Feb 9 10:28:14.549579 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 10:28:14.549591 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 10:28:14.549598 kernel: BIOS-provided physical RAM map: Feb 9 10:28:14.549602 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 10:28:14.549605 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 10:28:14.549609 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 10:28:14.549614 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 10:28:14.549618 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 10:28:14.549621 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000082589fff] usable Feb 9 10:28:14.549625 kernel: BIOS-e820: [mem 0x000000008258a000-0x000000008258afff] ACPI NVS Feb 9 10:28:14.549630 kernel: BIOS-e820: [mem 0x000000008258b000-0x000000008258bfff] reserved Feb 9 10:28:14.549634 kernel: BIOS-e820: [mem 0x000000008258c000-0x000000008afccfff] usable Feb 9 10:28:14.549637 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 9 10:28:14.549641 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 9 10:28:14.549646 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 9 10:28:14.549652 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 9 10:28:14.549656 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 9 10:28:14.549660 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 9 10:28:14.549664 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 10:28:14.549668 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 10:28:14.549672 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 10:28:14.549676 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 10:28:14.549680 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 10:28:14.549685 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 9 10:28:14.549689 kernel: NX (Execute Disable) protection: active Feb 9 10:28:14.549693 kernel: SMBIOS 3.2.1 present. Feb 9 10:28:14.549698 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Feb 9 10:28:14.549702 kernel: tsc: Detected 3400.000 MHz processor Feb 9 10:28:14.549706 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 10:28:14.549711 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 10:28:14.549715 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 10:28:14.549720 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 9 10:28:14.549724 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 10:28:14.549728 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 9 10:28:14.549733 kernel: Using GB pages for direct mapping Feb 9 10:28:14.549737 kernel: ACPI: Early table checksum verification disabled Feb 9 10:28:14.549742 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 10:28:14.549746 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 10:28:14.549751 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 9 10:28:14.549755 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 10:28:14.549761 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 9 10:28:14.549766 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 9 10:28:14.549771 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 9 10:28:14.549776 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 10:28:14.549781 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 10:28:14.549786 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 10:28:14.549790 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 10:28:14.549795 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 10:28:14.549800 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 10:28:14.549804 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 10:28:14.549810 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 10:28:14.549814 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 10:28:14.549819 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 10:28:14.549824 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 10:28:14.549828 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 10:28:14.549833 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 10:28:14.549837 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 10:28:14.549842 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 10:28:14.549847 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 10:28:14.549852 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 9 10:28:14.549857 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 10:28:14.549861 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 10:28:14.549866 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 10:28:14.549870 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 9 10:28:14.549875 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 10:28:14.549880 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 10:28:14.549884 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 10:28:14.549890 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 10:28:14.549894 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 10:28:14.549899 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 9 10:28:14.549904 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 9 10:28:14.549908 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 9 10:28:14.549913 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 9 10:28:14.549917 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 9 10:28:14.549922 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 9 10:28:14.549927 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 9 10:28:14.549932 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 9 10:28:14.549937 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 9 10:28:14.549941 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 9 10:28:14.549946 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 9 10:28:14.549950 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 9 10:28:14.549955 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 9 10:28:14.549960 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 9 10:28:14.549964 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 9 10:28:14.549970 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 9 10:28:14.549974 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 9 10:28:14.549979 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 9 10:28:14.549983 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 9 10:28:14.549988 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 9 10:28:14.549993 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 9 10:28:14.549997 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 9 10:28:14.550002 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 9 10:28:14.550006 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 9 10:28:14.550012 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 9 10:28:14.550016 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 9 10:28:14.550021 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 9 10:28:14.550025 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 9 10:28:14.550030 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 9 10:28:14.550035 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 9 10:28:14.550039 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 9 10:28:14.550044 kernel: No NUMA configuration found Feb 9 10:28:14.550049 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 9 10:28:14.550054 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 9 10:28:14.550059 kernel: Zone ranges: Feb 9 10:28:14.550063 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 10:28:14.550068 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 10:28:14.550073 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 9 10:28:14.550077 kernel: Movable zone start for each node Feb 9 10:28:14.550082 kernel: Early memory node ranges Feb 9 10:28:14.550086 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 10:28:14.550091 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 10:28:14.550096 kernel: node 0: [mem 0x0000000040400000-0x0000000082589fff] Feb 9 10:28:14.550101 kernel: node 0: [mem 0x000000008258c000-0x000000008afccfff] Feb 9 10:28:14.550106 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 9 10:28:14.550110 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 9 10:28:14.550115 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 9 10:28:14.550120 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 9 10:28:14.550124 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 10:28:14.550132 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 10:28:14.550138 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 10:28:14.550143 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 10:28:14.550148 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 9 10:28:14.550154 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 9 10:28:14.550159 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 9 10:28:14.550164 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 9 10:28:14.550169 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 10:28:14.550174 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 10:28:14.550179 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 10:28:14.550184 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 10:28:14.550189 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 10:28:14.550194 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 10:28:14.550199 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 10:28:14.550204 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 10:28:14.550209 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 10:28:14.550214 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 10:28:14.550219 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 10:28:14.550224 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 10:28:14.550229 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 10:28:14.550234 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 10:28:14.550239 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 10:28:14.550244 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 10:28:14.550249 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 10:28:14.550254 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 10:28:14.550259 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 10:28:14.550264 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 10:28:14.550269 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 10:28:14.550274 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 10:28:14.550279 kernel: TSC deadline timer available Feb 9 10:28:14.550284 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 10:28:14.550289 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 9 10:28:14.550294 kernel: Booting paravirtualized kernel on bare hardware Feb 9 10:28:14.550299 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 10:28:14.550304 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 10:28:14.550309 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 10:28:14.550314 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 10:28:14.550319 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 10:28:14.550325 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 9 10:28:14.550330 kernel: Policy zone: Normal Feb 9 10:28:14.550335 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 10:28:14.550358 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 10:28:14.550363 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 10:28:14.550368 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 10:28:14.550373 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 10:28:14.550379 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 9 10:28:14.550398 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 10:28:14.550403 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 10:28:14.550408 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 10:28:14.550414 kernel: rcu: Hierarchical RCU implementation. Feb 9 10:28:14.550419 kernel: rcu: RCU event tracing is enabled. Feb 9 10:28:14.550424 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 10:28:14.550429 kernel: Rude variant of Tasks RCU enabled. Feb 9 10:28:14.550434 kernel: Tracing variant of Tasks RCU enabled. Feb 9 10:28:14.550439 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 10:28:14.550445 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 10:28:14.550450 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 10:28:14.550455 kernel: random: crng init done Feb 9 10:28:14.550460 kernel: Console: colour dummy device 80x25 Feb 9 10:28:14.550465 kernel: printk: console [tty0] enabled Feb 9 10:28:14.550470 kernel: printk: console [ttyS1] enabled Feb 9 10:28:14.550475 kernel: ACPI: Core revision 20210730 Feb 9 10:28:14.550480 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 9 10:28:14.550485 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 10:28:14.550490 kernel: DMAR: Host address width 39 Feb 9 10:28:14.550495 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 10:28:14.550500 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 10:28:14.550505 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 9 10:28:14.550510 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 9 10:28:14.550515 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 