 audit[6927]: USER_START pid=6927 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:00.337173 kernel: audit: type=1105 audit(1707461459.886:1610): pid=6927 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:00.337209 kernel: audit: type=1103 audit(1707461459.886:1611): pid=6929 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:59.886000 audit[6929]: CRED_ACQ pid=6929 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:59.964000 audit[6927]: USER_END pid=6927 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:00.522164 kernel: audit: type=1106 audit(1707461459.964:1612): pid=6927 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:00.522199 kernel: audit: type=1104 audit(1707461459.965:1613): pid=6927 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:59.965000 audit[6927]: CRED_DISP pid=6927 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:50:59.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-86.109.11.101:22-147.75.109.163:43540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:04.977351 systemd[1]: Started sshd@36-86.109.11.101:22-147.75.109.163:35794.service. Feb 9 06:51:04.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-86.109.11.101:22-147.75.109.163:35794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:05.004711 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:51:05.004764 kernel: audit: type=1130 audit(1707461464.976:1615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-86.109.11.101:22-147.75.109.163:35794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:05.117000 audit[7001]: USER_ACCT pid=7001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:05.117554 sshd[7001]: Accepted publickey for core from 147.75.109.163 port 35794 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:05.119772 sshd[7001]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:05.122440 systemd-logind[1464]: New session 26 of user core. Feb 9 06:51:05.122993 systemd[1]: Started session-26.scope. Feb 9 06:51:05.202670 sshd[7001]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:05.204139 systemd[1]: sshd@36-86.109.11.101:22-147.75.109.163:35794.service: Deactivated successfully. Feb 9 06:51:05.204587 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 06:51:05.204900 systemd-logind[1464]: Session 26 logged out. Waiting for processes to exit. Feb 9 06:51:05.205505 systemd-logind[1464]: Removed session 26. Feb 9 06:51:05.118000 audit[7001]: CRED_ACQ pid=7001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:05.211163 kernel: audit: type=1101 audit(1707461465.117:1616): pid=7001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:05.211198 kernel: audit: type=1103 audit(1707461465.118:1617): pid=7001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:05.359477 kernel: audit: type=1006 audit(1707461465.118:1618): pid=7001 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 06:51:05.359511 kernel: audit: type=1300 audit(1707461465.118:1618): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5f0434d0 a2=3 a3=0 items=0 ppid=1 pid=7001 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:05.118000 audit[7001]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5f0434d0 a2=3 a3=0 items=0 ppid=1 pid=7001 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:05.451520 kernel: audit: type=1327 audit(1707461465.118:1618): proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:05.118000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:05.482050 kernel: audit: type=1105 audit(1707461465.123:1619): pid=7001 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:05.123000 audit[7001]: USER_START pid=7001 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:05.576591 kernel: audit: type=1103 audit(1707461465.124:1620): pid=7003 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:05.124000 audit[7003]: CRED_ACQ pid=7003 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:05.665815 kernel: audit: type=1106 audit(1707461465.202:1621): pid=7001 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:05.665849 kernel: audit: type=1104 audit(1707461465.202:1622): pid=7001 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:05.202000 audit[7001]: USER_END pid=7001 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:05.202000 audit[7001]: CRED_DISP pid=7001 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:05.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-86.109.11.101:22-147.75.109.163:35794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:10.215423 systemd[1]: Started sshd@37-86.109.11.101:22-147.75.109.163:35804.service. Feb 9 06:51:10.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-86.109.11.101:22-147.75.109.163:35804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:10.242863 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:51:10.242928 kernel: audit: type=1130 audit(1707461470.214:1624): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-86.109.11.101:22-147.75.109.163:35804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:10.353000 audit[7026]: USER_ACCT pid=7026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.354576 sshd[7026]: Accepted publickey for core from 147.75.109.163 port 35804 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:10.356413 sshd[7026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:10.358928 systemd-logind[1464]: New session 27 of user core. Feb 9 06:51:10.359500 systemd[1]: Started session-27.scope. Feb 9 06:51:10.441812 sshd[7026]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:10.443737 systemd[1]: sshd@37-86.109.11.101:22-147.75.109.163:35804.service: Deactivated successfully. Feb 9 06:51:10.444173 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 06:51:10.444624 systemd-logind[1464]: Session 27 logged out. Waiting for processes to exit. Feb 9 06:51:10.445293 systemd[1]: Started sshd@38-86.109.11.101:22-147.75.109.163:35816.service. Feb 9 06:51:10.445865 systemd-logind[1464]: Removed session 27. Feb 9 06:51:10.355000 audit[7026]: CRED_ACQ pid=7026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.538623 kernel: audit: type=1101 audit(1707461470.353:1625): pid=7026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.538667 kernel: audit: type=1103 audit(1707461470.355:1626): pid=7026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.538685 kernel: audit: type=1006 audit(1707461470.355:1627): pid=7026 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 06:51:10.355000 audit[7026]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc222ca650 a2=3 a3=0 items=0 ppid=1 pid=7026 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:10.619477 sshd[7052]: Accepted publickey for core from 147.75.109.163 port 35816 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:10.620368 sshd[7052]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:10.622724 systemd-logind[1464]: New session 28 of user core. Feb 9 06:51:10.623145 systemd[1]: Started session-28.scope. Feb 9 06:51:10.689252 kernel: audit: type=1300 audit(1707461470.355:1627): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc222ca650 a2=3 a3=0 items=0 ppid=1 pid=7026 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:10.689341 kernel: audit: type=1327 audit(1707461470.355:1627): proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:10.355000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:10.719805 kernel: audit: type=1105 audit(1707461470.360:1628): pid=7026 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.360000 audit[7026]: USER_START pid=7026 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.361000 audit[7028]: CRED_ACQ pid=7028 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.903604 kernel: audit: type=1103 audit(1707461470.361:1629): pid=7028 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.903640 kernel: audit: type=1106 audit(1707461470.441:1630): pid=7026 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.441000 audit[7026]: USER_END pid=7026 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.999122 kernel: audit: type=1104 audit(1707461470.441:1631): pid=7026 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.441000 audit[7026]: CRED_DISP pid=7026 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-86.109.11.101:22-147.75.109.163:35804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:10.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-86.109.11.101:22-147.75.109.163:35816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:10.618000 audit[7052]: USER_ACCT pid=7052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.619000 audit[7052]: CRED_ACQ pid=7052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.619000 audit[7052]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd074c2540 a2=3 a3=0 items=0 ppid=1 pid=7052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:10.619000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:10.624000 audit[7052]: USER_START pid=7052 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:10.625000 audit[7054]: CRED_ACQ pid=7054 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:12.056609 sshd[7052]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:12.059000 audit[7052]: USER_END pid=7052 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:12.059000 audit[7052]: CRED_DISP pid=7052 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:12.065647 systemd[1]: sshd@38-86.109.11.101:22-147.75.109.163:35816.service: Deactivated successfully. Feb 9 06:51:12.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-86.109.11.101:22-147.75.109.163:35816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:12.067417 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 06:51:12.069459 systemd-logind[1464]: Session 28 logged out. Waiting for processes to exit. Feb 9 06:51:12.072887 systemd[1]: Started sshd@39-86.109.11.101:22-147.75.109.163:35818.service. Feb 9 06:51:12.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-86.109.11.101:22-147.75.109.163:35818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:12.075486 systemd-logind[1464]: Removed session 28. Feb 9 06:51:12.104000 audit[7076]: USER_ACCT pid=7076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:12.104549 sshd[7076]: Accepted publickey for core from 147.75.109.163 port 35818 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:12.104000 audit[7076]: CRED_ACQ pid=7076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:12.104000 audit[7076]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb4f1d790 a2=3 a3=0 items=0 ppid=1 pid=7076 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:12.104000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:12.105274 sshd[7076]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:12.108036 systemd-logind[1464]: New session 29 of user core. Feb 9 06:51:12.108613 systemd[1]: Started session-29.scope. Feb 9 06:51:12.110000 audit[7076]: USER_START pid=7076 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:12.110000 audit[7079]: CRED_ACQ pid=7079 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:12.215000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:51:12.215000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c7eec0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:51:12.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:51:12.215000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:51:12.215000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000762ae0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:51:12.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:51:12.217000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:51:12.217000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017642a0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:51:12.217000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:51:12.217000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:51:12.217000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000944e40 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:51:12.217000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:51:12.989000 audit[7102]: NETFILTER_CFG table=filter:119 family=2 entries=22 op=nft_register_rule pid=7102 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:51:12.989000 audit[7102]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffc04c3bb60 a2=0 a3=7ffc04c3bb4c items=0 ppid=2856 pid=7102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:12.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:51:12.995173 sshd[7076]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:12.994000 audit[7076]: USER_END pid=7076 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:12.994000 audit[7076]: CRED_DISP pid=7076 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:12.997575 systemd[1]: sshd@39-86.109.11.101:22-147.75.109.163:35818.service: Deactivated successfully. Feb 9 06:51:12.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-86.109.11.101:22-147.75.109.163:35818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:12.998009 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 06:51:12.998546 systemd-logind[1464]: Session 29 logged out. Waiting for processes to exit. Feb 9 06:51:12.989000 audit[7102]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=7102 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:51:12.989000 audit[7102]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc04c3bb60 a2=0 a3=31030 items=0 ppid=2856 pid=7102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:12.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:51:12.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-86.109.11.101:22-147.75.109.163:35826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:12.999853 systemd[1]: Started sshd@40-86.109.11.101:22-147.75.109.163:35826.service. Feb 9 06:51:13.000517 systemd-logind[1464]: Removed session 29. Feb 9 06:51:13.004000 audit[7108]: NETFILTER_CFG table=filter:121 family=2 entries=34 op=nft_register_rule pid=7108 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:51:13.004000 audit[7108]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffc1422b930 a2=0 a3=7ffc1422b91c items=0 ppid=2856 pid=7108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.004000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:51:13.007000 audit[7108]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=7108 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:51:13.007000 audit[7108]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc1422b930 a2=0 a3=31030 items=0 ppid=2856 pid=7108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.007000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:51:13.030000 audit[7106]: USER_ACCT pid=7106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:13.031588 sshd[7106]: Accepted publickey for core from 147.75.109.163 port 35826 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:13.031000 audit[7106]: CRED_ACQ pid=7106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:13.031000 audit[7106]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf03d59e0 a2=3 a3=0 items=0 ppid=1 pid=7106 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.031000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:13.032501 sshd[7106]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:13.035600 systemd-logind[1464]: New session 30 of user core. Feb 9 06:51:13.036314 systemd[1]: Started session-30.scope. Feb 9 06:51:13.038000 audit[7106]: USER_START pid=7106 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:13.039000 audit[7111]: CRED_ACQ pid=7111 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:13.283594 sshd[7106]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:13.283000 audit[7106]: USER_END pid=7106 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:13.283000 audit[7106]: CRED_DISP pid=7106 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:13.285417 systemd[1]: sshd@40-86.109.11.101:22-147.75.109.163:35826.service: Deactivated successfully. Feb 9 06:51:13.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-86.109.11.101:22-147.75.109.163:35826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:13.285777 systemd[1]: session-30.scope: Deactivated successfully. Feb 9 06:51:13.286076 systemd-logind[1464]: Session 30 logged out. Waiting for processes to exit. Feb 9 06:51:13.286657 systemd[1]: Started sshd@41-86.109.11.101:22-147.75.109.163:35830.service. Feb 9 06:51:13.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-86.109.11.101:22-147.75.109.163:35830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:13.287049 systemd-logind[1464]: Removed session 30. Feb 9 06:51:13.314487 sshd[7132]: Accepted publickey for core from 147.75.109.163 port 35830 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:13.313000 audit[7132]: USER_ACCT pid=7132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:13.313000 audit[7132]: CRED_ACQ pid=7132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:13.314000 audit[7132]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcf90f3a0 a2=3 a3=0 items=0 ppid=1 pid=7132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.314000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:13.315270 sshd[7132]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:13.317597 systemd-logind[1464]: New session 31 of user core. Feb 9 06:51:13.318293 systemd[1]: Started session-31.scope. Feb 9 06:51:13.319000 audit[7132]: USER_START pid=7132 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:13.320000 audit[7134]: CRED_ACQ pid=7134 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:13.434307 sshd[7132]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:13.433000 audit[7132]: USER_END pid=7132 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:13.433000 audit[7132]: CRED_DISP pid=7132 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:13.435674 systemd[1]: sshd@41-86.109.11.101:22-147.75.109.163:35830.service: Deactivated successfully. Feb 9 06:51:13.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-86.109.11.101:22-147.75.109.163:35830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:13.436181 systemd[1]: session-31.scope: Deactivated successfully. Feb 9 06:51:13.436604 systemd-logind[1464]: Session 31 logged out. Waiting for processes to exit. Feb 9 06:51:13.437021 systemd-logind[1464]: Removed session 31. Feb 9 06:51:16.284862 systemd[1]: Started sshd@42-86.109.11.101:22-195.87.80.171:30100.service. Feb 9 06:51:16.