10:28:14.550520 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 10:28:14.550525 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 10:28:14.550530 kernel: x2apic enabled Feb 9 10:28:14.550536 kernel: Switched APIC routing to cluster x2apic. Feb 9 10:28:14.550541 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 10:28:14.550546 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 10:28:14.550551 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 10:28:14.550556 kernel: process: using mwait in idle threads Feb 9 10:28:14.550561 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 10:28:14.550565 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 10:28:14.550570 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 10:28:14.550575 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 10:28:14.550582 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 10:28:14.550587 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 10:28:14.550592 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 10:28:14.550596 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 10:28:14.550601 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 10:28:14.550606 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 10:28:14.550611 kernel: TAA: Mitigation: TSX disabled Feb 9 10:28:14.550616 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 10:28:14.550621 kernel: SRBDS: Mitigation: Microcode Feb 9 10:28:14.550626 kernel: GDS: Vulnerable: No microcode Feb 9 10:28:14.550631 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 10:28:14.550636 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 10:28:14.550641 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 10:28:14.550646 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 10:28:14.550651 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 10:28:14.550656 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 10:28:14.550661 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 10:28:14.550666 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 10:28:14.550671 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 10:28:14.550675 kernel: Freeing SMP alternatives memory: 32K Feb 9 10:28:14.550680 kernel: pid_max: default: 32768 minimum: 301 Feb 9 10:28:14.550685 kernel: LSM: Security Framework initializing Feb 9 10:28:14.550690 kernel: SELinux: Initializing. Feb 9 10:28:14.550696 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 10:28:14.550701 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 10:28:14.550705 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 10:28:14.550710 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 10:28:14.550715 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 10:28:14.550720 kernel: ... version: 4 Feb 9 10:28:14.550725 kernel: ... bit width: 48 Feb 9 10:28:14.550730 kernel: ... generic registers: 4 Feb 9 10:28:14.550735 kernel: ... value mask: 0000ffffffffffff Feb 9 10:28:14.550740 kernel: ... max period: 00007fffffffffff Feb 9 10:28:14.550746 kernel: ... fixed-purpose events: 3 Feb 9 10:28:14.550751 kernel: ... event mask: 000000070000000f Feb 9 10:28:14.550756 kernel: signal: max sigframe size: 2032 Feb 9 10:28:14.550760 kernel: rcu: Hierarchical SRCU implementation. Feb 9 10:28:14.550765 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 10:28:14.550770 kernel: smp: Bringing up secondary CPUs ... Feb 9 10:28:14.550775 kernel: x86: Booting SMP configuration: Feb 9 10:28:14.550780 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 10:28:14.550785 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 10:28:14.550791 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 10:28:14.550796 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 10:28:14.550801 kernel: smpboot: Max logical packages: 1 Feb 9 10:28:14.550806 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 10:28:14.550811 kernel: devtmpfs: initialized Feb 9 10:28:14.550816 kernel: x86/mm: Memory block size: 128MB Feb 9 10:28:14.550821 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8258a000-0x8258afff] (4096 bytes) Feb 9 10:28:14.550826 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 9 10:28:14.550832 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 10:28:14.550837 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 10:28:14.550842 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 10:28:14.550847 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 10:28:14.550852 kernel: audit: initializing netlink subsys (disabled) Feb 9 10:28:14.550857 kernel: audit: type=2000 audit(1707474489.040:1): state=initialized audit_enabled=0 res=1 Feb 9 10:28:14.550861 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 10:28:14.550866 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 10:28:14.550871 kernel: cpuidle: using governor menu Feb 9 10:28:14.550877 kernel: ACPI: bus type PCI registered Feb 9 10:28:14.550882 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 10:28:14.550887 kernel: dca service started, version 1.12.1 Feb 9 10:28:14.550892 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 10:28:14.550897 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 10:28:14.550902 kernel: PCI: Using configuration type 1 for base access Feb 9 10:28:14.550907 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 10:28:14.550912 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 10:28:14.550917 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 10:28:14.550922 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 10:28:14.550927 kernel: ACPI: Added _OSI(Module Device) Feb 9 10:28:14.550932 kernel: ACPI: Added _OSI(Processor Device) Feb 9 10:28:14.550937 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 10:28:14.550942 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 10:28:14.550947 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 10:28:14.550952 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 10:28:14.550957 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 10:28:14.550962 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 10:28:14.550968 kernel: ACPI: Dynamic OEM Table Load: Feb 9 10:28:14.550973 kernel: ACPI: SSDT 0xFFFF975E80213800 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 10:28:14.550978 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 10:28:14.550983 kernel: ACPI: Dynamic OEM Table Load: Feb 9 10:28:14.550988 kernel: ACPI: SSDT 0xFFFF975E81AE0C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 10:28:14.550992 kernel: ACPI: Dynamic OEM Table Load: Feb 9 10:28:14.550997 kernel: ACPI: SSDT 0xFFFF975E81A5E000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 10:28:14.551002 kernel: ACPI: Dynamic OEM Table Load: Feb 9 10:28:14.551007 kernel: ACPI: SSDT 0xFFFF975E81A5D000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 10:28:14.551012 kernel: ACPI: Dynamic OEM Table Load: Feb 9 10:28:14.551017 kernel: ACPI: SSDT 0xFFFF975E8014E000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 10:28:14.551022 kernel: ACPI: Dynamic OEM Table Load: Feb 9 10:28:14.551027 kernel: ACPI: SSDT 0xFFFF975E81AE4C00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 10:28:14.551032 kernel: ACPI: Interpreter enabled Feb 9 10:28:14.551037 kernel: ACPI: PM: (supports S0 S5) Feb 9 10:28:14.551042 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 10:28:14.551047 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 10:28:14.551052 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 10:28:14.551057 kernel: HEST: Table parsing has been initialized. Feb 9 10:28:14.551062 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 10:28:14.551067 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 10:28:14.551072 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 10:28:14.551077 kernel: ACPI: PM: Power Resource [USBC] Feb 9 10:28:14.551082 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 10:28:14.551087 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 10:28:14.551092 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 10:28:14.551097 kernel: ACPI: PM: Power Resource [WRST] Feb 9 10:28:14.551102 kernel: ACPI: PM: Power Resource [FN00] Feb 9 10:28:14.551107 kernel: ACPI: PM: Power Resource [FN01] Feb 9 10:28:14.551112 kernel: ACPI: PM: Power Resource [FN02] Feb 9 10:28:14.551117 kernel: ACPI: PM: Power Resource [FN03] Feb 9 10:28:14.551122 kernel: ACPI: PM: Power Resource [FN04] Feb 9 10:28:14.551127 kernel: ACPI: PM: Power Resource [PIN] Feb 9 10:28:14.551132 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 10:28:14.551194 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 10:28:14.551237 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 10:28:14.551278 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 10:28:14.551285 kernel: PCI host bridge to bus 0000:00 Feb 9 10:28:14.551327 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 10:28:14.551382 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 10:28:14.551434 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 10:28:14.551469 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 9 10:28:14.551503 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 10:28:14.551540 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 10:28:14.551589 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 10:28:14.551637 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 10:28:14.551680 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 10:28:14.551723 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 10:28:14.551765 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 9 10:28:14.551812 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 10:28:14.551854 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 9 10:28:14.551898 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 10:28:14.551938 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 9 10:28:14.551979 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 10:28:14.552023 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 10:28:14.552066 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 9 10:28:14.552106 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 9 10:28:14.552150 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 10:28:14.552192 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 10:28:14.552237 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 10:28:14.552277 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 10:28:14.552320 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 10:28:14.552364 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 9 10:28:14.552404 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 10:28:14.552447 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 10:28:14.552488 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 9 10:28:14.552527 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 10:28:14.552570 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 10:28:14.552611 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 9 10:28:14.552651 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 10:28:14.552694 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 10:28:14.552735 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 9 10:28:14.552775 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 9 10:28:14.552814 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 9 10:28:14.552854 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 9 10:28:14.552900 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 9 10:28:14.552943 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 9 10:28:14.552984 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 10:28:14.553027 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 10:28:14.553068 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 10:28:14.553111 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 10:28:14.553153 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 10:28:14.553200 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 10:28:14.553241 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 10:28:14.553285 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 10:28:14.553325 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 10:28:14.553373 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 9 10:28:14.553415 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 9 10:28:14.553458 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 10:28:14.553499 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 10:28:14.553545 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 10:28:14.553591 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 10:28:14.553630 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 9 10:28:14.553671 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 10:28:14.553716 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 10:28:14.553758 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 10:28:14.553805 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 10:28:14.553850 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 10:28:14.553891 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 9 10:28:14.553932 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 9 10:28:14.553973 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 10:28:14.554015 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 10:28:14.554060 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 10:28:14.554103 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 10:28:14.554146 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 9 10:28:14.554187 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 9 10:28:14.554229 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 10:28:14.554270 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 10:28:14.554311 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 10:28:14.554353 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 10:28:14.554394 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 10:28:14.554434 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 10:28:14.554483 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 9 10:28:14.554524 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 9 10:28:14.554566 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 10:28:14.554607 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 9 10:28:14.554649 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 9 10:28:14.554689 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 10:28:14.554729 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 10:28:14.554772 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 10:28:14.554817 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 10:28:14.554861 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 9 10:28:14.554903 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 10:28:14.554947 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 9 10:28:14.554988 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 10:28:14.555029 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 10:28:14.555068 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 10:28:14.555109 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 10:28:14.555150 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 10:28:14.555195 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 10:28:14.555238 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 9 10:28:14.555280 kernel: pci 0000:06:00.0: supports D1 D2 Feb 9 10:28:14.555322 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 10:28:14.555365 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 10:28:14.555407 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 10:28:14.555449 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 10:28:14.555496 kernel: pci_bus 0000:07: extended config space not accessible Feb 9 10:28:14.555544 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 10:28:14.555589 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 9 10:28:14.555633 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 9 10:28:14.555677 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 10:28:14.555721 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 10:28:14.555766 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 10:28:14.555810 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 10:28:14.555854 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 10:28:14.555895 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 10:28:14.555937 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 10:28:14.555944 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 10:28:14.555950 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 10:28:14.555957 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 10:28:14.555962 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 10:28:14.555967 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 10:28:14.555972 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 10:28:14.555978 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 10:28:14.555983 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 10:28:14.555990 kernel: iommu: Default domain type: Translated Feb 9 10:28:14.556029 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 10:28:14.556096 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 9 10:28:14.556142 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 10:28:14.556186 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 9 10:28:14.556194 kernel: vgaarb: loaded Feb 9 10:28:14.556199 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 10:28:14.556205 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 10:28:14.556210 kernel: PTP clock support registered Feb 9 10:28:14.556215 kernel: PCI: Using ACPI for IRQ routing Feb 9 10:28:14.556221 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 10:28:14.556226 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 10:28:14.556232 kernel: e820: reserve RAM buffer [mem 0x8258a000-0x83ffffff] Feb 9 10:28:14.556237 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 9 10:28:14.556242 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 9 10:28:14.556247 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 9 10:28:14.556252 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 9 10:28:14.556258 kernel: clocksource: Switched to clocksource tsc-early Feb 9 10:28:14.556263 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 10:28:14.556268 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 10:28:14.556273 kernel: pnp: PnP ACPI init Feb 9 10:28:14.556316 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 10:28:14.556378 kernel: pnp 00:02: [dma 0 disabled] Feb 9 10:28:14.556437 kernel: pnp 00:03: [dma 0 disabled] Feb 9 10:28:14.556479 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 10:28:14.556516 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 10:28:14.556556 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 10:28:14.556598 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 10:28:14.556634 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 10:28:14.556671 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 10:28:14.556707 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 10:28:14.556743 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 10:28:14.556779 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 10:28:14.556817 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 10:28:14.556855 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 10:28:14.556895 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 10:28:14.556931 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 10:28:14.556966 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 10:28:14.557003 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 10:28:14.557039 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 10:28:14.557075 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 10:28:14.557112 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 10:28:14.557152 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 10:28:14.557160 kernel: pnp: PnP ACPI: found 10 devices Feb 9 10:28:14.557165 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 10:28:14.557171 kernel: NET: Registered PF_INET protocol family Feb 9 10:28:14.557176 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 10:28:14.557181 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 10:28:14.557187 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 10:28:14.557193 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 10:28:14.557199 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 10:28:14.557204 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 10:28:14.557209 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 10:28:14.557214 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 10:28:14.557220 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 10:28:14.557225 kernel: NET: Registered PF_XDP protocol family Feb 9 10:28:14.557266 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 9 10:28:14.557308 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 9 10:28:14.557376 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 9 10:28:14.557435 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 10:28:14.557479 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 10:28:14.557522 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 10:28:14.557564 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 10:28:14.557605 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 10:28:14.557646 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 10:28:14.557688 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 10:28:14.557729 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 10:28:14.557769 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 10:28:14.557810 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 10:28:14.557851 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 10:28:14.557893 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 10:28:14.557935 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 10:28:14.557975 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 10:28:14.558017 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 10:28:14.558058 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 10:28:14.558101 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 10:28:14.558142 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 10:28:14.558183 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 10:28:14.558224 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 10:28:14.558267 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 10:28:14.558304 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 10:28:14.558342 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 10:28:14.558423 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 10:28:14.558458 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 10:28:14.558492 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 9 10:28:14.558528 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 10:28:14.558569 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 9 10:28:14.558610 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 10:28:14.558652 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 9 10:28:14.558690 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 9 10:28:14.558732 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 9 10:28:14.558769 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 9 10:28:14.558814 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 9 10:28:14.558853 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 9 10:28:14.558893 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 10:28:14.558932 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 9 10:28:14.558939 kernel: PCI: CLS 64 bytes, default 64 Feb 9 10:28:14.558945 kernel: DMAR: No ATSR found Feb 9 10:28:14.558950 kernel: DMAR: No SATC found Feb 9 10:28:14.558956 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 10:28:14.558997 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 10:28:14.559040 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 10:28:14.559082 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 9 10:28:14.559122 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 9 10:28:14.559162 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 9 10:28:14.559203 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 9 10:28:14.559243 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 9 10:28:14.559284 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 9 10:28:14.559324 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 9 10:28:14.559392 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 9 10:28:14.559452 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 9 10:28:14.559491 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 9 10:28:14.559532 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 9 10:28:14.559572 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 9 10:28:14.559612 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 9 10:28:14.559652 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 9 10:28:14.559693 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 9 10:28:14.559735 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 9 10:28:14.559776 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 9 10:28:14.559817 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 9 10:28:14.559856 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 9 10:28:14.559900 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 9 10:28:14.559941 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 9 10:28:14.559984 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 9 10:28:14.560026 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 10:28:14.560070 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 9 10:28:14.560114 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 9 10:28:14.560121 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 10:28:14.560127 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 10:28:14.560132 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 9 10:28:14.560138 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 9 10:28:14.560143 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 10:28:14.560148 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 10:28:14.560155 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 10:28:14.560198 