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-86.109.11.101:22-195.87.80.171:30100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:16.319533 kernel: kauditd_printk_skb: 69 callbacks suppressed Feb 9 06:51:16.319611 kernel: audit: type=1130 audit(1707461476.284:1677): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-86.109.11.101:22-195.87.80.171:30100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:17.324268 sshd[7157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.87.80.171 user=root Feb 9 06:51:17.323000 audit[7157]: USER_AUTH pid=7157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:51:17.414144 kernel: audit: type=1100 audit(1707461477.323:1678): pid=7157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:51:18.446522 systemd[1]: Started sshd@43-86.109.11.101:22-147.75.109.163:32814.service. Feb 9 06:51:18.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-86.109.11.101:22-147.75.109.163:32814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:18.537163 kernel: audit: type=1130 audit(1707461478.446:1679): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-86.109.11.101:22-147.75.109.163:32814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:18.557000 audit[7162]: USER_ACCT pid=7162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:18.559110 sshd[7162]: Accepted publickey for core from 147.75.109.163 port 32814 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:18.559694 sshd[7162]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:18.562253 systemd-logind[1464]: New session 32 of user core. Feb 9 06:51:18.562688 systemd[1]: Started session-32.scope. Feb 9 06:51:18.641019 sshd[7162]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:18.642538 systemd[1]: sshd@43-86.109.11.101:22-147.75.109.163:32814.service: Deactivated successfully. Feb 9 06:51:18.642985 systemd[1]: session-32.scope: Deactivated successfully. Feb 9 06:51:18.643335 systemd-logind[1464]: Session 32 logged out. Waiting for processes to exit. Feb 9 06:51:18.643978 systemd-logind[1464]: Removed session 32. Feb 9 06:51:18.651135 kernel: audit: type=1101 audit(1707461478.557:1680): pid=7162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:18.651170 kernel: audit: type=1103 audit(1707461478.558:1681): pid=7162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:18.558000 audit[7162]: CRED_ACQ pid=7162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:18.800280 kernel: audit: type=1006 audit(1707461478.558:1682): pid=7162 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Feb 9 06:51:18.800324 kernel: audit: type=1300 audit(1707461478.558:1682): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff76f77470 a2=3 a3=0 items=0 ppid=1 pid=7162 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:18.558000 audit[7162]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff76f77470 a2=3 a3=0 items=0 ppid=1 pid=7162 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:18.892920 kernel: audit: type=1327 audit(1707461478.558:1682): proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:18.558000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:18.923757 kernel: audit: type=1105 audit(1707461478.563:1683): pid=7162 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:18.563000 audit[7162]: USER_START pid=7162 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:19.019242 kernel: audit: type=1103 audit(1707461478.564:1684): pid=7164 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:18.564000 audit[7164]: CRED_ACQ pid=7164 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:18.640000 audit[7162]: USER_END pid=7162 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:18.640000 audit[7162]: CRED_DISP pid=7162 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:18.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-86.109.11.101:22-147.75.109.163:32814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:19.488877 sshd[7157]: Failed password for root from 195.87.80.171 port 30100 ssh2 Feb 9 06:51:21.339048 sshd[7157]: Received disconnect from 195.87.80.171 port 30100:11: Bye Bye [preauth] Feb 9 06:51:21.339048 sshd[7157]: Disconnected from authenticating user root 195.87.80.171 port 30100 [preauth] Feb 9 06:51:21.341383 systemd[1]: sshd@42-86.109.11.101:22-195.87.80.171:30100.service: Deactivated successfully. Feb 9 06:51:21.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-86.109.11.101:22-195.87.80.171:30100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:21.381895 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 06:51:21.381980 kernel: audit: type=1131 audit(1707461481.340:1688): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-86.109.11.101:22-195.87.80.171:30100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:23.650991 systemd[1]: Started sshd@44-86.109.11.101:22-147.75.109.163:32826.service. Feb 9 06:51:23.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-86.109.11.101:22-147.75.109.163:32826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:23.742121 kernel: audit: type=1130 audit(1707461483.649:1689): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-86.109.11.101:22-147.75.109.163:32826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:23.763000 audit[7189]: USER_ACCT pid=7189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:23.764760 sshd[7189]: Accepted publickey for core from 147.75.109.163 port 32826 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:23.766240 sshd[7189]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:23.768696 systemd-logind[1464]: New session 33 of user core. Feb 9 06:51:23.769251 systemd[1]: Started session-33.scope. Feb 9 06:51:23.764000 audit[7189]: CRED_ACQ pid=7189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:23.859431 sshd[7189]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:23.860753 systemd[1]: sshd@44-86.109.11.101:22-147.75.109.163:32826.service: Deactivated successfully. Feb 9 06:51:23.861208 systemd[1]: session-33.scope: Deactivated successfully. Feb 9 06:51:23.861583 systemd-logind[1464]: Session 33 logged out. Waiting for processes to exit. Feb 9 06:51:23.862005 systemd-logind[1464]: Removed session 33. Feb 9 06:51:23.947333 kernel: audit: type=1101 audit(1707461483.763:1690): pid=7189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:23.947374 kernel: audit: type=1103 audit(1707461483.764:1691): pid=7189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:23.947391 kernel: audit: type=1006 audit(1707461483.764:1692): pid=7189 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 Feb 9 06:51:24.006005 kernel: audit: type=1300 audit(1707461483.764:1692): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd86bd4e0 a2=3 a3=0 items=0 ppid=1 pid=7189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:23.764000 audit[7189]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd86bd4e0 a2=3 a3=0 items=0 ppid=1 pid=7189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:24.098072 kernel: audit: type=1327 audit(1707461483.764:1692): proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:23.764000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:24.128610 kernel: audit: type=1105 audit(1707461483.770:1693): pid=7189 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:23.770000 audit[7189]: USER_START pid=7189 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:24.224225 kernel: audit: type=1103 audit(1707461483.771:1694): pid=7191 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:23.771000 audit[7191]: CRED_ACQ pid=7191 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:23.858000 audit[7189]: USER_END pid=7189 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:24.409220 kernel: audit: type=1106 audit(1707461483.858:1695): pid=7189 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:23.859000 audit[7189]: CRED_DISP pid=7189 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:23.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-86.109.11.101:22-147.75.109.163:32826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:28.869076 systemd[1]: Started sshd@45-86.109.11.101:22-147.75.109.163:41724.service. Feb 9 06:51:28.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-86.109.11.101:22-147.75.109.163:41724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:28.896164 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 06:51:28.896242 kernel: audit: type=1130 audit(1707461488.868:1698): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-86.109.11.101:22-147.75.109.163:41724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:29.009000 audit[7213]: USER_ACCT pid=7213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:29.009571 sshd[7213]: Accepted publickey for core from 147.75.109.163 port 41724 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:29.010378 sshd[7213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:29.012528 systemd-logind[1464]: New session 34 of user core. Feb 9 06:51:29.013123 systemd[1]: Started session-34.scope. Feb 9 06:51:29.009000 audit[7213]: CRED_ACQ pid=7213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:29.103744 sshd[7213]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:29.105160 systemd[1]: sshd@45-86.109.11.101:22-147.75.109.163:41724.service: Deactivated successfully. Feb 9 06:51:29.105603 systemd[1]: session-34.scope: Deactivated successfully. Feb 9 06:51:29.105924 systemd-logind[1464]: Session 34 logged out. Waiting for processes to exit. Feb 9 06:51:29.106369 systemd-logind[1464]: Removed session 34. Feb 9 06:51:29.191716 kernel: audit: type=1101 audit(1707461489.009:1699): pid=7213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:29.191757 kernel: audit: type=1103 audit(1707461489.009:1700): pid=7213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:29.191785 kernel: audit: type=1006 audit(1707461489.009:1701): pid=7213 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=34 res=1 Feb 9 06:51:29.009000 audit[7213]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4ea835e0 a2=3 a3=0 items=0 ppid=1 pid=7213 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:29.342789 kernel: audit: type=1300 audit(1707461489.009:1701): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4ea835e0 a2=3 a3=0 items=0 ppid=1 pid=7213 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:29.342820 kernel: audit: type=1327 audit(1707461489.009:1701): proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:29.009000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:29.373494 kernel: audit: type=1105 audit(1707461489.014:1702): pid=7213 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:29.014000 audit[7213]: USER_START pid=7213 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:29.468539 kernel: audit: type=1103 audit(1707461489.014:1703): pid=7215 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:29.014000 audit[7215]: CRED_ACQ pid=7215 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:29.558322 kernel: audit: type=1106 audit(1707461489.103:1704): pid=7213 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:29.103000 audit[7213]: USER_END pid=7213 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:29.654377 kernel: audit: type=1104 audit(1707461489.103:1705): pid=7213 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:29.103000 audit[7213]: CRED_DISP pid=7213 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:29.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-86.109.11.101:22-147.75.109.163:41724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:34.114003 systemd[1]: Started sshd@46-86.109.11.101:22-147.75.109.163:41730.service. Feb 9 06:51:34.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-86.109.11.101:22-147.75.109.163:41730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:34.140720 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:51:34.140770 kernel: audit: type=1130 audit(1707461494.113:1707): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-86.109.11.101:22-147.75.109.163:41730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:34.252000 audit[7284]: USER_ACCT pid=7284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:34.254189 sshd[7284]: Accepted publickey for core from 147.75.109.163 port 41730 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:34.258363 sshd[7284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:34.261602 systemd-logind[1464]: New session 35 of user core. Feb 9 06:51:34.262298 systemd[1]: Started session-35.scope. Feb 9 06:51:34.342140 sshd[7284]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:34.343629 systemd[1]: sshd@46-86.109.11.101:22-147.75.109.163:41730.service: Deactivated successfully. Feb 9 06:51:34.344212 systemd[1]: session-35.scope: Deactivated successfully. Feb 9 06:51:34.344634 systemd-logind[1464]: Session 35 logged out. Waiting for processes to exit. Feb 9 06:51:34.345526 systemd-logind[1464]: Removed session 35. Feb 9 06:51:34.256000 audit[7284]: CRED_ACQ pid=7284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:34.438527 kernel: audit: type=1101 audit(1707461494.252:1708): pid=7284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:34.438566 kernel: audit: type=1103 audit(1707461494.256:1709): pid=7284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:34.438583 kernel: audit: type=1006 audit(1707461494.256:1710): pid=7284 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=35 res=1 Feb 9 06:51:34.497472 kernel: audit: type=1300 audit(1707461494.256:1710): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3adceaa0 a2=3 a3=0 items=0 ppid=1 pid=7284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:34.256000 audit[7284]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3adceaa0 a2=3 a3=0 items=0 ppid=1 pid=7284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:34.589941 kernel: audit: type=1327 audit(1707461494.256:1710): proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:34.256000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:34.263000 audit[7284]: USER_START pid=7284 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:34.715642 kernel: audit: type=1105 audit(1707461494.263:1711): pid=7284 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:34.715756 kernel: audit: type=1103 audit(1707461494.264:1712): pid=7286 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:34.264000 audit[7286]: CRED_ACQ pid=7286 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:34.804884 kernel: audit: type=1106 audit(1707461494.341:1713): pid=7284 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:34.341000 audit[7284]: USER_END pid=7284 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:34.900399 kernel: audit: type=1104 audit(1707461494.341:1714): pid=7284 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:34.341000 audit[7284]: CRED_DISP pid=7284 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:34.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-86.109.11.101:22-147.75.109.163:41730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:39.348849 systemd[1]: Started sshd@47-86.109.11.101:22-147.75.109.163:56184.service. Feb 9 06:51:39.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-86.109.11.101:22-147.75.109.163:56184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:39.375827 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:51:39.375872 kernel: audit: type=1130 audit(1707461499.347:1716): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-86.109.11.101:22-147.75.109.163:56184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:39.487000 audit[7323]: USER_ACCT pid=7323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:39.488643 sshd[7323]: Accepted publickey for core from 147.75.109.163 port 56184 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:39.490856 sshd[7323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:39.496199 systemd-logind[1464]: New session 36 of user core. Feb 9 06:51:39.497619 systemd[1]: Started session-36.scope. Feb 9 06:51:39.489000 audit[7323]: CRED_ACQ pid=7323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:39.581050 sshd[7323]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:39.582431 systemd[1]: sshd@47-86.109.11.101:22-147.75.109.163:56184.service: Deactivated successfully. Feb 9 06:51:39.582876 systemd[1]: session-36.scope: Deactivated successfully. Feb 9 06:51:39.583259 systemd-logind[1464]: Session 36 logged out. Waiting for processes to exit. Feb 9 06:51:39.583777 systemd-logind[1464]: Removed session 36. Feb 9 06:51:39.670094 kernel: audit: type=1101 audit(1707461499.487:1717): pid=7323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:39.670138 kernel: audit: type=1103 audit(1707461499.489:1718): pid=7323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:39.670159 kernel: audit: type=1006 audit(1707461499.489:1719): pid=7323 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=36 res=1 Feb 9 06:51:39.728694 kernel: audit: type=1300 audit(1707461499.489:1719): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb9232630 a2=3 a3=0 items=0 ppid=1 pid=7323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:39.489000 audit[7323]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb9232630 a2=3 a3=0 items=0 ppid=1 pid=7323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:39.820594 kernel: audit: type=1327 audit(1707461499.489:1719): proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:39.489000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:39.851072 kernel: audit: type=1105 audit(1707461499.503:1720): pid=7323 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:39.503000 audit[7323]: USER_START pid=7323 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:39.945502 kernel: audit: type=1103 audit(1707461499.504:1721): pid=7325 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:39.504000 audit[7325]: CRED_ACQ pid=7325 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:40.034665 kernel: audit: type=1106 audit(1707461499.580:1722): pid=7323 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:39.580000 audit[7323]: USER_END pid=7323 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:40.130306 kernel: audit: type=1104 audit(1707461499.580:1723): pid=7323 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:39.580000 audit[7323]: CRED_DISP pid=7323 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:39.