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 10:28:14.560206 kernel: Initialise system trusted keyrings Feb 9 10:28:14.560211 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 10:28:14.560217 kernel: Key type asymmetric registered Feb 9 10:28:14.560222 kernel: Asymmetric key parser 'x509' registered Feb 9 10:28:14.560227 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 10:28:14.560233 kernel: io scheduler mq-deadline registered Feb 9 10:28:14.560239 kernel: io scheduler kyber registered Feb 9 10:28:14.560245 kernel: io scheduler bfq registered Feb 9 10:28:14.560284 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 9 10:28:14.560326 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 9 10:28:14.560394 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 9 10:28:14.560455 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 9 10:28:14.560496 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 9 10:28:14.560537 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 9 10:28:14.560584 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 10:28:14.560592 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 10:28:14.560598 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 10:28:14.560603 kernel: pstore: Registered erst as persistent store backend Feb 9 10:28:14.560609 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 10:28:14.560614 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 10:28:14.560619 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 10:28:14.560624 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 10:28:14.560631 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 9 10:28:14.560674 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 10:28:14.560682 kernel: i8042: PNP: No PS/2 controller found. Feb 9 10:28:14.560719 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 10:28:14.560757 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 10:28:14.560794 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T10:28:13 UTC (1707474493) Feb 9 10:28:14.560831 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 10:28:14.560838 kernel: fail to initialize ptp_kvm Feb 9 10:28:14.560845 kernel: intel_pstate: Intel P-state driver initializing Feb 9 10:28:14.560850 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 10:28:14.560855 kernel: intel_pstate: HWP enabled Feb 9 10:28:14.560861 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 10:28:14.560866 kernel: vesafb: scrolling: redraw Feb 9 10:28:14.560871 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 10:28:14.560877 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x000000004aff62ce, using 768k, total 768k Feb 9 10:28:14.560882 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 10:28:14.560887 kernel: fb0: VESA VGA frame buffer device Feb 9 10:28:14.560893 kernel: NET: Registered PF_INET6 protocol family Feb 9 10:28:14.560899 kernel: Segment Routing with IPv6 Feb 9 10:28:14.560904 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 10:28:14.560909 kernel: NET: Registered PF_PACKET protocol family Feb 9 10:28:14.560914 kernel: Key type dns_resolver registered Feb 9 10:28:14.560920 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 10:28:14.560925 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 10:28:14.560930 kernel: IPI shorthand broadcast: enabled Feb 9 10:28:14.560935 kernel: sched_clock: Marking stable (1678905761, 1339683514)->(4438174126, -1419584851) Feb 9 10:28:14.560942 kernel: registered taskstats version 1 Feb 9 10:28:14.560947 kernel: Loading compiled-in X.509 certificates Feb 9 10:28:14.560952 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 10:28:14.560957 kernel: Key type .fscrypt registered Feb 9 10:28:14.560962 kernel: Key type fscrypt-provisioning registered Feb 9 10:28:14.560967 kernel: pstore: Using crash dump compression: deflate Feb 9 10:28:14.560972 kernel: ima: Allocated hash algorithm: sha1 Feb 9 10:28:14.560978 kernel: ima: No architecture policies found Feb 9 10:28:14.560983 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 10:28:14.560989 kernel: Write protecting the kernel read-only data: 28672k Feb 9 10:28:14.560995 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 10:28:14.561000 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 10:28:14.561005 kernel: Run /init as init process Feb 9 10:28:14.561010 kernel: with arguments: Feb 9 10:28:14.561016 kernel: /init Feb 9 10:28:14.561021 kernel: with environment: Feb 9 10:28:14.561026 kernel: HOME=/ Feb 9 10:28:14.561031 kernel: TERM=linux Feb 9 10:28:14.561037 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 10:28:14.561043 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:28:14.561050 systemd[1]: Detected architecture x86-64. Feb 9 10:28:14.561055 systemd[1]: Running in initrd. Feb 9 10:28:14.561061 systemd[1]: No hostname configured, using default hostname. Feb 9 10:28:14.561066 systemd[1]: Hostname set to . Feb 9 10:28:14.561071 systemd[1]: Initializing machine ID from random generator. Feb 9 10:28:14.561078 systemd[1]: Queued start job for default target initrd.target. Feb 9 10:28:14.561083 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:28:14.561088 systemd[1]: Reached target cryptsetup.target. Feb 9 10:28:14.561094 systemd[1]: Reached target paths.target. Feb 9 10:28:14.561099 systemd[1]: Reached target slices.target. Feb 9 10:28:14.561105 systemd[1]: Reached target swap.target. Feb 9 10:28:14.561110 systemd[1]: Reached target timers.target. Feb 9 10:28:14.561115 systemd[1]: Listening on iscsid.socket. Feb 9 10:28:14.561122 systemd[1]: Listening on iscsiuio.socket. Feb 9 10:28:14.561127 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 10:28:14.561132 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 10:28:14.561138 systemd[1]: Listening on systemd-journald.socket. Feb 9 10:28:14.561143 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Feb 9 10:28:14.561149 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:28:14.561154 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Feb 9 10:28:14.561160 kernel: clocksource: Switched to clocksource tsc Feb 9 10:28:14.561166 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:28:14.561171 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:28:14.561177 systemd[1]: Reached target sockets.target. Feb 9 10:28:14.561182 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:28:14.561188 systemd[1]: Finished network-cleanup.service. Feb 9 10:28:14.561193 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 10:28:14.561199 systemd[1]: Starting systemd-journald.service... Feb 9 10:28:14.561204 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:28:14.561212 systemd-journald[268]: Journal started Feb 9 10:28:14.561236 systemd-journald[268]: Runtime Journal (/run/log/journal/21599855dba54d8db9acabd090417326) is 8.0M, max 640.1M, 632.1M free. Feb 9 10:28:14.565174 systemd-modules-load[269]: Inserted module 'overlay' Feb 9 10:28:14.624500 kernel: audit: type=1334 audit(1707474494.570:2): prog-id=6 op=LOAD Feb 9 10:28:14.624510 systemd[1]: Starting systemd-resolved.service... Feb 9 10:28:14.624518 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 10:28:14.570000 audit: BPF prog-id=6 op=LOAD Feb 9 10:28:14.656385 kernel: Bridge firewalling registered Feb 9 10:28:14.656400 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 10:28:14.671747 systemd-modules-load[269]: Inserted module 'br_netfilter' Feb 9 10:28:14.707434 systemd[1]: Started systemd-journald.service. Feb 9 10:28:14.707446 kernel: SCSI subsystem initialized Feb 9 10:28:14.677035 systemd-resolved[271]: Positive Trust Anchors: Feb 9 10:28:14.751547 kernel: audit: type=1130 audit(1707474494.709:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:14.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:14.677042 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:28:14.864893 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 10:28:14.864906 kernel: audit: type=1130 audit(1707474494.772:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:14.864913 kernel: device-mapper: uevent: version 1.0.3 Feb 9 10:28:14.864920 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 10:28:14.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:14.677062 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:28:14.938545 kernel: audit: type=1130 audit(1707474494.872:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:14.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:14.678623 systemd-resolved[271]: Defaulting to hostname 'linux'. Feb 9 10:28:14.990367 kernel: audit: type=1130 audit(1707474494.946:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:14.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:14.710447 systemd[1]: Started systemd-resolved.service. Feb 9 10:28:14.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:14.773514 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:28:15.097261 kernel: audit: type=1130 audit(1707474494.997:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:15.097272 kernel: audit: type=1130 audit(1707474495.050:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:15.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:14.867215 systemd-modules-load[269]: Inserted module 'dm_multipath' Feb 9 10:28:14.873657 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 10:28:14.947624 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:28:14.998634 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 10:28:15.051629 systemd[1]: Reached target nss-lookup.target. Feb 9 10:28:15.105949 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 10:28:15.115013 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:28:15.115307 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 10:28:15.118176 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 10:28:15.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:15.118861 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:28:15.167442 kernel: audit: type=1130 audit(1707474495.116:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:15.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:15.179681 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 10:28:15.245469 kernel: audit: type=1130 audit(1707474495.178:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:15.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:15.237033 systemd[1]: Starting dracut-cmdline.service... Feb 9 10:28:15.260380 dracut-cmdline[292]: dracut-dracut-053 Feb 9 10:28:15.260380 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 10:28:15.260380 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 10:28:15.328426 kernel: Loading iSCSI transport class v2.0-870. Feb 9 10:28:15.328439 kernel: iscsi: registered transport (tcp) Feb 9 10:28:15.376750 kernel: iscsi: registered transport (qla4xxx) Feb 9 10:28:15.376770 kernel: QLogic iSCSI HBA Driver Feb 9 10:28:15.392412 systemd[1]: Finished dracut-cmdline.service. Feb 9 10:28:15.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:15.392961 systemd[1]: Starting dracut-pre-udev.service... Feb 9 10:28:15.448405 kernel: raid6: avx2x4 gen() 48919 MB/s Feb 9 10:28:15.483373 kernel: raid6: avx2x4 xor() 21906 MB/s Feb 9 10:28:15.518373 kernel: raid6: avx2x2 gen() 53846 MB/s Feb 9 10:28:15.553405 kernel: raid6: avx2x2 xor() 32151 MB/s Feb 9 10:28:15.588377 kernel: raid6: avx2x1 gen() 44362 MB/s Feb 9 10:28:15.622421 kernel: raid6: avx2x1 xor() 27410 MB/s Feb 9 10:28:15.656405 kernel: raid6: sse2x4 gen() 20931 MB/s Feb 9 10:28:15.690416 kernel: raid6: sse2x4 xor() 11552 MB/s Feb 9 10:28:15.724421 kernel: raid6: sse2x2 gen() 21209 MB/s Feb 9 10:28:15.758404 kernel: raid6: sse2x2 xor() 13125 MB/s Feb 9 10:28:15.792373 kernel: raid6: sse2x1 gen() 17948 MB/s Feb 9 10:28:15.843802 kernel: raid6: sse2x1 xor() 8761 MB/s Feb 9 10:28:15.843817 kernel: raid6: using algorithm avx2x2 gen() 53846 MB/s Feb 9 10:28:15.843825 kernel: raid6: .... xor() 32151 MB/s, rmw enabled Feb 9 10:28:15.861774 kernel: raid6: using avx2x2 recovery algorithm Feb 9 10:28:15.907370 kernel: xor: automatically using best checksumming function avx Feb 9 10:28:15.986373 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 10:28:15.991719 systemd[1]: Finished dracut-pre-udev.service. Feb 9 10:28:16.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:16.000000 audit: BPF prog-id=7 op=LOAD Feb 9 10:28:16.000000 audit: BPF prog-id=8 op=LOAD Feb 9 10:28:16.002409 systemd[1]: Starting systemd-udevd.service... Feb 9 10:28:16.010463 systemd-udevd[474]: Using default interface naming scheme 'v252'. Feb 9 10:28:16.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:16.017580 systemd[1]: Started systemd-udevd.service. Feb 9 10:28:16.062473 dracut-pre-trigger[485]: rd.md=0: removing MD RAID activation Feb 9 10:28:16.036074 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 10:28:16.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:16.065414 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 10:28:16.081728 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:28:16.131552 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:28:16.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:16.157350 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 10:28:16.159345 kernel: libata version 3.00 loaded. Feb 9 10:28:16.193889 kernel: ACPI: bus type USB registered Feb 9 10:28:16.193936 kernel: usbcore: registered new interface driver usbfs Feb 9 10:28:16.211664 kernel: usbcore: registered new interface driver hub Feb 9 10:28:16.211708 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 10:28:16.211722 kernel: usbcore: registered new device driver usb Feb 9 10:28:16.246848 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 10:28:16.265355 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 10:28:16.299012 kernel: AES CTR mode by8 optimization enabled Feb 9 10:28:16.299342 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 10:28:16.335320 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 9 10:28:16.335407 kernel: pps pps0: new PPS source ptp0 Feb 9 10:28:16.335466 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 10:28:16.335516 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 9 10:28:16.389024 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 10:28:16.389094 kernel: scsi host0: ahci Feb 9 10:28:16.389112 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) ac:1f:6b:7b:e7:b6 Feb 9 10:28:16.420245 kernel: scsi host1: ahci Feb 9 10:28:16.433354 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 9 10:28:16.460935 kernel: scsi host2: ahci Feb 9 10:28:16.461019 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 10:28:16.461075 kernel: scsi host3: ahci Feb 9 10:28:16.501830 kernel: scsi host4: ahci Feb 9 10:28:16.513007 kernel: scsi host5: ahci Feb 9 10:28:16.513027 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Feb 9 10:28:16.513099 kernel: pps pps1: new PPS source ptp1 Feb 9 10:28:16.513161 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 9 10:28:16.513230 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 10:28:16.513290 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) ac:1f:6b:7b:e7:b7 Feb 9 10:28:16.513354 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 9 10:28:16.513446 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 10:28:16.539836 kernel: scsi host6: ahci Feb 9 10:28:16.539932 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 10:28:16.539998 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 132 Feb 9 10:28:16.651076 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 9 10:28:16.651167 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 132 Feb 9 10:28:16.696482 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 132 Feb 9 10:28:16.696503 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 132 Feb 9 10:28:16.712751 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 132 Feb 9 10:28:16.728979 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 132 Feb 9 10:28:16.745178 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 132 Feb 9 10:28:16.791514 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 10:28:16.791586 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 10:28:16.829073 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 10:28:16.829143 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 10:28:16.829200 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 10:28:16.860081 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 10:28:16.860151 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 10:28:16.902278 kernel: hub 1-0:1.0: USB hub found Feb 9 10:28:16.902371 kernel: hub 1-0:1.0: 16 ports detected Feb 9 10:28:16.917410 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 9 10:28:16.917485 kernel: hub 2-0:1.0: USB hub found Feb 9 10:28:16.942499 kernel: hub 2-0:1.0: 10 ports detected Feb 9 10:28:16.957044 kernel: usb: port power management may be unreliable Feb 9 10:28:16.982410 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 10:28:17.097411 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 10:28:17.097527 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 10:28:17.116392 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 10:28:17.132384 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 10:28:17.146409 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 10:28:17.160399 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 10:28:17.168399 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 10:28:17.168513 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 10:28:17.174372 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 10:28:17.221412 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 10:28:17.237380 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Feb 9 10:28:17.237455 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 10:28:17.267151 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 10:28:17.315850 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 10:28:17.315865 kernel: hub 1-14:1.0: USB hub found Feb 9 10:28:17.315945 kernel: ata1.00: Features: NCQ-prio Feb 9 10:28:17.315953 kernel: hub 1-14:1.0: 4 ports detected Feb 9 10:28:17.328777 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 10:28:17.370874 kernel: ata2.00: Features: NCQ-prio Feb 9 10:28:17.389411 kernel: ata1.00: configured for UDMA/133 Feb 9 10:28:17.389426 kernel: ata2.00: configured for UDMA/133 Feb 9 10:28:17.389434 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 10:28:17.419410 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 10:28:17.457812 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 10:28:17.457830 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 10:28:17.471395 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 10:28:17.471490 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 10:28:17.504030 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 10:28:17.504102 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 9 10:28:17.518392 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 10:28:17.544931 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 9 10:28:17.545002 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 10:28:17.558072 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 10:28:17.558145 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 10:28:17.558205 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 10:28:17.563378 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 10:28:17.567343 kernel: port_module: 9 callbacks suppressed Feb 9 10:28:17.567359 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Feb 9 10:28:17.582390 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 10:28:17.582405 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 10:28:17.640803 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 10:28:17.654377 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 10:28:17.700902 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 10:28:17.714450 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 9 10:28:17.728408 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 10:28:17.756495 kernel: GPT:9289727 != 937703087 Feb 9 10:28:17.756540 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 10:28:17.771669 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 10:28:17.771779 kernel: GPT:9289727 != 937703087 Feb 9 10:28:17.817479 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 10:28:17.817496 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 10:28:17.817504 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:28:17.860167 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 10:28:17.860182 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 10:28:17.891345 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Feb 9 10:28:17.905253 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 10:28:17.991478 kernel: usbcore: registered new interface driver usbhid Feb 9 10:28:17.991496 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (534) Feb 9 10:28:17.991503 kernel: usbhid: USB HID core driver Feb 9 10:28:17.991510 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 10:28:17.991517 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Feb 9 10:28:17.960428 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 10:28:18.005146 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 10:28:18.047563 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 10:28:18.133585 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 10:28:18.133746 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 10:28:18.133755 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 10:28:18.128798 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:28:18.143918 systemd[1]: Starting disk-uuid.service... Feb 9 10:28:18.179441 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 10:28:18.179452 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:28:18.179501 disk-uuid[688]: Primary Header is updated. Feb 9 10:28:18.179501 disk-uuid[688]: Secondary Entries is updated. Feb 9 10:28:18.179501 disk-uuid[688]: Secondary Header is updated. Feb 9 10:28:18.262431 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 10:28:18.262441 kernel: GPT:disk_guids don't match. Feb 9 10:28:18.262448 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 10:28:18.262455 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:28:18.262461 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 10:28:18.286343 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:28:19.251407 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 10:28:19.270378 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:28:19.270422 disk-uuid[689]: The operation has completed successfully. Feb 9 10:28:19.305667 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 10:28:19.402795 kernel: audit: type=1130 audit(1707474499.312:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.402810 kernel: audit: type=1131 audit(1707474499.312:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.305724 systemd[1]: Finished disk-uuid.service. Feb 9 10:28:19.433387 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 10:28:19.322112 systemd[1]: Starting verity-setup.service... Feb 9 10:28:19.498910 systemd[1]: Found device dev-mapper-usr.device. Feb 9 10:28:19.511697 systemd[1]: Mounting sysusr-usr.mount... Feb 9 10:28:19.522957 systemd[1]: Finished verity-setup.service. Feb 9 10:28:19.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.589347 kernel: audit: type=1130 audit(1707474499.537:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.646293 systemd[1]: Mounted sysusr-usr.mount. Feb 9 10:28:19.660528 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 10:28:19.653695 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 10:28:19.742488 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 10:28:19.742504 kernel: BTRFS info (device sda6): using free space tree Feb 9 10:28:19.742511 kernel: BTRFS info (device sda6): has skinny extents Feb 9 10:28:19.742519 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 10:28:19.654088 systemd[1]: Starting ignition-setup.service... Feb 9 10:28:19.675790 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 10:28:19.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.753811 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 10:28:19.874186 kernel: audit: type=1130 audit(1707474499.767:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.874199 kernel: audit: type=1130 audit(1707474499.824:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.768697 systemd[1]: Finished ignition-setup.service. Feb 9 10:28:19.906587 kernel: audit: type=1334 audit(1707474499.882:24): prog-id=9 op=LOAD Feb 9 10:28:19.882000 audit: BPF prog-id=9 op=LOAD Feb 9 10:28:19.826014 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 10:28:19.884829 systemd[1]: Starting systemd-networkd.service... Feb 9 10:28:19.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.921051 systemd-networkd[867]: lo: Link UP Feb 9 10:28:19.994414 kernel: audit: type=1130 audit(1707474499.928:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.921053 systemd-networkd[867]: lo: Gained carrier Feb 9 10:28:19.974096 ignition[866]: Ignition 2.14.0 Feb 9 10:28:20.066378 kernel: audit: type=1130 audit(1707474500.015:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:20.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.921327 systemd-networkd[867]: Enumeration completed Feb 9 10:28:20.148037 kernel: audit: type=1130 audit(1707474500.073:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:20.148053 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 10:28:20.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.974100 ignition[866]: Stage: fetch-offline Feb 9 10:28:20.180481 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Feb 9 10:28:19.921398 systemd[1]: Started systemd-networkd.service. Feb 9 10:28:19.974128 ignition[866]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:28:20.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.922075 systemd-networkd[867]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:28:19.974143 ignition[866]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 10:28:20.234672 iscsid[897]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:28:20.234672 iscsid[897]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 10:28:20.234672 iscsid[897]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 10:28:20.234672 iscsid[897]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 10:28:20.234672 iscsid[897]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 10:28:20.234672 iscsid[897]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:28:20.234672 iscsid[897]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 10:28:20.392503 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 9 10:28:20.