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-86.109.11.101:22-147.75.109.163:56184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:44.585965 systemd[1]: Started sshd@48-86.109.11.101:22-147.75.109.163:52042.service. Feb 9 06:51:44.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-86.109.11.101:22-147.75.109.163:52042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:44.624780 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:51:44.624869 kernel: audit: type=1130 audit(1707461504.585:1725): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-86.109.11.101:22-147.75.109.163:52042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:44.734000 audit[7350]: USER_ACCT pid=7350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:44.735527 sshd[7350]: Accepted publickey for core from 147.75.109.163 port 52042 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:44.739529 sshd[7350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:44.741807 systemd-logind[1464]: New session 37 of user core. Feb 9 06:51:44.742314 systemd[1]: Started session-37.scope. Feb 9 06:51:44.822411 sshd[7350]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:44.823714 systemd[1]: sshd@48-86.109.11.101:22-147.75.109.163:52042.service: Deactivated successfully. Feb 9 06:51:44.824166 systemd[1]: session-37.scope: Deactivated successfully. Feb 9 06:51:44.824553 systemd-logind[1464]: Session 37 logged out. Waiting for processes to exit. Feb 9 06:51:44.824967 systemd-logind[1464]: Removed session 37. Feb 9 06:51:44.738000 audit[7350]: CRED_ACQ pid=7350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:44.917228 kernel: audit: type=1101 audit(1707461504.734:1726): pid=7350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:44.917279 kernel: audit: type=1103 audit(1707461504.738:1727): pid=7350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:44.917303 kernel: audit: type=1006 audit(1707461504.738:1728): pid=7350 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=37 res=1 Feb 9 06:51:44.975832 kernel: audit: type=1300 audit(1707461504.738:1728): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdc062d30 a2=3 a3=0 items=0 ppid=1 pid=7350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:44.738000 audit[7350]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdc062d30 a2=3 a3=0 items=0 ppid=1 pid=7350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:45.067835 kernel: audit: type=1327 audit(1707461504.738:1728): proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:44.738000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:45.098348 kernel: audit: type=1105 audit(1707461504.742:1729): pid=7350 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:44.742000 audit[7350]: USER_START pid=7350 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:45.192855 kernel: audit: type=1103 audit(1707461504.743:1730): pid=7352 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:44.743000 audit[7352]: CRED_ACQ pid=7352 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:45.282166 kernel: audit: type=1106 audit(1707461504.821:1731): pid=7350 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:44.821000 audit[7350]: USER_END pid=7350 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:45.377698 kernel: audit: type=1104 audit(1707461504.821:1732): pid=7350 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:44.821000 audit[7350]: CRED_DISP pid=7350 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:44.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-86.109.11.101:22-147.75.109.163:52042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:49.821421 systemd[1]: Started sshd@49-86.109.11.101:22-147.75.109.163:52058.service. Feb 9 06:51:49.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-86.109.11.101:22-147.75.109.163:52058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:49.848155 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:51:49.848211 kernel: audit: type=1130 audit(1707461509.820:1734): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-86.109.11.101:22-147.75.109.163:52058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:49.959000 audit[7377]: USER_ACCT pid=7377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:49.960556 sshd[7377]: Accepted publickey for core from 147.75.109.163 port 52058 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:49.962020 sshd[7377]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:49.964333 systemd-logind[1464]: New session 38 of user core. Feb 9 06:51:49.964877 systemd[1]: Started session-38.scope. Feb 9 06:51:50.045478 sshd[7377]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:50.046889 systemd[1]: sshd@49-86.109.11.101:22-147.75.109.163:52058.service: Deactivated successfully. Feb 9 06:51:50.047449 systemd[1]: session-38.scope: Deactivated successfully. Feb 9 06:51:50.047778 systemd-logind[1464]: Session 38 logged out. Waiting for processes to exit. Feb 9 06:51:50.048204 systemd-logind[1464]: Removed session 38. Feb 9 06:51:49.960000 audit[7377]: CRED_ACQ pid=7377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:50.144168 kernel: audit: type=1101 audit(1707461509.959:1735): pid=7377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:50.144203 kernel: audit: type=1103 audit(1707461509.960:1736): pid=7377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:50.144219 kernel: audit: type=1006 audit(1707461509.960:1737): pid=7377 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=38 res=1 Feb 9 06:51:50.202728 kernel: audit: type=1300 audit(1707461509.960:1737): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb144a530 a2=3 a3=0 items=0 ppid=1 pid=7377 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:49.960000 audit[7377]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb144a530 a2=3 a3=0 items=0 ppid=1 pid=7377 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:50.294687 kernel: audit: type=1327 audit(1707461509.960:1737): proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:49.960000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:50.325173 kernel: audit: type=1105 audit(1707461509.965:1738): pid=7377 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:49.965000 audit[7377]: USER_START pid=7377 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:50.419585 kernel: audit: type=1103 audit(1707461509.966:1739): pid=7379 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:49.966000 audit[7379]: CRED_ACQ pid=7379 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:50.508748 kernel: audit: type=1106 audit(1707461510.045:1740): pid=7377 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:50.045000 audit[7377]: USER_END pid=7377 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:50.604344 kernel: audit: type=1104 audit(1707461510.045:1741): pid=7377 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:50.045000 audit[7377]: CRED_DISP pid=7377 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:50.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-86.109.11.101:22-147.75.109.163:52058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:55.052400 systemd[1]: Started sshd@50-86.109.11.101:22-147.75.109.163:40668.service. Feb 9 06:51:55.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-86.109.11.101:22-147.75.109.163:40668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:55.079654 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:51:55.079749 kernel: audit: type=1130 audit(1707461515.051:1743): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-86.109.11.101:22-147.75.109.163:40668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:55.191000 audit[7402]: USER_ACCT pid=7402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:55.192082 sshd[7402]: Accepted publickey for core from 147.75.109.163 port 40668 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:51:55.193359 sshd[7402]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:51:55.195743 systemd-logind[1464]: New session 39 of user core. Feb 9 06:51:55.196268 systemd[1]: Started session-39.scope. Feb 9 06:51:55.192000 audit[7402]: CRED_ACQ pid=7402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:55.286648 sshd[7402]: pam_unix(sshd:session): session closed for user core Feb 9 06:51:55.287843 systemd[1]: sshd@50-86.109.11.101:22-147.75.109.163:40668.service: Deactivated successfully. Feb 9 06:51:55.288281 systemd[1]: session-39.scope: Deactivated successfully. Feb 9 06:51:55.288639 systemd-logind[1464]: Session 39 logged out. Waiting for processes to exit. Feb 9 06:51:55.289051 systemd-logind[1464]: Removed session 39. Feb 9 06:51:55.374980 kernel: audit: type=1101 audit(1707461515.191:1744): pid=7402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:55.375021 kernel: audit: type=1103 audit(1707461515.192:1745): pid=7402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:55.375039 kernel: audit: type=1006 audit(1707461515.192:1746): pid=7402 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=39 res=1 Feb 9 06:51:55.433453 kernel: audit: type=1300 audit(1707461515.192:1746): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7ffb3900 a2=3 a3=0 items=0 ppid=1 pid=7402 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:55.192000 audit[7402]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7ffb3900 a2=3 a3=0 items=0 ppid=1 pid=7402 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:55.525305 kernel: audit: type=1327 audit(1707461515.192:1746): proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:55.192000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:51:55.555774 kernel: audit: type=1105 audit(1707461515.197:1747): pid=7402 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:55.197000 audit[7402]: USER_START pid=7402 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:55.650116 kernel: audit: type=1103 audit(1707461515.198:1748): pid=7404 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:55.198000 audit[7404]: CRED_ACQ pid=7404 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:55.739344 kernel: audit: type=1106 audit(1707461515.286:1749): pid=7402 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:55.286000 audit[7402]: USER_END pid=7402 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:55.834692 kernel: audit: type=1104 audit(1707461515.286:1750): pid=7402 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:55.286000 audit[7402]: CRED_DISP pid=7402 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:51:55.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-86.109.11.101:22-147.75.109.163:40668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:59.337000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:51:59.337000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012818620 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:51:59.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:51:59.337000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:51:59.337000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c009bd55f0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:51:59.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:51:59.337000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:51:59.337000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a7a7ec0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:51:59.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:51:59.345000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:51:59.345000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012818720 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:51:59.345000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:51:59.345000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:51:59.345000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00ae26420 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:51:59.345000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:51:59.345000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:51:59.345000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00f19fd70 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:51:59.345000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:51:59.467000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:51:59.467000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002f126c0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:51:59.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:51:59.467000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:51:59.467000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012dbf50 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:51:59.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:52:00.291952 systemd[1]: Started sshd@51-86.109.11.101:22-147.75.109.163:40682.service. Feb 9 06:52:00.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-86.109.11.101:22-147.75.109.163:40682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:00.318901 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 06:52:00.318951 kernel: audit: type=1130 audit(1707461520.291:1760): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-86.109.11.101:22-147.75.109.163:40682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:00.428000 audit[7446]: USER_ACCT pid=7446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:00.430136 sshd[7446]: Accepted publickey for core from 147.75.109.163 port 40682 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:52:00.431387 sshd[7446]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:52:00.433692 systemd-logind[1464]: New session 40 of user core. Feb 9 06:52:00.434155 systemd[1]: Started session-40.scope. Feb 9 06:52:00.512082 sshd[7446]: pam_unix(sshd:session): session closed for user core Feb 9 06:52:00.513566 systemd[1]: sshd@51-86.109.11.101:22-147.75.109.163:40682.service: Deactivated successfully. Feb 9 06:52:00.514012 systemd[1]: session-40.scope: Deactivated successfully. Feb 9 06:52:00.514409 systemd-logind[1464]: Session 40 logged out. Waiting for processes to exit. Feb 9 06:52:00.514886 systemd-logind[1464]: Removed session 40. Feb 9 06:52:00.430000 audit[7446]: CRED_ACQ pid=7446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:00.522172 kernel: audit: type=1101 audit(1707461520.428:1761): pid=7446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:00.522205 kernel: audit: type=1103 audit(1707461520.430:1762): pid=7446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:00.670237 kernel: audit: type=1006 audit(1707461520.430:1763): pid=7446 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=40 res=1 Feb 9 06:52:00.670288 kernel: audit: type=1300 audit(1707461520.430:1763): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3077a860 a2=3 a3=0 items=0 ppid=1 pid=7446 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:00.430000 audit[7446]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3077a860 a2=3 a3=0 items=0 ppid=1 pid=7446 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:00.430000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:00.792673 kernel: audit: type=1327 audit(1707461520.430:1763): proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:00.792719 kernel: audit: type=1105 audit(1707461520.435:1764): pid=7446 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:00.435000 audit[7446]: USER_START pid=7446 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:00.435000 audit[7449]: CRED_ACQ pid=7449 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:00.976396 kernel: audit: type=1103 audit(1707461520.435:1765): pid=7449 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:00.976435 kernel: audit: type=1106 audit(1707461520.511:1766): pid=7446 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:00.511000 audit[7446]: USER_END pid=7446 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:00.511000 audit[7446]: CRED_DISP pid=7446 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:01.072126 kernel: audit: type=1104 audit(1707461520.511:1767): pid=7446 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:00.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-86.109.11.101:22-147.75.109.163:40682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:05.517946 systemd[1]: Started sshd@52-86.109.11.101:22-147.75.109.163:42204.service. Feb 9 06:52:05.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-86.109.11.101:22-147.75.109.163:42204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:05.544970 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:52:05.545011 kernel: audit: type=1130 audit(1707461525.516:1769): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-86.109.11.101:22-147.75.109.163:42204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:05.656000 audit[7521]: USER_ACCT pid=7521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:05.657884 sshd[7521]: Accepted publickey for core from 147.75.109.163 port 42204 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:52:05.660190 sshd[7521]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:52:05.665519 systemd-logind[1464]: New session 41 of user core. Feb 9 06:52:05.665974 systemd[1]: Started session-41.scope. Feb 9 06:52:05.742844 sshd[7521]: pam_unix(sshd:session): session closed for user core Feb 9 06:52:05.744155 systemd[1]: sshd@52-86.109.11.101:22-147.75.109.163:42204.service: Deactivated successfully. Feb 9 06:52:05.744610 systemd[1]: session-41.scope: Deactivated successfully. Feb 9 06:52:05.744958 systemd-logind[1464]: Session 41 logged out. Waiting for processes to exit. Feb 9 06:52:05.745326 systemd-logind[1464]: Removed session 41. Feb 9 06:52:05.658000 audit[7521]: CRED_ACQ pid=7521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:05.839376 kernel: audit: type=1101 audit(1707461525.656:1770): pid=7521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:05.839413 kernel: audit: type=1103 audit(1707461525.658:1771): pid=7521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:05.839431 kernel: audit: type=1006 audit(1707461525.658:1772): pid=7521 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=41 res=1 Feb 9 06:52:05.897907 kernel: audit: type=1300 audit(1707461525.658:1772): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe23cee310 a2=3 a3=0 items=0 ppid=1 pid=7521 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:05.658000 audit[7521]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe23cee310 a2=3 a3=0 items=0 ppid=1 pid=7521 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:05.989799 kernel: audit: type=1327 audit(1707461525.658:1772): proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:05.658000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:06.020290 kernel: audit: type=1105 audit(1707461525.666:1773): pid=7521 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:05.666000 audit[7521]: USER_START pid=7521 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:06.114717 kernel: audit: type=1103 audit(1707461525.667:1774): pid=7523 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:05.667000 audit[7523]: CRED_ACQ pid=7523 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:06.203866 kernel: audit: type=1106 audit(1707461525.742:1775): pid=7521 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:05.742000 audit[7521]: USER_END pid=7521 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:06.299341 kernel: audit: type=1104 audit(1707461525.742:1776): pid=7521 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:05.742000 audit[7521]: CRED_DISP pid=7521 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:05.