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:20.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:19.929452 systemd[1]: Reached target network.target. Feb 9 10:28:19.982199 ignition[866]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 10:28:19.986922 systemd[1]: Starting iscsiuio.service... Feb 9 10:28:19.982263 ignition[866]: parsed url from cmdline: "" Feb 9 10:28:20.001524 systemd[1]: Started iscsiuio.service. Feb 9 10:28:19.982265 ignition[866]: no config URL provided Feb 9 10:28:20.001780 unknown[866]: fetched base config from "system" Feb 9 10:28:19.982268 ignition[866]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 10:28:20.001784 unknown[866]: fetched user config from "system" Feb 9 10:28:19.982299 ignition[866]: parsing config with SHA512: ac69dfd7c8e9d37f4a5582d4b8f059e61ab9e19d3e1df49e453eb762f1563513298506b3dde5d1e5c65ec6cc24331bb17792056b29f0a20a38b329c5dba826b7 Feb 9 10:28:20.016567 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 10:28:20.002135 ignition[866]: fetch-offline: fetch-offline passed Feb 9 10:28:20.074732 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 10:28:20.002138 ignition[866]: POST message to Packet Timeline Feb 9 10:28:20.075226 systemd[1]: Starting ignition-kargs.service... Feb 9 10:28:20.002143 ignition[866]: POST Status error: resource requires networking Feb 9 10:28:20.149499 systemd-networkd[867]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:28:20.002175 ignition[866]: Ignition finished successfully Feb 9 10:28:20.161928 systemd[1]: Starting iscsid.service... Feb 9 10:28:20.152415 ignition[886]: Ignition 2.14.0 Feb 9 10:28:20.188710 systemd[1]: Started iscsid.service. Feb 9 10:28:20.152418 ignition[886]: Stage: kargs Feb 9 10:28:20.205672 systemd[1]: Starting dracut-initqueue.service... Feb 9 10:28:20.152473 ignition[886]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:28:20.234884 systemd[1]: Finished dracut-initqueue.service. Feb 9 10:28:20.152483 ignition[886]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 10:28:20.244473 systemd[1]: Reached target remote-fs-pre.target. Feb 9 10:28:20.154777 ignition[886]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 10:28:20.263529 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:28:20.155496 ignition[886]: kargs: kargs passed Feb 9 10:28:20.263638 systemd[1]: Reached target remote-fs.target. Feb 9 10:28:20.155499 ignition[886]: POST message to Packet Timeline Feb 9 10:28:20.306708 systemd[1]: Starting dracut-pre-mount.service... Feb 9 10:28:20.155508 ignition[886]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 10:28:20.329308 systemd[1]: Finished dracut-pre-mount.service. Feb 9 10:28:20.157581 ignition[886]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:37473->[::1]:53: read: connection refused Feb 9 10:28:20.381371 systemd-networkd[867]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:28:20.358009 ignition[886]: GET https://metadata.packet.net/metadata: attempt #2 Feb 9 10:28:20.409825 systemd-networkd[867]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:28:20.358383 ignition[886]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43247->[::1]:53: read: connection refused Feb 9 10:28:20.438906 systemd-networkd[867]: enp1s0f1np1: Link UP Feb 9 10:28:20.439055 systemd-networkd[867]: enp1s0f1np1: Gained carrier Feb 9 10:28:20.451671 systemd-networkd[867]: enp1s0f0np0: Link UP Feb 9 10:28:20.451862 systemd-networkd[867]: eno2: Link UP Feb 9 10:28:20.452039 systemd-networkd[867]: eno1: Link UP Feb 9 10:28:20.759084 ignition[886]: GET https://metadata.packet.net/metadata: attempt #3 Feb 9 10:28:20.760762 ignition[886]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:52724->[::1]:53: read: connection refused Feb 9 10:28:21.185867 systemd-networkd[867]: enp1s0f0np0: Gained carrier Feb 9 10:28:21.195593 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Feb 9 10:28:21.220514 systemd-networkd[867]: enp1s0f0np0: DHCPv4 address 147.75.49.59/31, gateway 147.75.49.58 acquired from 145.40.83.140 Feb 9 10:28:21.561596 ignition[886]: GET https://metadata.packet.net/metadata: attempt #4 Feb 9 10:28:21.562808 ignition[886]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:38740->[::1]:53: read: connection refused Feb 9 10:28:22.058951 systemd-networkd[867]: enp1s0f1np1: Gained IPv6LL Feb 9 10:28:22.570921 systemd-networkd[867]: enp1s0f0np0: Gained IPv6LL Feb 9 10:28:23.164458 ignition[886]: GET https://metadata.packet.net/metadata: attempt #5 Feb 9 10:28:23.165667 ignition[886]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:51196->[::1]:53: read: connection refused Feb 9 10:28:26.368057 ignition[886]: GET https://metadata.packet.net/metadata: attempt #6 Feb 9 10:28:26.426639 ignition[886]: GET result: OK Feb 9 10:28:26.658855 ignition[886]: Ignition finished successfully Feb 9 10:28:26.663671 systemd[1]: Finished ignition-kargs.service. Feb 9 10:28:26.750924 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 10:28:26.750941 kernel: audit: type=1130 audit(1707474506.673:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:26.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:26.685149 ignition[921]: Ignition 2.14.0 Feb 9 10:28:26.676605 systemd[1]: Starting ignition-disks.service... Feb 9 10:28:26.685153 ignition[921]: Stage: disks Feb 9 10:28:26.685212 ignition[921]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:28:26.685222 ignition[921]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 10:28:26.686549 ignition[921]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 10:28:26.688127 ignition[921]: disks: disks passed Feb 9 10:28:26.688131 ignition[921]: POST message to Packet Timeline Feb 9 10:28:26.688142 ignition[921]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 10:28:26.711623 ignition[921]: GET result: OK Feb 9 10:28:26.896730 ignition[921]: Ignition finished successfully Feb 9 10:28:26.899871 systemd[1]: Finished ignition-disks.service. Feb 9 10:28:26.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:26.912893 systemd[1]: Reached target initrd-root-device.target. Feb 9 10:28:26.989612 kernel: audit: type=1130 audit(1707474506.911:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:26.975554 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:28:26.975588 systemd[1]: Reached target local-fs.target. Feb 9 10:28:26.998557 systemd[1]: Reached target sysinit.target. Feb 9 10:28:27.012557 systemd[1]: Reached target basic.target. Feb 9 10:28:27.026223 systemd[1]: Starting systemd-fsck-root.service... Feb 9 10:28:27.048533 systemd-fsck[937]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 10:28:27.059869 systemd[1]: Finished systemd-fsck-root.service. Feb 9 10:28:27.149628 kernel: audit: type=1130 audit(1707474507.067:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.149718 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 10:28:27.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.070284 systemd[1]: Mounting sysroot.mount... Feb 9 10:28:27.157982 systemd[1]: Mounted sysroot.mount. Feb 9 10:28:27.173570 systemd[1]: Reached target initrd-root-fs.target. Feb 9 10:28:27.194226 systemd[1]: Mounting sysroot-usr.mount... Feb 9 10:28:27.202274 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 10:28:27.218806 systemd[1]: Starting flatcar-static-network.service... Feb 9 10:28:27.224470 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 10:28:27.224490 systemd[1]: Reached target ignition-diskful.target. Feb 9 10:28:27.248067 systemd[1]: Mounted sysroot-usr.mount. Feb 9 10:28:27.327470 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (951) Feb 9 10:28:27.327485 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 10:28:27.327543 coreos-metadata[944]: Feb 09 10:28:27.322 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 10:28:27.415439 kernel: BTRFS info (device sda6): using free space tree Feb 9 10:28:27.415452 kernel: BTRFS info (device sda6): has skinny extents Feb 9 10:28:27.415463 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 10:28:27.271830 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 10:28:27.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.477132 coreos-metadata[945]: Feb 09 10:28:27.322 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 10:28:27.477132 coreos-metadata[945]: Feb 09 10:28:27.402 INFO Fetch successful Feb 9 10:28:27.499669 kernel: audit: type=1130 audit(1707474507.422:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.499681 coreos-metadata[944]: Feb 09 10:28:27.346 INFO Fetch successful Feb 9 10:28:27.499681 coreos-metadata[944]: Feb 09 10:28:27.368 INFO wrote hostname ci-3510.3.2-a-970bb49438 to /sysroot/etc/hostname Feb 9 10:28:27.625920 kernel: audit: type=1130 audit(1707474507.514:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.625931 kernel: audit: type=1131 audit(1707474507.514:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.285468 systemd[1]: Starting initrd-setup-root.service... Feb 9 10:28:27.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.704381 kernel: audit: type=1130 audit(1707474507.645:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.402793 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 10:28:27.718560 initrd-setup-root[956]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 10:28:27.424443 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 10:28:27.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.772559 initrd-setup-root[964]: cut: /sysroot/etc/group: No such file or directory Feb 9 10:28:27.810575 kernel: audit: type=1130 audit(1707474507.742:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.485653 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 9 10:28:27.821603 initrd-setup-root[972]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 10:28:27.485691 systemd[1]: Finished flatcar-static-network.service. Feb 9 10:28:27.840528 ignition[1027]: INFO : Ignition 2.14.0 Feb 9 10:28:27.840528 ignition[1027]: INFO : Stage: mount Feb 9 10:28:27.840528 ignition[1027]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:28:27.840528 ignition[1027]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 10:28:27.840528 ignition[1027]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 10:28:27.840528 ignition[1027]: INFO : mount: mount passed Feb 9 10:28:27.840528 ignition[1027]: INFO : POST message to Packet Timeline Feb 9 10:28:27.840528 ignition[1027]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 10:28:27.840528 ignition[1027]: INFO : GET result: OK Feb 9 10:28:27.931693 initrd-setup-root[980]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 10:28:27.515611 systemd[1]: Finished initrd-setup-root.service. Feb 9 10:28:27.948620 ignition[1027]: INFO : Ignition finished successfully Feb 9 10:28:27.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.646942 systemd[1]: Starting ignition-mount.service... Feb 9 10:28:28.029516 kernel: audit: type=1130 audit(1707474507.955:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:27.710930 systemd[1]: Starting sysroot-boot.service... Feb 9 10:28:28.073439 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1042) Feb 9 10:28:28.073451 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 10:28:27.726000 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 10:28:28.124382 kernel: BTRFS info (device sda6): using free space tree Feb 9 10:28:28.124395 kernel: BTRFS info (device sda6): has skinny extents Feb 9 10:28:28.124403 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 10:28:27.726044 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 10:28:27.728003 systemd[1]: Finished sysroot-boot.service. Feb 9 10:28:27.943488 systemd[1]: Finished ignition-mount.service. Feb 9 10:28:27.958619 systemd[1]: Starting ignition-files.service... Feb 9 10:28:28.023118 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 10:28:28.201560 ignition[1061]: INFO : Ignition 2.14.0 Feb 9 10:28:28.201560 ignition[1061]: INFO : Stage: files Feb 9 10:28:28.201560 ignition[1061]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:28:28.201560 ignition[1061]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 10:28:28.201560 ignition[1061]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 10:28:28.201560 ignition[1061]: DEBUG : files: compiled without relabeling support, skipping Feb 9 10:28:28.201560 ignition[1061]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 10:28:28.201560 ignition[1061]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 10:28:28.201560 ignition[1061]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 10:28:28.201560 ignition[1061]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 10:28:28.201560 ignition[1061]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 10:28:28.201560 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 10:28:28.201560 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 10:28:28.156626 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 10:28:28.191946 unknown[1061]: wrote ssh authorized keys file for user: core Feb 9 10:28:28.668907 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 10:28:28.725285 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 10:28:28.725285 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 10:28:28.759546 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 10:28:29.193863 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 10:28:29.310271 ignition[1061]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 10:28:29.335560 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 10:28:29.335560 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 10:28:29.335560 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 10:28:29.729812 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 10:28:29.837857 ignition[1061]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 10:28:29.837857 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 10:28:29.880576 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:28:29.880576 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 9 10:28:29.912602 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 10:28:30.062923 ignition[1061]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 9 10:28:30.062923 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:28:30.062923 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:28:30.120435 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 9 10:28:30.120435 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 10:28:30.445314 ignition[1061]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 9 10:28:30.445314 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:28:30.487558 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 10:28:30.487558 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Feb 9 10:28:30.520576 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 10:28:31.175012 ignition[1061]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Feb 9 10:28:31.175012 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 10:28:31.239450 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1110509546" Feb 9 10:28:31.239450 ignition[1061]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1110509546": device or resource busy Feb 9 10:28:31.552947 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1065) Feb 9 10:28:31.552963 kernel: audit: type=1130 audit(1707474511.493:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.552999 ignition[1061]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1110509546", trying btrfs: device or resource busy Feb 9 10:28:31.552999 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1110509546" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1110509546" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem1110509546" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem1110509546" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: op(14): [started] processing unit "packet-phone-home.service" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: op(14): [finished] processing unit "packet-phone-home.service" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:28:31.552999 ignition[1061]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:28:32.085554 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 10:28:32.085588 kernel: audit: type=1130 audit(1707474511.749:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.085605 kernel: audit: type=1131 audit(1707474511.749:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.085619 kernel: audit: type=1130 audit(1707474511.956:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.483972 systemd[1]: Finished ignition-files.service. Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-helm.service" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(1c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(1c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(1d): [started] setting preset to enabled for "packet-phone-home.service" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(1d): [finished] setting preset to enabled for "packet-phone-home.service" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-critools.service" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: createResultFile: createFiles: op(20): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: createResultFile: createFiles: op(20): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:28:32.101714 ignition[1061]: INFO : files: files passed Feb 9 10:28:32.101714 ignition[1061]: INFO : POST message to Packet Timeline Feb 9 10:28:32.101714 ignition[1061]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 10:28:32.101714 ignition[1061]: INFO : GET result: OK Feb 9 10:28:32.101714 ignition[1061]: INFO : Ignition finished successfully Feb 9 10:28:32.720551 kernel: audit: type=1131 audit(1707474512.126:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.720583 kernel: audit: type=1131 audit(1707474512.435:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.720596 kernel: audit: type=1131 audit(1707474512.523:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.720608 kernel: audit: type=1131 audit(1707474512.590:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.501049 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 10:28:31.561588 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 10:28:32.761664 initrd-setup-root-after-ignition[1095]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 10:28:32.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.561903 systemd[1]: Starting ignition-quench.service... Feb 9 10:28:32.908768 kernel: audit: type=1131 audit(1707474512.770:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.908783 kernel: audit: type=1131 audit(1707474512.848:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.624843 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 10:28:32.978438 kernel: audit: type=1131 audit(1707474512.916:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.651202 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 10:28:31.651446 systemd[1]: Finished ignition-quench.service. Feb 9 10:28:33.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.673900 systemd[1]: Reached target ignition-complete.target. Feb 9 10:28:31.700450 systemd[1]: Starting initrd-parse-etc.service... Feb 9 10:28:31.737038 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 10:28:33.061515 ignition[1110]: INFO : Ignition 2.14.0 Feb 9 10:28:33.061515 ignition[1110]: INFO : Stage: umount Feb 9 10:28:33.061515 ignition[1110]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:28:33.061515 ignition[1110]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 10:28:33.061515 ignition[1110]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 10:28:33.061515 ignition[1110]: INFO : umount: umount passed Feb 9 10:28:33.061515 ignition[1110]: INFO : POST message to Packet Timeline Feb 9 10:28:33.061515 ignition[1110]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 10:28:33.061515 ignition[1110]: INFO : GET result: OK Feb 9 10:28:33.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:33.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:33.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:33.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:33.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:33.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.737108 systemd[1]: Finished initrd-parse-etc.service. Feb 9 10:28:33.193000 audit: BPF prog-id=6 op=UNLOAD Feb 9 10:28:33.209760 ignition[1110]: INFO : Ignition finished successfully Feb 9 10:28:33.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.750620 systemd[1]: Reached target initrd-fs.target. Feb 9 10:28:33.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.893574 systemd[1]: Reached target initrd.target. Feb 9 10:28:33.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.893630 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 10:28:33.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.893984 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 10:28:31.932779 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 10:28:33.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:31.958368 systemd[1]: Starting initrd-cleanup.service... Feb 9 10:28:33.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.027333 systemd[1]: Stopped target network.target. Feb 9 10:28:33.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.036734 systemd[1]: Stopped target nss-lookup.target. Feb 9 10:28:32.060712 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 10:28:33.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.094764 systemd[1]: Stopped target timers.target. Feb 9 10:28:33.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:33.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.108912 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 10:28:32.109271 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 10:28:32.128204 systemd[1]: Stopped target initrd.target. Feb 9 10:28:33.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.192598 systemd[1]: Stopped target basic.target. Feb 9 10:28:33.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.210722 systemd[1]: Stopped target ignition-complete.target. Feb 9 10:28:33.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.234701 systemd[1]: Stopped target ignition-diskful.target. Feb 9 10:28:32.261671 systemd[1]: Stopped target initrd-root-device.target. Feb 9 10:28:33.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.282967 systemd[1]: Stopped target remote-fs.target. Feb 9 10:28:33.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:33.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.303917 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 10:28:32.326950 systemd[1]: Stopped target sysinit.target. Feb 9 10:28:32.349929 systemd[1]: Stopped target local-fs.target. Feb 9 10:28:32.372169 systemd[1]: Stopped target local-fs-pre.target. Feb 9 10:28:32.393022 systemd[1]: Stopped target swap.target. Feb 9 10:28:32.413807 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 10:28:32.414172 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 10:28:32.437146 systemd[1]: Stopped target cryptsetup.target. Feb 9 10:28:32.511563 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 10:28:32.511634 systemd[1]: Stopped dracut-initqueue.service. Feb 9 10:28:32.524738 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 10:28:32.524815 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 10:28:32.591549 systemd[1]: Stopped target paths.target. Feb 9 10:28:32.658460 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 10:28:32.660585 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 10:28:32.681659 systemd[1]: Stopped target slices.target. Feb 9 10:28:32.698629 systemd[1]: Stopped target sockets.target. Feb 9 10:28:32.705700 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 10:28:32.705761 systemd[1]: Closed iscsid.socket. Feb 9 10:28:33.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:32.727689 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 10:28:32.727771 systemd[1]: Closed iscsiuio.socket. Feb 9 10:28:32.744950 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 10:28:32.745187 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 10:28:32.772039 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 10:28:32.772393 systemd[1]: Stopped ignition-files.service. Feb 9 10:28:33.760182 iscsid[897]: iscsid shutting down. Feb 9 10:28:32.849615 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 10:28:32.849672 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 10:28:32.918106 systemd[1]: Stopping ignition-mount.service... Feb 9 10:28:32.985606 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 10:28:32.985699 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 10:28:33.005054 systemd[1]: Stopping sysroot-boot.service... Feb 9 10:28:33.760346 systemd-journald[268]: Received SIGTERM from PID 1 (systemd). Feb 9 10:28:33.020649 systemd[1]: Stopping systemd-networkd.service... Feb 9 10:28:33.036626 systemd[1]: Stopping systemd-resolved.service... Feb 9 10:28:33.040484 systemd-networkd[867]: enp1s0f0np0: DHCPv6 lease lost Feb 9 10:28:33.052501 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 10:28:33.052632 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 10:28:33.055437 systemd-networkd[867]: enp1s0f1np1: DHCPv6 lease lost Feb 9 10:28:33.069806 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 10:28:33.070039 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 10:28:33.759000 audit: BPF prog-id=9 op=UNLOAD Feb 9 10:28:33.090161 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 10:28:33.090690 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 10:28:33.090731 systemd[1]: Stopped systemd-resolved.service. Feb 9 10:28:33.110632 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 10:28:33.110719 systemd[1]: Stopped systemd-networkd.service. Feb 9 10:28:33.130589 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 10:28:33.130646 systemd[1]: Stopped sysroot-boot.service. Feb 9 10:28:33.162892 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 