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-86.109.11.101:22-147.75.109.163:42204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:10.742121 systemd[1]: Started sshd@53-86.109.11.101:22-147.75.109.163:42208.service. Feb 9 06:52:10.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-86.109.11.101:22-147.75.109.163:42208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:10.769166 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:52:10.769234 kernel: audit: type=1130 audit(1707461530.741:1778): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-86.109.11.101:22-147.75.109.163:42208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:10.880000 audit[7546]: USER_ACCT pid=7546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:10.881544 sshd[7546]: Accepted publickey for core from 147.75.109.163 port 42208 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:52:10.882914 sshd[7546]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:52:10.885271 systemd-logind[1464]: New session 42 of user core. Feb 9 06:52:10.885928 systemd[1]: Started session-42.scope. Feb 9 06:52:10.970245 sshd[7546]: pam_unix(sshd:session): session closed for user core Feb 9 06:52:10.971673 systemd[1]: sshd@53-86.109.11.101:22-147.75.109.163:42208.service: Deactivated successfully. Feb 9 06:52:10.972111 systemd[1]: session-42.scope: Deactivated successfully. Feb 9 06:52:10.972456 systemd-logind[1464]: Session 42 logged out. Waiting for processes to exit. Feb 9 06:52:10.881000 audit[7546]: CRED_ACQ pid=7546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:10.972916 systemd-logind[1464]: Removed session 42. Feb 9 06:52:11.063168 kernel: audit: type=1101 audit(1707461530.880:1779): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:11.063209 kernel: audit: type=1103 audit(1707461530.881:1780): pid=7546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:11.063228 kernel: audit: type=1006 audit(1707461530.881:1781): pid=7546 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=42 res=1 Feb 9 06:52:11.121687 kernel: audit: type=1300 audit(1707461530.881:1781): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0117aab0 a2=3 a3=0 items=0 ppid=1 pid=7546 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:10.881000 audit[7546]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0117aab0 a2=3 a3=0 items=0 ppid=1 pid=7546 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:11.213582 kernel: audit: type=1327 audit(1707461530.881:1781): proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:10.881000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:11.244077 kernel: audit: type=1105 audit(1707461530.887:1782): pid=7546 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:10.887000 audit[7546]: USER_START pid=7546 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:11.338505 kernel: audit: type=1103 audit(1707461530.887:1783): pid=7548 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:10.887000 audit[7548]: CRED_ACQ pid=7548 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:11.427656 kernel: audit: type=1106 audit(1707461530.969:1784): pid=7546 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:10.969000 audit[7546]: USER_END pid=7546 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:11.523104 kernel: audit: type=1104 audit(1707461530.969:1785): pid=7546 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:10.969000 audit[7546]: CRED_DISP pid=7546 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:10.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-86.109.11.101:22-147.75.109.163:42208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:12.215000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:52:12.215000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000087c40 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:52:12.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:52:12.215000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:52:12.215000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f12e00 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:52:12.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:52:12.216000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:52:12.216000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aa4400 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:52:12.216000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:52:12.216000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:52:12.216000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ac6ca0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:52:12.216000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:52:15.976499 systemd[1]: Started sshd@54-86.109.11.101:22-147.75.109.163:59812.service. Feb 9 06:52:15.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-86.109.11.101:22-147.75.109.163:59812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:16.003566 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 06:52:16.003625 kernel: audit: type=1130 audit(1707461535.975:1791): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-86.109.11.101:22-147.75.109.163:59812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:16.116407 sshd[7571]: Accepted publickey for core from 147.75.109.163 port 59812 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:52:16.115000 audit[7571]: USER_ACCT pid=7571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:16.117360 sshd[7571]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:52:16.119613 systemd-logind[1464]: New session 43 of user core. Feb 9 06:52:16.120229 systemd[1]: Started session-43.scope. Feb 9 06:52:16.116000 audit[7571]: CRED_ACQ pid=7571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:16.298517 kernel: audit: type=1101 audit(1707461536.115:1792): pid=7571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:16.298556 kernel: audit: type=1103 audit(1707461536.116:1793): pid=7571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:16.298577 kernel: audit: type=1006 audit(1707461536.116:1794): pid=7571 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=43 res=1 Feb 9 06:52:16.357039 kernel: audit: type=1300 audit(1707461536.116:1794): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaf6af010 a2=3 a3=0 items=0 ppid=1 pid=7571 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:16.116000 audit[7571]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaf6af010 a2=3 a3=0 items=0 ppid=1 pid=7571 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:16.116000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:16.449153 sshd[7571]: pam_unix(sshd:session): session closed for user core Feb 9 06:52:16.450669 systemd[1]: sshd@54-86.109.11.101:22-147.75.109.163:59812.service: Deactivated successfully. Feb 9 06:52:16.451126 systemd[1]: session-43.scope: Deactivated successfully. Feb 9 06:52:16.451462 systemd-logind[1464]: Session 43 logged out. Waiting for processes to exit. Feb 9 06:52:16.451937 systemd-logind[1464]: Removed session 43. Feb 9 06:52:16.479429 kernel: audit: type=1327 audit(1707461536.116:1794): proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:16.479473 kernel: audit: type=1105 audit(1707461536.121:1795): pid=7571 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:16.121000 audit[7571]: USER_START pid=7571 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:16.573871 kernel: audit: type=1103 audit(1707461536.121:1796): pid=7573 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:16.121000 audit[7573]: CRED_ACQ pid=7573 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:16.663054 kernel: audit: type=1106 audit(1707461536.448:1797): pid=7571 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:16.448000 audit[7571]: USER_END pid=7571 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:16.758465 kernel: audit: type=1104 audit(1707461536.448:1798): pid=7571 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:16.448000 audit[7571]: CRED_DISP pid=7571 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:16.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-86.109.11.101:22-147.75.109.163:59812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:21.396685 systemd[1]: Started sshd@55-86.109.11.101:22-147.75.109.163:59820.service. Feb 9 06:52:21.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-86.109.11.101:22-147.75.109.163:59820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:21.423785 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:52:21.423870 kernel: audit: type=1130 audit(1707461541.396:1800): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-86.109.11.101:22-147.75.109.163:59820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:21.535000 audit[7598]: USER_ACCT pid=7598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:21.536398 sshd[7598]: Accepted publickey for core from 147.75.109.163 port 59820 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:52:21.538393 sshd[7598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:52:21.540729 systemd-logind[1464]: New session 44 of user core. Feb 9 06:52:21.541409 systemd[1]: Started session-44.scope. Feb 9 06:52:21.620013 sshd[7598]: pam_unix(sshd:session): session closed for user core Feb 9 06:52:21.621393 systemd[1]: sshd@55-86.109.11.101:22-147.75.109.163:59820.service: Deactivated successfully. Feb 9 06:52:21.621845 systemd[1]: session-44.scope: Deactivated successfully. Feb 9 06:52:21.622251 systemd-logind[1464]: Session 44 logged out. Waiting for processes to exit. Feb 9 06:52:21.622856 systemd-logind[1464]: Removed session 44. Feb 9 06:52:21.537000 audit[7598]: CRED_ACQ pid=7598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:21.717965 kernel: audit: type=1101 audit(1707461541.535:1801): pid=7598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:21.718013 kernel: audit: type=1103 audit(1707461541.537:1802): pid=7598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:21.718031 kernel: audit: type=1006 audit(1707461541.537:1803): pid=7598 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=44 res=1 Feb 9 06:52:21.776437 kernel: audit: type=1300 audit(1707461541.537:1803): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3940dfb0 a2=3 a3=0 items=0 ppid=1 pid=7598 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:21.537000 audit[7598]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3940dfb0 a2=3 a3=0 items=0 ppid=1 pid=7598 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:21.868330 kernel: audit: type=1327 audit(1707461541.537:1803): proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:21.537000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:21.898801 kernel: audit: type=1105 audit(1707461541.542:1804): pid=7598 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:21.542000 audit[7598]: USER_START pid=7598 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:21.993342 kernel: audit: type=1103 audit(1707461541.543:1805): pid=7600 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:21.543000 audit[7600]: CRED_ACQ pid=7600 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:22.082443 kernel: audit: type=1106 audit(1707461541.619:1806): pid=7598 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:21.619000 audit[7598]: USER_END pid=7598 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:22.177857 kernel: audit: type=1104 audit(1707461541.619:1807): pid=7598 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:21.619000 audit[7598]: CRED_DISP pid=7598 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:21.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-86.109.11.101:22-147.75.109.163:59820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:26.626112 systemd[1]: Started sshd@56-86.109.11.101:22-147.75.109.163:51432.service. Feb 9 06:52:26.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-86.109.11.101:22-147.75.109.163:51432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:26.652970 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:52:26.653011 kernel: audit: type=1130 audit(1707461546.625:1809): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-86.109.11.101:22-147.75.109.163:51432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:26.764000 audit[7625]: USER_ACCT pid=7625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:26.765542 sshd[7625]: Accepted publickey for core from 147.75.109.163 port 51432 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:52:26.766371 sshd[7625]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:52:26.768517 systemd-logind[1464]: New session 45 of user core. Feb 9 06:52:26.769098 systemd[1]: Started session-45.scope. Feb 9 06:52:26.846186 sshd[7625]: pam_unix(sshd:session): session closed for user core Feb 9 06:52:26.847628 systemd[1]: sshd@56-86.109.11.101:22-147.75.109.163:51432.service: Deactivated successfully. Feb 9 06:52:26.848098 systemd[1]: session-45.scope: Deactivated successfully. Feb 9 06:52:26.848501 systemd-logind[1464]: Session 45 logged out. Waiting for processes to exit. Feb 9 06:52:26.848968 systemd-logind[1464]: Removed session 45. Feb 9 06:52:26.765000 audit[7625]: CRED_ACQ pid=7625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:26.947070 kernel: audit: type=1101 audit(1707461546.764:1810): pid=7625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:26.947116 kernel: audit: type=1103 audit(1707461546.765:1811): pid=7625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:26.947138 kernel: audit: type=1006 audit(1707461546.765:1812): pid=7625 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=45 res=1 Feb 9 06:52:27.005577 kernel: audit: type=1300 audit(1707461546.765:1812): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdf4024e0 a2=3 a3=0 items=0 ppid=1 pid=7625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:26.765000 audit[7625]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdf4024e0 a2=3 a3=0 items=0 ppid=1 pid=7625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:27.097432 kernel: audit: type=1327 audit(1707461546.765:1812): proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:26.765000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:27.127886 kernel: audit: type=1105 audit(1707461546.770:1813): pid=7625 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:26.770000 audit[7625]: USER_START pid=7625 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:27.222376 kernel: audit: type=1103 audit(1707461546.770:1814): pid=7627 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:26.770000 audit[7627]: CRED_ACQ pid=7627 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:27.311501 kernel: audit: type=1106 audit(1707461546.845:1815): pid=7625 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:26.845000 audit[7625]: USER_END pid=7625 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:27.406946 kernel: audit: type=1104 audit(1707461546.845:1816): pid=7625 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:26.845000 audit[7625]: CRED_DISP pid=7625 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:26.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-86.109.11.101:22-147.75.109.163:51432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:31.845841 systemd[1]: Started sshd@57-86.109.11.101:22-147.75.109.163:51446.service. Feb 9 06:52:31.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-86.109.11.101:22-147.75.109.163:51446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:31.872636 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:52:31.872715 kernel: audit: type=1130 audit(1707461551.844:1818): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-86.109.11.101:22-147.75.109.163:51446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:31.982000 audit[7691]: USER_ACCT pid=7691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:31.984011 sshd[7691]: Accepted publickey for core from 147.75.109.163 port 51446 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:52:31.985241 sshd[7691]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:52:31.987650 systemd-logind[1464]: New session 46 of user core. Feb 9 06:52:31.988221 systemd[1]: Started session-46.scope. Feb 9 06:52:32.066140 sshd[7691]: pam_unix(sshd:session): session closed for user core Feb 9 06:52:32.067550 systemd[1]: sshd@57-86.109.11.101:22-147.75.109.163:51446.service: Deactivated successfully. Feb 9 06:52:32.068015 systemd[1]: session-46.scope: Deactivated successfully. Feb 9 06:52:32.068371 systemd-logind[1464]: Session 46 logged out. Waiting for processes to exit. Feb 9 06:52:32.068820 systemd-logind[1464]: Removed session 46. Feb 9 06:52:31.983000 audit[7691]: CRED_ACQ pid=7691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:32.165626 kernel: audit: type=1101 audit(1707461551.982:1819): pid=7691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:32.165664 kernel: audit: type=1103 audit(1707461551.983:1820): pid=7691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:32.165681 kernel: audit: type=1006 audit(1707461551.983:1821): pid=7691 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=46 res=1 Feb 9 06:52:32.224176 kernel: audit: type=1300 audit(1707461551.983:1821): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaac52e50 a2=3 a3=0 items=0 ppid=1 pid=7691 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:31.983000 audit[7691]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaac52e50 a2=3 a3=0 items=0 ppid=1 pid=7691 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:32.316250 kernel: audit: type=1327 audit(1707461551.983:1821): proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:31.983000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:32.346730 kernel: audit: type=1105 audit(1707461551.989:1822): pid=7691 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:31.989000 audit[7691]: USER_START pid=7691 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:32.441243 kernel: audit: type=1103 audit(1707461551.989:1823): pid=7697 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:31.989000 audit[7697]: CRED_ACQ pid=7697 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:32.530453 kernel: audit: type=1106 audit(1707461552.065:1824): pid=7691 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:32.065000 audit[7691]: USER_END pid=7691 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:32.590738 systemd[1]: Started sshd@58-86.109.11.101:22-195.87.80.171:39307.service. Feb 9 06:52:32.625951 kernel: audit: type=1104 audit(1707461552.065:1825): pid=7691 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:32.065000 audit[7691]: CRED_DISP pid=7691 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:32.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-86.109.11.101:22-147.75.109.163:51446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:32.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-86.109.11.101:22-195.87.80.171:39307 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:33.636542 sshd[7719]: Invalid user ubuntu from 195.87.80.171 port 39307 Feb 9 06:52:33.642558 sshd[7719]: pam_faillock(sshd:auth): User unknown Feb 9 06:52:33.643696 sshd[7719]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:52:33.643788 sshd[7719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.87.80.171 Feb 9 06:52:33.644873 sshd[7719]: pam_faillock(sshd:auth): User unknown Feb 9 06:52:33.644000 audit[7719]: USER_AUTH pid=7719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:52:35.242307 sshd[7719]: Failed password for invalid user ubuntu from 195.87.80.171 port 39307 ssh2 Feb 9 06:52:37.036484 sshd[7719]: Received disconnect from 195.87.80.171 port 39307:11: Bye Bye [preauth] Feb 9 06:52:37.036484 sshd[7719]: Disconnected from invalid user ubuntu 195.87.80.171 port 39307 [preauth] Feb 9 06:52:37.037400 systemd[1]: sshd@58-86.109.11.101:22-195.87.80.171:39307.service: Deactivated successfully. Feb 9 06:52:37.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-86.109.11.101:22-195.87.80.171:39307 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:37.064557 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 06:52:37.064634 kernel: audit: type=1131 audit(1707461557.036:1829): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-86.109.11.101:22-195.87.80.171:39307 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:37.065795 systemd[1]: Started sshd@59-86.109.11.101:22-147.75.109.163:59168.service. Feb 9 06:52:37.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-86.109.11.101:22-147.75.109.163:59168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:37.154161 kernel: audit: type=1130 audit(1707461557.064:1830): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-86.109.11.101:22-147.75.109.163:59168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:37.263000 audit[7724]: USER_ACCT pid=7724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:37.264589 sshd[7724]: Accepted publickey for core from 147.75.109.163 port 59168 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:52:37.265817 sshd[7724]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:52:37.268467 systemd-logind[1464]: New session 47 of user core. Feb 9 06:52:37.268915 systemd[1]: Started session-47.scope. Feb 9 06:52:37.346745 sshd[7724]: pam_unix(sshd:session): session closed for user core Feb 9 06:52:37.348143 systemd[1]: sshd@59-86.109.11.101:22-147.75.109.163:59168.service: Deactivated successfully. Feb 9 06:52:37.348583 systemd[1]: session-47.scope: Deactivated successfully. Feb 9 06:52:37.348894 systemd-logind[1464]: Session 47 logged out. Waiting for processes to exit. Feb 9 06:52:37.349698 systemd-logind[1464]: Removed session 47. Feb 9 06:52:37.264000 audit[7724]: CRED_ACQ pid=7724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:37.446941 kernel: audit: type=1101 audit(1707461557.263:1831): pid=7724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:37.446977 kernel: audit: type=1103 audit(1707461557.264:1832): pid=7724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:37.446995 kernel: audit: type=1006 audit(1707461557.264:1833): pid=7724 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=47 res=1 Feb 9 06:52:37.505622 kernel: audit: type=1300 audit(1707461557.264:1833): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc04eeaa80 a2=3 a3=0 items=0 ppid=1 pid=7724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:37.264000 audit[7724]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc04eeaa80 a2=3 a3=0 items=0 ppid=1 pid=7724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:37.597502 kernel: audit: type=1327 audit(1707461557.264:1833): proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:37.264000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:37.628004 kernel: audit: type=1105 audit(1707461557.270:1834): pid=7724 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:37.270000 audit[7724]: USER_START pid=7724 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:37.723271 kernel: audit: type=1103 audit(1707461557.270:1835): pid=7726 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:37.270000 audit[7726]: CRED_ACQ pid=7726 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:37.812472 kernel: audit: type=1106 audit(1707461557.346:1836): pid=7724 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:37.346000 audit[7724]: USER_END pid=7724 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:37.346000 audit[7724]: CRED_DISP pid=7724 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:37.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-86.109.11.101:22-147.75.109.163:59168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:42.353684 systemd[1]: Started sshd@60-86.109.11.101:22-147.75.109.163:59182.service. Feb 9 06:52:42.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-86.109.11.101:22-147.75.109.163:59182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:42.380674 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 06:52:42.380740 kernel: audit: type=1130 audit(1707461562.352:1839): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-86.109.11.101:22-147.75.109.163:59182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:42.492000 audit[7748]: USER_ACCT pid=7748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:42.494146 sshd[7748]: Accepted publickey for core from 147.75.109.163 port 59182 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:52:42.498077 sshd[7748]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:52:42.502657 systemd-logind[1464]: New session 48 of user core. Feb 9 06:52:42.503199 systemd[1]: Started session-48.scope. Feb 9 06:52:42.496000 audit[7748]: CRED_ACQ pid=7748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:42.593146 sshd[7748]: pam_unix(sshd:session): session closed for user core Feb 9 06:52:42.594629 systemd[1]: sshd@60-86.109.11.101:22-147.75.109.163:59182.service: Deactivated successfully. Feb 9 06:52:42.595098 systemd[1]: session-48.scope: Deactivated successfully. Feb 9 06:52:42.595503 systemd-logind[1464]: Session 48 logged out. Waiting for processes to exit. Feb 9 06:52:42.596138 systemd-logind[1464]: Removed session 48. Feb 9 06:52:42.679171 kernel: audit: type=1101 audit(1707461562.492:1840): pid=7748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:42.679213 kernel: audit: type=1103 audit(1707461562.496:1841): pid=7748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:42.679233 kernel: audit: type=1006 audit(1707461562.496:1842): pid=7748 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=48 res=1 Feb 9 06:52:42.738022 kernel: audit: type=1300 audit(1707461562.496:1842): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa7b34070 a2=3 a3=0 items=0 ppid=1 pid=7748 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:42.496000 audit[7748]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa7b34070 a2=3 a3=0 items=0 ppid=1 pid=7748 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:42.830417 kernel: audit: type=1327 audit(1707461562.496:1842): proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:42.496000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:42.861050 kernel: audit: type=1105 audit(1707461562.504:1843): pid=7748 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:42.504000 audit[7748]: USER_START pid=7748 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:42.956008 kernel: audit: type=1103 audit(1707461562.505:1844): pid=7750 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:42.505000 audit[7750]: CRED_ACQ pid=7750 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:43.045675 kernel: audit: type=1106 audit(1707461562.592:1845): pid=7748 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:42.592000 audit[7748]: USER_END pid=7748 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:43.141696 kernel: audit: type=1104 audit(1707461562.592:1846): pid=7748 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:42.592000 audit[7748]: CRED_DISP pid=7748 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:42.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-86.109.11.101:22-147.75.109.163:59182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:47.600542 systemd[1]: Started sshd@61-86.109.11.101:22-147.75.109.163:60832.service. Feb 9 06:52:47.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-86.109.11.101:22-147.75.109.163:60832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:47.627777 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:52:47.627885 kernel: audit: type=1130 audit(1707461567.600:1848): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-86.109.11.101:22-147.75.109.163:60832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:47.741000 audit[7776]: USER_ACCT pid=7776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:47.741469 sshd[7776]: Accepted publickey for core from 147.75.109.163 port 60832 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:52:47.742588 sshd[7776]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:52:47.745072 systemd-logind[1464]: New session 49 of user core. Feb 9 06:52:47.745540 systemd[1]: Started session-49.scope. Feb 9 06:52:47.825967 sshd[7776]: pam_unix(sshd:session): session closed for user core Feb 9 06:52:47.827629 systemd[1]: sshd@61-86.109.11.101:22-147.75.109.163:60832.service: Deactivated successfully. Feb 9 06:52:47.828070 systemd[1]: session-49.scope: Deactivated successfully. Feb 9 06:52:47.828569 systemd-logind[1464]: Session 49 logged out. Waiting for processes to exit. Feb 9 06:52:47.829183 systemd-logind[1464]: Removed session 49. Feb 9 06:52:47.742000 audit[7776]: CRED_ACQ pid=7776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:47.923413 kernel: audit: type=1101 audit(1707461567.741:1849): pid=7776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:47.923456 kernel: audit: type=1103 audit(1707461567.742:1850): pid=7776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:47.923476 kernel: audit: type=1006 audit(1707461567.742:1851): pid=7776 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=49 res=1 Feb 9 06:52:47.982341 kernel: audit: type=1300 audit(1707461567.742:1851): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe949364b0 a2=3 a3=0 items=0 ppid=1 pid=7776 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:47.742000 audit[7776]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe949364b0 a2=3 a3=0 items=0 ppid=1 pid=7776 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:48.074843 kernel: audit: type=1327 audit(1707461567.742:1851): proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:47.742000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:48.105551 kernel: audit: type=1105 audit(1707461567.748:1852): pid=7776 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:47.748000 audit[7776]: USER_START pid=7776 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:48.200550 kernel: audit: type=1103 audit(1707461567.749:1853): pid=7778 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:47.749000 audit[7778]: CRED_ACQ pid=7778 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:47.825000 audit[7776]: USER_END pid=7776 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:48.385413 kernel: audit: type=1106 audit(1707461567.825:1854): pid=7776 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:48.385482 kernel: audit: type=1104 audit(1707461567.825:1855): pid=7776 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:47.825000 audit[7776]: CRED_DISP pid=7776 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:47.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-86.109.11.101:22-147.75.109.163:60832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:52.829173 systemd[1]: Started sshd@62-86.109.11.101:22-147.75.109.163:60844.service. Feb 9 06:52:52.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-86.109.11.101:22-147.75.109.163:60844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:52.856316 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:52:52.856413 kernel: audit: type=1130 audit(1707461572.828:1857): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-86.109.11.101:22-147.75.109.163:60844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:52.967000 audit[7800]: USER_ACCT pid=7800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:52.968550 sshd[7800]: Accepted publickey for core from 147.75.109.163 port 60844 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:52:52.969934 sshd[7800]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:52:52.972552 systemd-logind[1464]: New session 50 of user core. Feb 9 06:52:52.973035 systemd[1]: Started session-50.scope. Feb 9 06:52:53.052114 sshd[7800]: pam_unix(sshd:session): session closed for user core Feb 9 06:52:53.053753 systemd[1]: sshd@62-86.109.11.101:22-147.75.109.163:60844.service: Deactivated successfully. Feb 9 06:52:53.054202 systemd[1]: session-50.scope: Deactivated successfully. Feb 9 06:52:53.054704 systemd-logind[1464]: Session 50 logged out. Waiting for processes to exit. Feb 9 06:52:53.055371 systemd-logind[1464]: Removed session 50. Feb 9 06:52:52.968000 audit[7800]: CRED_ACQ pid=7800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:53.150306 kernel: audit: type=1101 audit(1707461572.967:1858): pid=7800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:53.150347 kernel: audit: type=1103 audit(1707461572.968:1859): pid=7800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:53.150364 kernel: audit: type=1006 audit(1707461572.968:1860): pid=7800 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=50 res=1 Feb 9 06:52:53.208872 kernel: audit: type=1300 audit(1707461572.968:1860): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc69c2a020 a2=3 a3=0 items=0 ppid=1 pid=7800 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:52.968000 audit[7800]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc69c2a020 a2=3 a3=0 items=0 ppid=1 pid=7800 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:53.300835 kernel: audit: type=1327 audit(1707461572.968:1860): proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:52.968000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:52.975000 audit[7800]: USER_START pid=7800 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:53.425872 kernel: audit: type=1105 audit(1707461572.975:1861): pid=7800 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:53.425901 kernel: audit: type=1103 audit(1707461572.975:1862): pid=7802 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:52.975000 audit[7802]: CRED_ACQ pid=7802 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:53.515056 kernel: audit: type=1106 audit(1707461573.051:1863): pid=7800 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:53.051000 audit[7800]: USER_END pid=7800 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:53.610591 kernel: audit: type=1104 audit(1707461573.051:1864): pid=7800 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:53.051000 audit[7800]: CRED_DISP pid=7800 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:53.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-86.109.11.101:22-147.75.109.163:60844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:58.061604 systemd[1]: Started sshd@63-86.109.11.101:22-147.75.109.163:40776.service. Feb 9 06:52:58.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-86.109.11.101:22-147.75.109.163:40776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:58.089089 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:52:58.089159 kernel: audit: type=1130 audit(1707461578.060:1866): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-86.109.11.101:22-147.75.109.163:40776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:58.199000 audit[7825]: USER_ACCT pid=7825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:58.200576 sshd[7825]: Accepted publickey for core from 147.75.109.163 port 40776 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:52:58.201374 sshd[7825]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:52:58.203566 systemd-logind[1464]: New session 51 of user core. Feb 9 06:52:58.204193 systemd[1]: Started session-51.scope. Feb 9 06:52:58.281796 sshd[7825]: pam_unix(sshd:session): session closed for user core Feb 9 06:52:58.283191 systemd[1]: sshd@63-86.109.11.101:22-147.75.109.163:40776.service: Deactivated successfully. Feb 9 06:52:58.283647 systemd[1]: session-51.scope: Deactivated successfully. Feb 9 06:52:58.283939 systemd-logind[1464]: Session 51 logged out. Waiting for processes to exit. Feb 9 06:52:58.284449 systemd-logind[1464]: Removed session 51. Feb 9 06:52:58.200000 audit[7825]: CRED_ACQ pid=7825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:58.382232 kernel: audit: type=1101 audit(1707461578.199:1867): pid=7825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:58.382275 kernel: audit: type=1103 audit(1707461578.200:1868): pid=7825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:58.382294 kernel: audit: type=1006 audit(1707461578.200:1869): pid=7825 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=51 res=1 Feb 9 06:52:58.440786 kernel: audit: type=1300 audit(1707461578.200:1869): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd392f2bb0 a2=3 a3=0 items=0 ppid=1 pid=7825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:58.200000 audit[7825]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd392f2bb0 a2=3 a3=0 items=0 ppid=1 pid=7825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:52:58.532720 kernel: audit: type=1327 audit(1707461578.200:1869): proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:58.200000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:52:58.563173 kernel: audit: type=1105 audit(1707461578.204:1870): pid=7825 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:58.204000 audit[7825]: USER_START pid=7825 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:58.657561 kernel: audit: type=1103 audit(1707461578.205:1871): pid=7827 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:58.205000 audit[7827]: CRED_ACQ pid=7827 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:58.746723 kernel: audit: type=1106 audit(1707461578.281:1872): pid=7825 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:58.281000 audit[7825]: USER_END pid=7825 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:58.842316 kernel: audit: type=1104 audit(1707461578.281:1873): pid=7825 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:58.281000 audit[7825]: CRED_DISP pid=7825 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:52:58.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-86.109.11.101:22-147.75.109.163:40776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:59.338000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:52:59.338000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00a72de00 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:52:59.338000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:52:59.338000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:52:59.338000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:52:59.338000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a2e5410 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:52:59.338000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0098b5cb0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:52:59.338000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:52:59.338000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:52:59.345000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:52:59.345000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01578e630 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:52:59.345000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:52:59.346000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:52:59.346000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01578e660 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:52:59.346000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:52:59.346000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:52:59.346000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0087bb900 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:52:59.346000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:52:59.469000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:52:59.469000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002f123c0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:52:59.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:52:59.469000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:52:59.469000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023b5410 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:52:59.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:53:03.288889 systemd[1]: Started sshd@64-86.109.11.101:22-147.75.109.163:40784.service. Feb 9 06:53:03.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-86.109.11.101:22-147.75.109.163:40784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:03.315895 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 06:53:03.315976 kernel: audit: type=1130 audit(1707461583.287:1883): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-86.109.11.101:22-147.75.109.163:40784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:03.427000 audit[7914]: USER_ACCT pid=7914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:03.428553 sshd[7914]: Accepted publickey for core from 147.75.109.163 port 40784 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:53:03.429984 sshd[7914]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:53:03.432303 systemd-logind[1464]: New session 52 of user core. Feb 9 06:53:03.432860 systemd[1]: Started session-52.scope. Feb 9 06:53:03.428000 audit[7914]: CRED_ACQ pid=7914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:03.523802 sshd[7914]: pam_unix(sshd:session): session closed for user core Feb 9 06:53:03.525250 systemd[1]: sshd@64-86.109.11.101:22-147.75.109.163:40784.service: Deactivated successfully. Feb 9 06:53:03.525694 systemd[1]: session-52.scope: Deactivated successfully. Feb 9 06:53:03.525971 systemd-logind[1464]: Session 52 logged out. Waiting for processes to exit. Feb 9 06:53:03.526546 systemd-logind[1464]: Removed session 52. Feb 9 06:53:03.612034 kernel: audit: type=1101 audit(1707461583.427:1884): pid=7914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:03.612074 kernel: audit: type=1103 audit(1707461583.428:1885): pid=7914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:03.612094 kernel: audit: type=1006 audit(1707461583.428:1886): pid=7914 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=52 res=1 Feb 9 06:53:03.670681 kernel: audit: type=1300 audit(1707461583.428:1886): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc72967d0 a2=3 a3=0 items=0 ppid=1 pid=7914 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:03.428000 audit[7914]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc72967d0 a2=3 a3=0 items=0 ppid=1 pid=7914 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:03.762563 kernel: audit: type=1327 audit(1707461583.428:1886): proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:03.428000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:03.793028 kernel: audit: type=1105 audit(1707461583.434:1887): pid=7914 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:03.434000 audit[7914]: USER_START pid=7914 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:03.887414 kernel: audit: type=1103 audit(1707461583.434:1888): pid=7916 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:03.434000 audit[7916]: CRED_ACQ pid=7916 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:03.523000 audit[7914]: USER_END pid=7914 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:04.071953 kernel: audit: type=1106 audit(1707461583.523:1889): pid=7914 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:04.071987 kernel: audit: type=1104 audit(1707461583.523:1890): pid=7914 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:03.523000 audit[7914]: CRED_DISP pid=7914 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:03.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-86.109.11.101:22-147.75.109.163:40784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:08.531761 systemd[1]: Started sshd@65-86.109.11.101:22-147.75.109.163:42952.service. Feb 9 06:53:08.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-86.109.11.101:22-147.75.109.163:42952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:08.558839 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:53:08.558895 kernel: audit: type=1130 audit(1707461588.530:1892): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-86.109.11.101:22-147.75.109.163:42952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:08.669000 audit[7942]: USER_ACCT pid=7942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:08.671118 sshd[7942]: Accepted publickey for core from 147.75.109.163 port 42952 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:53:08.672334 sshd[7942]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:53:08.674696 systemd-logind[1464]: New session 53 of user core. Feb 9 06:53:08.675166 systemd[1]: Started session-53.scope. Feb 9 06:53:08.671000 audit[7942]: CRED_ACQ pid=7942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:08.764390 sshd[7942]: pam_unix(sshd:session): session closed for user core Feb 9 06:53:08.765825 systemd[1]: sshd@65-86.109.11.101:22-147.75.109.163:42952.service: Deactivated successfully. Feb 9 06:53:08.766266 systemd[1]: session-53.scope: Deactivated successfully. Feb 9 06:53:08.766680 systemd-logind[1464]: Session 53 logged out. Waiting for processes to exit. Feb 9 06:53:08.767176 systemd-logind[1464]: Removed session 53. Feb 9 06:53:08.852742 kernel: audit: type=1101 audit(1707461588.669:1893): pid=7942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:08.852789 kernel: audit: type=1103 audit(1707461588.671:1894): pid=7942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:08.852807 kernel: audit: type=1006 audit(1707461588.671:1895): pid=7942 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=53 res=1 Feb 9 06:53:08.911284 kernel: audit: type=1300 audit(1707461588.671:1895): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc9332730 a2=3 a3=0 items=0 ppid=1 pid=7942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:08.671000 audit[7942]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc9332730 a2=3 a3=0 items=0 ppid=1 pid=7942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:08.671000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:09.033863 kernel: audit: type=1327 audit(1707461588.671:1895): proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:09.033899 kernel: audit: type=1105 audit(1707461588.676:1896): pid=7942 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:08.676000 audit[7942]: USER_START pid=7942 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:09.128295 kernel: audit: type=1103 audit(1707461588.676:1897): pid=7944 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:08.676000 audit[7944]: CRED_ACQ pid=7944 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:08.763000 audit[7942]: USER_END pid=7942 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:09.218169 kernel: audit: type=1106 audit(1707461588.763:1898): pid=7942 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:08.764000 audit[7942]: CRED_DISP pid=7942 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:09.313162 kernel: audit: type=1104 audit(1707461588.764:1899): pid=7942 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:08.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-86.109.11.101:22-147.75.109.163:42952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:12.216000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:53:12.216000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d17b00 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:53:12.216000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:53:12.216000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:53:12.216000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f12b80 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:53:12.216000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:53:12.217000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:53:12.217000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002f12ba0 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:53:12.217000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:53:12.217000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:53:12.217000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001104000 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:53:12.217000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:53:13.768407 systemd[1]: Started sshd@66-86.109.11.101:22-147.75.109.163:42960.service. Feb 9 06:53:13.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-86.109.11.101:22-147.75.109.163:42960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:13.795681 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 06:53:13.795756 kernel: audit: type=1130 audit(1707461593.767:1905): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-86.109.11.101:22-147.75.109.163:42960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:13.905000 audit[7968]: USER_ACCT pid=7968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:13.906564 sshd[7968]: Accepted publickey for core from 147.75.109.163 port 42960 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:53:13.907640 sshd[7968]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:53:13.909769 systemd-logind[1464]: New session 54 of user core. Feb 9 06:53:13.910273 systemd[1]: Started session-54.scope. Feb 9 06:53:13.906000 audit[7968]: CRED_ACQ pid=7968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:14.088335 kernel: audit: type=1101 audit(1707461593.905:1906): pid=7968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:14.088377 kernel: audit: type=1103 audit(1707461593.906:1907): pid=7968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:14.088394 kernel: audit: type=1006 audit(1707461593.906:1908): pid=7968 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=54 res=1 Feb 9 06:53:14.146855 kernel: audit: type=1300 audit(1707461593.906:1908): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd35b9e5b0 a2=3 a3=0 items=0 ppid=1 pid=7968 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:13.906000 audit[7968]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd35b9e5b0 a2=3 a3=0 items=0 ppid=1 pid=7968 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:14.238816 kernel: audit: type=1327 audit(1707461593.906:1908): proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:13.906000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:14.239055 sshd[7968]: pam_unix(sshd:session): session closed for user core Feb 9 06:53:14.240461 systemd[1]: sshd@66-86.109.11.101:22-147.75.109.163:42960.service: Deactivated successfully. Feb 9 06:53:14.240901 systemd[1]: session-54.scope: Deactivated successfully. Feb 9 06:53:14.241288 systemd-logind[1464]: Session 54 logged out. Waiting for processes to exit. Feb 9 06:53:14.241768 systemd-logind[1464]: Removed session 54. Feb 9 06:53:14.269326 kernel: audit: type=1105 audit(1707461593.911:1909): pid=7968 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:13.911000 audit[7968]: USER_START pid=7968 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:14.363761 kernel: audit: type=1103 audit(1707461593.912:1910): pid=7970 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:13.912000 audit[7970]: CRED_ACQ pid=7970 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:14.452954 kernel: audit: type=1106 audit(1707461594.238:1911): pid=7968 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:14.238000 audit[7968]: USER_END pid=7968 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:14.548387 kernel: audit: type=1104 audit(1707461594.238:1912): pid=7968 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:14.238000 audit[7968]: CRED_DISP pid=7968 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:14.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-86.109.11.101:22-147.75.109.163:42960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:19.190327 systemd[1]: Started sshd@67-86.109.11.101:22-147.75.109.163:39270.service. Feb 9 06:53:19.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-86.109.11.101:22-147.75.109.163:39270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:19.217553 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:53:19.217632 kernel: audit: type=1130 audit(1707461599.190:1914): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-86.109.11.101:22-147.75.109.163:39270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:19.330000 audit[8011]: USER_ACCT pid=8011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:19.331242 sshd[8011]: Accepted publickey for core from 147.75.109.163 port 39270 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:53:19.333437 sshd[8011]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:53:19.338977 systemd-logind[1464]: New session 55 of user core. Feb 9 06:53:19.340151 systemd[1]: Started session-55.scope. Feb 9 06:53:19.421157 sshd[8011]: pam_unix(sshd:session): session closed for user core Feb 9 06:53:19.332000 audit[8011]: CRED_ACQ pid=8011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:19.422660 systemd[1]: sshd@67-86.109.11.101:22-147.75.109.163:39270.service: Deactivated successfully. Feb 9 06:53:19.423110 systemd[1]: session-55.scope: Deactivated successfully. Feb 9 06:53:19.423547 systemd-logind[1464]: Session 55 logged out. Waiting for processes to exit. Feb 9 06:53:19.424029 systemd-logind[1464]: Removed session 55. Feb 9 06:53:19.512747 kernel: audit: type=1101 audit(1707461599.330:1915): pid=8011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:19.512786 kernel: audit: type=1103 audit(1707461599.332:1916): pid=8011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:19.512806 kernel: audit: type=1006 audit(1707461599.332:1917): pid=8011 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=55 res=1 Feb 9 06:53:19.571229 kernel: audit: type=1300 audit(1707461599.332:1917): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe53717bf0 a2=3 a3=0 items=0 ppid=1 pid=8011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:19.332000 audit[8011]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe53717bf0 a2=3 a3=0 items=0 ppid=1 pid=8011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:19.663170 kernel: audit: type=1327 audit(1707461599.332:1917): proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:19.332000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:19.693583 kernel: audit: type=1105 audit(1707461599.345:1918): pid=8011 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:19.345000 audit[8011]: USER_START pid=8011 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:19.787955 kernel: audit: type=1103 audit(1707461599.346:1919): pid=8013 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:19.346000 audit[8013]: CRED_ACQ pid=8013 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:19.877046 kernel: audit: type=1106 audit(1707461599.420:1920): pid=8011 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:19.420000 audit[8011]: USER_END pid=8011 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:19.972465 kernel: audit: type=1104 audit(1707461599.420:1921): pid=8011 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:19.420000 audit[8011]: CRED_DISP pid=8011 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:19.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-86.109.11.101:22-147.75.109.163:39270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:24.428789 systemd[1]: Started sshd@68-86.109.11.101:22-147.75.109.163:47700.service. Feb 9 06:53:24.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-86.109.11.101:22-147.75.109.163:47700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:24.456006 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:53:24.456043 kernel: audit: type=1130 audit(1707461604.427:1923): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-86.109.11.101:22-147.75.109.163:47700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:24.567000 audit[8036]: USER_ACCT pid=8036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:24.568589 sshd[8036]: Accepted publickey for core from 147.75.109.163 port 47700 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:53:24.570122 sshd[8036]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:53:24.572461 systemd-logind[1464]: New session 56 of user core. Feb 9 06:53:24.572967 systemd[1]: Started session-56.scope. Feb 9 06:53:24.649955 sshd[8036]: pam_unix(sshd:session): session closed for user core Feb 9 06:53:24.651385 systemd[1]: sshd@68-86.109.11.101:22-147.75.109.163:47700.service: Deactivated successfully. Feb 9 06:53:24.651822 systemd[1]: session-56.scope: Deactivated successfully. Feb 9 06:53:24.652099 systemd-logind[1464]: Session 56 logged out. Waiting for processes to exit. Feb 9 06:53:24.652717 systemd-logind[1464]: Removed session 56. Feb 9 06:53:24.568000 audit[8036]: CRED_ACQ pid=8036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:24.750064 kernel: audit: type=1101 audit(1707461604.567:1924): pid=8036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:24.750113 kernel: audit: type=1103 audit(1707461604.568:1925): pid=8036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:24.750133 kernel: audit: type=1006 audit(1707461604.568:1926): pid=8036 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=56 res=1 Feb 9 06:53:24.808540 kernel: audit: type=1300 audit(1707461604.568:1926): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6929cbb0 a2=3 a3=0 items=0 ppid=1 pid=8036 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:24.568000 audit[8036]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6929cbb0 a2=3 a3=0 items=0 ppid=1 pid=8036 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:24.900417 kernel: audit: type=1327 audit(1707461604.568:1926): proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:24.568000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:24.930880 kernel: audit: type=1105 audit(1707461604.573:1927): pid=8036 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:24.573000 audit[8036]: USER_START pid=8036 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:25.025294 kernel: audit: type=1103 audit(1707461604.574:1928): pid=8038 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:24.574000 audit[8038]: CRED_ACQ pid=8038 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:24.649000 audit[8036]: USER_END pid=8036 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:25.210060 kernel: audit: type=1106 audit(1707461604.649:1929): pid=8036 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:25.210126 kernel: audit: type=1104 audit(1707461604.649:1930): pid=8036 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:24.649000 audit[8036]: CRED_DISP pid=8036 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:24.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-86.109.11.101:22-147.75.109.163:47700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:29.657969 systemd[1]: Started sshd@69-86.109.11.101:22-147.75.109.163:47702.service. Feb 9 06:53:29.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-86.109.11.101:22-147.75.109.163:47702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:29.685146 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:53:29.685232 kernel: audit: type=1130 audit(1707461609.658:1932): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-86.109.11.101:22-147.75.109.163:47702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:29.797122 sshd[8062]: Accepted publickey for core from 147.75.109.163 port 47702 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:53:29.797000 audit[8062]: USER_ACCT pid=8062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:29.799596 sshd[8062]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:53:29.802134 systemd-logind[1464]: New session 57 of user core. Feb 9 06:53:29.802685 systemd[1]: Started session-57.scope. Feb 9 06:53:29.880104 sshd[8062]: pam_unix(sshd:session): session closed for user core Feb 9 06:53:29.881607 systemd[1]: sshd@69-86.109.11.101:22-147.75.109.163:47702.service: Deactivated successfully. Feb 9 06:53:29.882049 systemd[1]: session-57.scope: Deactivated successfully. Feb 9 06:53:29.882462 systemd-logind[1464]: Session 57 logged out. Waiting for processes to exit. Feb 9 06:53:29.882957 systemd-logind[1464]: Removed session 57. Feb 9 06:53:29.799000 audit[8062]: CRED_ACQ pid=8062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:29.978884 kernel: audit: type=1101 audit(1707461609.797:1933): pid=8062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:29.978922 kernel: audit: type=1103 audit(1707461609.799:1934): pid=8062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:29.978938 kernel: audit: type=1006 audit(1707461609.799:1935): pid=8062 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=57 res=1 Feb 9 06:53:30.037436 kernel: audit: type=1300 audit(1707461609.799:1935): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa63b1740 a2=3 a3=0 items=0 ppid=1 pid=8062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:29.799000 audit[8062]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa63b1740 a2=3 a3=0 items=0 ppid=1 pid=8062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:30.129425 kernel: audit: type=1327 audit(1707461609.799:1935): proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:29.799000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:30.159931 kernel: audit: type=1105 audit(1707461609.804:1936): pid=8062 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:29.804000 audit[8062]: USER_START pid=8062 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:30.254581 kernel: audit: type=1103 audit(1707461609.805:1937): pid=8064 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:29.805000 audit[8064]: CRED_ACQ pid=8064 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:30.343851 kernel: audit: type=1106 audit(1707461609.880:1938): pid=8062 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:29.880000 audit[8062]: USER_END pid=8062 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:30.439395 kernel: audit: type=1104 audit(1707461609.880:1939): pid=8062 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:29.880000 audit[8062]: CRED_DISP pid=8062 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:29.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-86.109.11.101:22-147.75.109.163:47702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:34.888861 systemd[1]: Started sshd@70-86.109.11.101:22-147.75.109.163:35208.service. Feb 9 06:53:34.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-86.109.11.101:22-147.75.109.163:35208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:34.915792 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:53:34.915832 kernel: audit: type=1130 audit(1707461614.887:1941): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-86.109.11.101:22-147.75.109.163:35208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:35.027000 audit[8132]: USER_ACCT pid=8132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:35.029244 sshd[8132]: Accepted publickey for core from 147.75.109.163 port 35208 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:53:35.033407 sshd[8132]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:53:35.037970 systemd-logind[1464]: New session 58 of user core. Feb 9 06:53:35.038658 systemd[1]: Started session-58.scope. Feb 9 06:53:35.031000 audit[8132]: CRED_ACQ pid=8132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:35.122435 sshd[8132]: pam_unix(sshd:session): session closed for user core Feb 9 06:53:35.123873 systemd[1]: sshd@70-86.109.11.101:22-147.75.109.163:35208.service: Deactivated successfully. Feb 9 06:53:35.124358 systemd[1]: session-58.scope: Deactivated successfully. Feb 9 06:53:35.124720 systemd-logind[1464]: Session 58 logged out. Waiting for processes to exit. Feb 9 06:53:35.125150 systemd-logind[1464]: Removed session 58. Feb 9 06:53:35.210730 kernel: audit: type=1101 audit(1707461615.027:1942): pid=8132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:35.210794 kernel: audit: type=1103 audit(1707461615.031:1943): pid=8132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:35.210811 kernel: audit: type=1006 audit(1707461615.031:1944): pid=8132 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=58 res=1 Feb 9 06:53:35.269266 kernel: audit: type=1300 audit(1707461615.031:1944): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc593cba0 a2=3 a3=0 items=0 ppid=1 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:35.031000 audit[8132]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc593cba0 a2=3 a3=0 items=0 ppid=1 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:35.361278 kernel: audit: type=1327 audit(1707461615.031:1944): proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:35.031000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:35.391791 kernel: audit: type=1105 audit(1707461615.039:1945): pid=8132 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:35.039000 audit[8132]: USER_START pid=8132 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:35.040000 audit[8134]: CRED_ACQ pid=8134 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:35.575401 kernel: audit: type=1103 audit(1707461615.040:1946): pid=8134 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:35.575438 kernel: audit: type=1106 audit(1707461615.121:1947): pid=8132 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:35.121000 audit[8132]: USER_END pid=8132 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:35.670840 kernel: audit: type=1104 audit(1707461615.122:1948): pid=8132 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:35.122000 audit[8132]: CRED_DISP pid=8132 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:35.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-86.109.11.101:22-147.75.109.163:35208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:35.867446 systemd[1]: Started sshd@71-86.109.11.101:22-195.87.80.171:48505.service. Feb 9 06:53:35.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-86.109.11.101:22-195.87.80.171:48505 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:37.749596 sshd[8157]: Invalid user fmaster from 195.87.80.171 port 48505 Feb 9 06:53:37.751385 sshd[8157]: pam_faillock(sshd:auth): User unknown Feb 9 06:53:37.751747 sshd[8157]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:53:37.751776 sshd[8157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.87.80.171 Feb 9 06:53:37.752067 sshd[8157]: pam_faillock(sshd:auth): User unknown Feb 9 06:53:37.752000 audit[8157]: USER_AUTH pid=8157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fmaster" exe="/usr/sbin/sshd" hostname=195.87.80.171 addr=195.87.80.171 terminal=ssh res=failed' Feb 9 06:53:40.131123 systemd[1]: Started sshd@72-86.109.11.101:22-147.75.109.163:35220.service. Feb 9 06:53:40.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-86.109.11.101:22-147.75.109.163:35220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:40.158060 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 06:53:40.158101 kernel: audit: type=1130 audit(1707461620.130:1952): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-86.109.11.101:22-147.75.109.163:35220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:40.268000 audit[8161]: USER_ACCT pid=8161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:40.270034 sshd[8161]: Accepted publickey for core from 147.75.109.163 port 35220 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:53:40.271406 sshd[8161]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:53:40.273776 systemd-logind[1464]: New session 59 of user core. Feb 9 06:53:40.274273 systemd[1]: Started session-59.scope. Feb 9 06:53:40.270000 audit[8161]: CRED_ACQ pid=8161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:40.363417 sshd[8161]: pam_unix(sshd:session): session closed for user core Feb 9 06:53:40.364842 systemd[1]: sshd@72-86.109.11.101:22-147.75.109.163:35220.service: Deactivated successfully. Feb 9 06:53:40.365325 systemd[1]: session-59.scope: Deactivated successfully. Feb 9 06:53:40.365677 systemd-logind[1464]: Session 59 logged out. Waiting for processes to exit. Feb 9 06:53:40.366256 systemd-logind[1464]: Removed session 59. Feb 9 06:53:40.451730 kernel: audit: type=1101 audit(1707461620.268:1953): pid=8161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:40.451779 kernel: audit: type=1103 audit(1707461620.270:1954): pid=8161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:40.451795 kernel: audit: type=1006 audit(1707461620.270:1955): pid=8161 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=59 res=1 Feb 9 06:53:40.468222 sshd[8157]: Failed password for invalid user fmaster from 195.87.80.171 port 48505 ssh2 Feb 9 06:53:40.510266 kernel: audit: type=1300 audit(1707461620.270:1955): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd19c830a0 a2=3 a3=0 items=0 ppid=1 pid=8161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:40.270000 audit[8161]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd19c830a0 a2=3 a3=0 items=0 ppid=1 pid=8161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:40.602239 kernel: audit: type=1327 audit(1707461620.270:1955): proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:40.270000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:40.632864 kernel: audit: type=1105 audit(1707461620.275:1956): pid=8161 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:40.275000 audit[8161]: USER_START pid=8161 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:40.727274 kernel: audit: type=1103 audit(1707461620.275:1957): pid=8163 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:40.275000 audit[8163]: CRED_ACQ pid=8163 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:40.816466 kernel: audit: type=1106 audit(1707461620.362:1958): pid=8161 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:40.362000 audit[8161]: USER_END pid=8161 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:40.911934 kernel: audit: type=1104 audit(1707461620.363:1959): pid=8161 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:40.363000 audit[8161]: CRED_DISP pid=8161 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:40.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-86.109.11.101:22-147.75.109.163:35220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:43.177234 sshd[8157]: Received disconnect from 195.87.80.171 port 48505:11: Bye Bye [preauth] Feb 9 06:53:43.177234 sshd[8157]: Disconnected from invalid user fmaster 195.87.80.171 port 48505 [preauth] Feb 9 06:53:43.179735 systemd[1]: sshd@71-86.109.11.101:22-195.87.80.171:48505.service: Deactivated successfully. Feb 9 06:53:43.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-86.109.11.101:22-195.87.80.171:48505 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:45.371624 systemd[1]: Started sshd@73-86.109.11.101:22-147.75.109.163:46340.service. Feb 9 06:53:45.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-86.109.11.101:22-147.75.109.163:46340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:45.397986 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 06:53:45.398025 kernel: audit: type=1130 audit(1707461625.370:1962): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-86.109.11.101:22-147.75.109.163:46340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:45.509000 audit[8193]: USER_ACCT pid=8193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:45.510292 sshd[8193]: Accepted publickey for core from 147.75.109.163 port 46340 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:53:45.512362 sshd[8193]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:53:45.514751 systemd-logind[1464]: New session 60 of user core. Feb 9 06:53:45.515240 systemd[1]: Started session-60.scope. Feb 9 06:53:45.591604 sshd[8193]: pam_unix(sshd:session): session closed for user core Feb 9 06:53:45.592867 systemd[1]: sshd@73-86.109.11.101:22-147.75.109.163:46340.service: Deactivated successfully. Feb 9 06:53:45.593322 systemd[1]: session-60.scope: Deactivated successfully. Feb 9 06:53:45.593696 systemd-logind[1464]: Session 60 logged out. Waiting for processes to exit. Feb 9 06:53:45.594102 systemd-logind[1464]: Removed session 60. Feb 9 06:53:45.511000 audit[8193]: CRED_ACQ pid=8193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:45.691880 kernel: audit: type=1101 audit(1707461625.509:1963): pid=8193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:45.691922 kernel: audit: type=1103 audit(1707461625.511:1964): pid=8193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:45.691941 kernel: audit: type=1006 audit(1707461625.511:1965): pid=8193 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=60 res=1 Feb 9 06:53:45.750397 kernel: audit: type=1300 audit(1707461625.511:1965): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2e761c70 a2=3 a3=0 items=0 ppid=1 pid=8193 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:45.511000 audit[8193]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2e761c70 a2=3 a3=0 items=0 ppid=1 pid=8193 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:45.842328 kernel: audit: type=1327 audit(1707461625.511:1965): proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:45.511000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:45.872817 kernel: audit: type=1105 audit(1707461625.516:1966): pid=8193 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:45.516000 audit[8193]: USER_START pid=8193 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:45.967220 kernel: audit: type=1103 audit(1707461625.516:1967): pid=8195 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:45.516000 audit[8195]: CRED_ACQ pid=8195 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:46.056322 kernel: audit: type=1106 audit(1707461625.591:1968): pid=8193 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:45.591000 audit[8193]: USER_END pid=8193 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:46.151699 kernel: audit: type=1104 audit(1707461625.591:1969): pid=8193 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:45.591000 audit[8193]: CRED_DISP pid=8193 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:45.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-86.109.11.101:22-147.75.109.163:46340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:48.419000 audit[8219]: NETFILTER_CFG table=filter:123 family=2 entries=22 op=nft_register_rule pid=8219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:53:48.419000 audit[8219]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffee66c0840 a2=0 a3=7ffee66c082c items=0 ppid=2856 pid=8219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:48.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:53:48.421000 audit[8219]: NETFILTER_CFG table=nat:124 family=2 entries=104 op=nft_register_chain pid=8219 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:53:48.421000 audit[8219]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffee66c0840 a2=0 a3=7ffee66c082c items=0 ppid=2856 pid=8219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:48.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:53:50.600232 systemd[1]: Started sshd@74-86.109.11.101:22-147.75.109.163:46354.service. Feb 9 06:53:50.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-86.109.11.101:22-147.75.109.163:46354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:50.627038 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 06:53:50.627116 kernel: audit: type=1130 audit(1707461630.599:1973): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-86.109.11.101:22-147.75.109.163:46354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:50.738000 audit[8224]: USER_ACCT pid=8224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:50.739552 sshd[8224]: Accepted publickey for core from 147.75.109.163 port 46354 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:53:50.740784 sshd[8224]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:53:50.743210 systemd-logind[1464]: New session 61 of user core. Feb 9 06:53:50.743672 systemd[1]: Started session-61.scope. Feb 9 06:53:50.739000 audit[8224]: CRED_ACQ pid=8224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:50.832707 sshd[8224]: pam_unix(sshd:session): session closed for user core Feb 9 06:53:50.833834 systemd[1]: sshd@74-86.109.11.101:22-147.75.109.163:46354.service: Deactivated successfully. Feb 9 06:53:50.834274 systemd[1]: session-61.scope: Deactivated successfully. Feb 9 06:53:50.834617 systemd-logind[1464]: Session 61 logged out. Waiting for processes to exit. Feb 9 06:53:50.835026 systemd-logind[1464]: Removed session 61. Feb 9 06:53:50.921098 kernel: audit: type=1101 audit(1707461630.738:1974): pid=8224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:50.921139 kernel: audit: type=1103 audit(1707461630.739:1975): pid=8224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:50.921156 kernel: audit: type=1006 audit(1707461630.739:1976): pid=8224 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=61 res=1 Feb 9 06:53:50.979589 kernel: audit: type=1300 audit(1707461630.739:1976): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe07e1c10 a2=3 a3=0 items=0 ppid=1 pid=8224 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:50.739000 audit[8224]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe07e1c10 a2=3 a3=0 items=0 ppid=1 pid=8224 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:51.071462 kernel: audit: type=1327 audit(1707461630.739:1976): proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:50.739000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:51.101945 kernel: audit: type=1105 audit(1707461630.745:1977): pid=8224 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:50.745000 audit[8224]: USER_START pid=8224 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:50.746000 audit[8226]: CRED_ACQ pid=8226 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:51.285566 kernel: audit: type=1103 audit(1707461630.746:1978): pid=8226 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:51.285603 kernel: audit: type=1106 audit(1707461630.832:1979): pid=8224 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:50.832000 audit[8224]: USER_END pid=8224 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:51.380962 kernel: audit: type=1104 audit(1707461630.832:1980): pid=8224 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:50.832000 audit[8224]: CRED_DISP pid=8224 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:50.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-86.109.11.101:22-147.75.109.163:46354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:55.841127 systemd[1]: Started sshd@75-86.109.11.101:22-147.75.109.163:34290.service. Feb 9 06:53:55.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-86.109.11.101:22-147.75.109.163:34290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:55.867832 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:53:55.867906 kernel: audit: type=1130 audit(1707461635.840:1982): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-86.109.11.101:22-147.75.109.163:34290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:55.980371 sshd[8248]: Accepted publickey for core from 147.75.109.163 port 34290 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:53:55.980000 audit[8248]: USER_ACCT pid=8248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:55.981114 sshd[8248]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:53:55.983446 systemd-logind[1464]: New session 62 of user core. Feb 9 06:53:55.984004 systemd[1]: Started session-62.scope. Feb 9 06:53:55.980000 audit[8248]: CRED_ACQ pid=8248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:56.073702 sshd[8248]: pam_unix(sshd:session): session closed for user core Feb 9 06:53:56.075207 systemd[1]: sshd@75-86.109.11.101:22-147.75.109.163:34290.service: Deactivated successfully. Feb 9 06:53:56.075661 systemd[1]: session-62.scope: Deactivated successfully. Feb 9 06:53:56.076017 systemd-logind[1464]: Session 62 logged out. Waiting for processes to exit. Feb 9 06:53:56.076579 systemd-logind[1464]: Removed session 62. Feb 9 06:53:56.162121 kernel: audit: type=1101 audit(1707461635.980:1983): pid=8248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:56.162158 kernel: audit: type=1103 audit(1707461635.980:1984): pid=8248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:56.162176 kernel: audit: type=1006 audit(1707461635.980:1985): pid=8248 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=62 res=1 Feb 9 06:53:56.220672 kernel: audit: type=1300 audit(1707461635.980:1985): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbd0d6390 a2=3 a3=0 items=0 ppid=1 pid=8248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:55.980000 audit[8248]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbd0d6390 a2=3 a3=0 items=0 ppid=1 pid=8248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:56.312585 kernel: audit: type=1327 audit(1707461635.980:1985): proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:55.980000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:53:56.343071 kernel: audit: type=1105 audit(1707461635.986:1986): pid=8248 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:55.986000 audit[8248]: USER_START pid=8248 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:55.987000 audit[8250]: CRED_ACQ pid=8250 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:56.526561 kernel: audit: type=1103 audit(1707461635.987:1987): pid=8250 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:56.526620 kernel: audit: type=1106 audit(1707461636.073:1988): pid=8248 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:56.073000 audit[8248]: USER_END pid=8248 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:56.073000 audit[8248]: CRED_DISP pid=8248 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:56.711208 kernel: audit: type=1104 audit(1707461636.073:1989): pid=8248 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:53:56.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-86.109.11.101:22-147.75.109.163:34290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:59.338000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:53:59.338000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c016b1a180 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:53:59.338000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:53:59.339000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:53:59.339000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0142e6700 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:53:59.339000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:53:59.339000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:53:59.339000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c016b1a1b0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:53:59.339000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:53:59.346000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:53:59.346000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c01663ccf0 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:53:59.346000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:53:59.346000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:53:59.346000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c015bd9050 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:53:59.346000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:53:59.346000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:53:59.346000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0142e6720 a2=fc6 a3=0 items=0 ppid=2241 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c221 key=(null) Feb 9 06:53:59.346000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D38362E3130392E31312E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 06:53:59.470000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:53:59.470000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d83800 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:53:59.470000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:53:59.470000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 06:53:59.470000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0018d2e40 a2=fc6 a3=0 items=0 ppid=2252 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c370 key=(null) Feb 9 06:53:59.470000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 06:54:01.076251 systemd[1]: Started sshd@76-86.109.11.101:22-147.75.109.163:34300.service. Feb 9 06:54:01.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-86.109.11.101:22-147.75.109.163:34300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:54:01.103515 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 06:54:01.103616 kernel: audit: type=1130 audit(1707461641.075:1999): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-86.109.11.101:22-147.75.109.163:34300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:54:01.213000 audit[8313]: USER_ACCT pid=8313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:01.213896 sshd[8313]: Accepted publickey for core from 147.75.109.163 port 34300 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:54:01.215351 sshd[8313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:54:01.217598 systemd-logind[1464]: New session 63 of user core. Feb 9 06:54:01.218192 systemd[1]: Started session-63.scope. Feb 9 06:54:01.214000 audit[8313]: CRED_ACQ pid=8313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:01.307496 sshd[8313]: pam_unix(sshd:session): session closed for user core Feb 9 06:54:01.308939 systemd[1]: sshd@76-86.109.11.101:22-147.75.109.163:34300.service: Deactivated successfully. Feb 9 06:54:01.309379 systemd[1]: session-63.scope: Deactivated successfully. Feb 9 06:54:01.309833 systemd-logind[1464]: Session 63 logged out. Waiting for processes to exit. Feb 9 06:54:01.310320 systemd-logind[1464]: Removed session 63. Feb 9 06:54:01.395736 kernel: audit: type=1101 audit(1707461641.213:2000): pid=8313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:01.395775 kernel: audit: type=1103 audit(1707461641.214:2001): pid=8313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:01.395794 kernel: audit: type=1006 audit(1707461641.214:2002): pid=8313 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=63 res=1 Feb 9 06:54:01.214000 audit[8313]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe41ccd4d0 a2=3 a3=0 items=0 ppid=1 pid=8313 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:01.546231 kernel: audit: type=1300 audit(1707461641.214:2002): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe41ccd4d0 a2=3 a3=0 items=0 ppid=1 pid=8313 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:01.546272 kernel: audit: type=1327 audit(1707461641.214:2002): proctitle=737368643A20636F7265205B707269765D Feb 9 06:54:01.214000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:54:01.576808 kernel: audit: type=1105 audit(1707461641.220:2003): pid=8313 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:01.220000 audit[8313]: USER_START pid=8313 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:01.220000 audit[8320]: CRED_ACQ pid=8320 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:01.760622 kernel: audit: type=1103 audit(1707461641.220:2004): pid=8320 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:01.760667 kernel: audit: type=1106 audit(1707461641.307:2005): pid=8313 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:01.307000 audit[8313]: USER_END pid=8313 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:01.307000 audit[8313]: CRED_DISP pid=8313 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:01.945258 kernel: audit: type=1104 audit(1707461641.307:2006): pid=8313 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:01.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-86.109.11.101:22-147.75.109.163:34300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:54:06.316234 systemd[1]: Started sshd@77-86.109.11.101:22-147.75.109.163:36462.service. Feb 9 06:54:06.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-86.109.11.101:22-147.75.109.163:36462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:54:06.343188 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 06:54:06.343268 kernel: audit: type=1130 audit(1707461646.315:2008): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-86.109.11.101:22-147.75.109.163:36462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:54:06.455998 sshd[8365]: Accepted publickey for core from 147.75.109.163 port 36462 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:54:06.455000 audit[8365]: USER_ACCT pid=8365 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:06.456788 sshd[8365]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:54:06.459011 systemd-logind[1464]: New session 64 of user core. Feb 9 06:54:06.459693 systemd[1]: Started session-64.scope. Feb 9 06:54:06.455000 audit[8365]: CRED_ACQ pid=8365 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:06.550564 sshd[8365]: pam_unix(sshd:session): session closed for user core Feb 9 06:54:06.551957 systemd[1]: sshd@77-86.109.11.101:22-147.75.109.163:36462.service: Deactivated successfully. Feb 9 06:54:06.552411 systemd[1]: session-64.scope: Deactivated successfully. Feb 9 06:54:06.552773 systemd-logind[1464]: Session 64 logged out. Waiting for processes to exit. Feb 9 06:54:06.553241 systemd-logind[1464]: Removed session 64. Feb 9 06:54:06.638668 kernel: audit: type=1101 audit(1707461646.455:2009): pid=8365 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:06.638716 kernel: audit: type=1103 audit(1707461646.455:2010): pid=8365 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:06.638733 kernel: audit: type=1006 audit(1707461646.455:2011): pid=8365 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=64 res=1 Feb 9 06:54:06.455000 audit[8365]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff20dd2910 a2=3 a3=0 items=0 ppid=1 pid=8365 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:06.789165 kernel: audit: type=1300 audit(1707461646.455:2011): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff20dd2910 a2=3 a3=0 items=0 ppid=1 pid=8365 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:06.789199 kernel: audit: type=1327 audit(1707461646.455:2011): proctitle=737368643A20636F7265205B707269765D Feb 9 06:54:06.455000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:54:06.819657 kernel: audit: type=1105 audit(1707461646.460:2012): pid=8365 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:06.460000 audit[8365]: USER_START pid=8365 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:06.914098 kernel: audit: type=1103 audit(1707461646.461:2013): pid=8367 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:06.461000 audit[8367]: CRED_ACQ pid=8367 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:07.003253 kernel: audit: type=1106 audit(1707461646.550:2014): pid=8365 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:06.550000 audit[8365]: USER_END pid=8365 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:07.098697 kernel: audit: type=1104 audit(1707461646.550:2015): pid=8365 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:06.550000 audit[8365]: CRED_DISP pid=8365 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:54:06.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-86.109.11.101:22-147.75.109.163:36462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'