10:28:33.162954 systemd[1]: Stopped ignition-mount.service. Feb 9 10:28:33.188313 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 10:28:33.188484 systemd[1]: Closed systemd-networkd.socket. Feb 9 10:28:33.202694 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 10:28:33.202823 systemd[1]: Stopped ignition-disks.service. Feb 9 10:28:33.217782 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 10:28:33.217907 systemd[1]: Stopped ignition-kargs.service. Feb 9 10:28:33.233865 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 10:28:33.234009 systemd[1]: Stopped ignition-setup.service. Feb 9 10:28:33.248849 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 10:28:33.248996 systemd[1]: Stopped initrd-setup-root.service. Feb 9 10:28:33.266658 systemd[1]: Stopping network-cleanup.service... Feb 9 10:28:33.282548 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 10:28:33.282789 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 10:28:33.298898 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 10:28:33.299053 systemd[1]: Stopped systemd-sysctl.service. Feb 9 10:28:33.314999 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 10:28:33.315144 systemd[1]: Stopped systemd-modules-load.service. Feb 9 10:28:33.331071 systemd[1]: Stopping systemd-udevd.service... Feb 9 10:28:33.349522 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 10:28:33.351307 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 10:28:33.351633 systemd[1]: Stopped systemd-udevd.service. Feb 9 10:28:33.362094 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 10:28:33.362312 systemd[1]: Finished initrd-cleanup.service. Feb 9 10:28:33.381409 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 10:28:33.381514 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 10:28:33.393716 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 10:28:33.393821 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 10:28:33.410631 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 10:28:33.410657 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 10:28:33.417619 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 10:28:33.417641 systemd[1]: Stopped dracut-cmdline.service. Feb 9 10:28:33.439591 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 10:28:33.439688 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 10:28:33.456361 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 10:28:33.471426 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 10:28:33.471520 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 10:28:33.488641 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 10:28:33.488916 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 10:28:33.648025 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 10:28:33.648264 systemd[1]: Stopped network-cleanup.service. Feb 9 10:28:33.662823 systemd[1]: Reached target initrd-switch-root.target. Feb 9 10:28:33.680255 systemd[1]: Starting initrd-switch-root.service... Feb 9 10:28:33.705771 systemd[1]: Switching root. Feb 9 10:28:33.761604 systemd-journald[268]: Journal stopped Feb 9 10:28:37.799472 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 10:28:37.799493 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 10:28:37.799502 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 10:28:37.799508 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 10:28:37.799512 kernel: SELinux: policy capability open_perms=1 Feb 9 10:28:37.799518 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 10:28:37.799524 kernel: SELinux: policy capability always_check_network=0 Feb 9 10:28:37.799529 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 10:28:37.799534 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 10:28:37.799540 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 10:28:37.799546 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 10:28:37.799552 systemd[1]: Successfully loaded SELinux policy in 312.212ms. Feb 9 10:28:37.799559 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.896ms. Feb 9 10:28:37.799565 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:28:37.799573 systemd[1]: Detected architecture x86-64. Feb 9 10:28:37.799579 systemd[1]: Detected first boot. Feb 9 10:28:37.799585 systemd[1]: Hostname set to . Feb 9 10:28:37.799591 systemd[1]: Initializing machine ID from random generator. Feb 9 10:28:37.799597 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 10:28:37.799603 systemd[1]: Populated /etc with preset unit settings. Feb 9 10:28:37.799609 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:28:37.799616 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:28:37.799623 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:28:37.799629 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 10:28:37.799635 systemd[1]: Stopped iscsiuio.service. Feb 9 10:28:37.799641 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 10:28:37.799647 systemd[1]: Stopped iscsid.service. Feb 9 10:28:37.799654 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 10:28:37.799660 systemd[1]: Stopped initrd-switch-root.service. Feb 9 10:28:37.799667 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 10:28:37.799674 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 10:28:37.799680 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 10:28:37.799686 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 10:28:37.799692 systemd[1]: Created slice system-getty.slice. Feb 9 10:28:37.799699 systemd[1]: Created slice system-modprobe.slice. Feb 9 10:28:37.799705 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 10:28:37.799712 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 10:28:37.799733 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 10:28:37.799739 systemd[1]: Created slice user.slice. Feb 9 10:28:37.799745 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:28:37.799752 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 10:28:37.799758 systemd[1]: Set up automount boot.automount. Feb 9 10:28:37.799765 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 10:28:37.799771 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 10:28:37.799778 systemd[1]: Stopped target initrd-fs.target. Feb 9 10:28:37.799784 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 10:28:37.799790 systemd[1]: Reached target integritysetup.target. Feb 9 10:28:37.799797 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:28:37.799803 systemd[1]: Reached target remote-fs.target. Feb 9 10:28:37.799809 systemd[1]: Reached target slices.target. Feb 9 10:28:37.799815 systemd[1]: Reached target swap.target. Feb 9 10:28:37.799822 systemd[1]: Reached target torcx.target. Feb 9 10:28:37.799829 systemd[1]: Reached target veritysetup.target. Feb 9 10:28:37.799836 systemd[1]: Listening on systemd-coredump.socket. Feb 9 10:28:37.799842 systemd[1]: Listening on systemd-initctl.socket. Feb 9 10:28:37.799848 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:28:37.799855 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:28:37.799861 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:28:37.799868 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 10:28:37.799875 systemd[1]: Mounting dev-hugepages.mount... Feb 9 10:28:37.799881 systemd[1]: Mounting dev-mqueue.mount... Feb 9 10:28:37.799887 systemd[1]: Mounting media.mount... Feb 9 10:28:37.799894 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 10:28:37.799900 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 10:28:37.799907 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 10:28:37.799913 systemd[1]: Mounting tmp.mount... Feb 9 10:28:37.799919 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 10:28:37.799926 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 10:28:37.799933 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:28:37.799939 systemd[1]: Starting modprobe@configfs.service... Feb 9 10:28:37.799945 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 10:28:37.799952 systemd[1]: Starting modprobe@drm.service... Feb 9 10:28:37.799958 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 10:28:37.799964 systemd[1]: Starting modprobe@fuse.service... Feb 9 10:28:37.799971 kernel: fuse: init (API version 7.34) Feb 9 10:28:37.799976 systemd[1]: Starting modprobe@loop.service... Feb 9 10:28:37.799983 kernel: loop: module loaded Feb 9 10:28:37.799990 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 10:28:37.799996 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 10:28:37.800003 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 10:28:37.800009 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 10:28:37.800015 kernel: kauditd_printk_skb: 67 callbacks suppressed Feb 9 10:28:37.800021 kernel: audit: type=1131 audit(1707474517.441:114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:37.800028 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 10:28:37.800034 kernel: audit: type=1131 audit(1707474517.529:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:37.800041 systemd[1]: Stopped systemd-journald.service. Feb 9 10:28:37.800047 kernel: audit: type=1130 audit(1707474517.593:116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:37.800053 kernel: audit: type=1131 audit(1707474517.593:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:37.800058 kernel: audit: type=1334 audit(1707474517.678:118): prog-id=21 op=LOAD Feb 9 10:28:37.800064 kernel: audit: type=1334 audit(1707474517.696:119): prog-id=22 op=LOAD Feb 9 10:28:37.800070 kernel: audit: type=1334 audit(1707474517.715:120): prog-id=23 op=LOAD Feb 9 10:28:37.800077 kernel: audit: type=1334 audit(1707474517.733:121): prog-id=19 op=UNLOAD Feb 9 10:28:37.800082 systemd[1]: Starting systemd-journald.service... Feb 9 10:28:37.800089 kernel: audit: type=1334 audit(1707474517.733:122): prog-id=20 op=UNLOAD Feb 9 10:28:37.800095 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:28:37.800101 kernel: audit: type=1305 audit(1707474517.796:123): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 10:28:37.800108 systemd-journald[1261]: Journal started Feb 9 10:28:37.800133 systemd-journald[1261]: Runtime Journal (/run/log/journal/b5021a756d7a487baf83bcc3bbe56dda) is 8.0M, max 640.1M, 632.1M free. Feb 9 10:28:34.214000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 10:28:34.484000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 10:28:34.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:28:34.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:28:34.487000 audit: BPF prog-id=10 op=LOAD Feb 9 10:28:34.487000 audit: BPF prog-id=10 op=UNLOAD Feb 9 10:28:34.487000 audit: BPF prog-id=11 op=LOAD Feb 9 10:28:34.487000 audit: BPF prog-id=11 op=UNLOAD Feb 9 10:28:34.575000 audit[1151]: AVC avc: denied { associate } for pid=1151 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 10:28:34.575000 audit[1151]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001d98a2 a1=c00015adf8 a2=c0001630c0 a3=32 items=0 ppid=1134 pid=1151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:34.575000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:28:34.601000 audit[1151]: AVC avc: denied { associate } for pid=1151 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 10:28:34.601000 audit[1151]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001d9979 a2=1ed a3=0 items=2 ppid=1134 pid=1151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:34.601000 audit: CWD cwd="/" Feb 9 10:28:34.601000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:34.601000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:34.601000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:28:36.107000 audit: BPF prog-id=12 op=LOAD Feb 9 10:28:36.107000 audit: BPF prog-id=3 op=UNLOAD Feb 9 10:28:36.108000 audit: BPF prog-id=13 op=LOAD Feb 9 10:28:36.108000 audit: BPF prog-id=14 op=LOAD Feb 9 10:28:36.108000 audit: BPF prog-id=4 op=UNLOAD Feb 9 10:28:36.108000 audit: BPF prog-id=5 op=UNLOAD Feb 9 10:28:36.109000 audit: BPF prog-id=15 op=LOAD Feb 9 10:28:36.109000 audit: BPF prog-id=12 op=UNLOAD Feb 9 10:28:36.109000 audit: BPF prog-id=16 op=LOAD Feb 9 10:28:36.109000 audit: BPF prog-id=17 op=LOAD Feb 9 10:28:36.109000 audit: BPF prog-id=13 op=UNLOAD Feb 9 10:28:36.109000 audit: BPF prog-id=14 op=UNLOAD Feb 9 10:28:36.109000 audit: BPF prog-id=18 op=LOAD Feb 9 10:28:36.109000 audit: BPF prog-id=15 op=UNLOAD Feb 9 10:28:36.109000 audit: BPF prog-id=19 op=LOAD Feb 9 10:28:36.110000 audit: BPF prog-id=20 op=LOAD Feb 9 10:28:36.110000 audit: BPF prog-id=16 op=UNLOAD Feb 9 10:28:36.110000 audit: BPF prog-id=17 op=UNLOAD Feb 9 10:28:36.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:36.156000 audit: BPF prog-id=18 op=UNLOAD Feb 9 10:28:36.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:36.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:36.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:36.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:37.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:37.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:37.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:37.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:37.678000 audit: BPF prog-id=21 op=LOAD Feb 9 10:28:37.696000 audit: BPF prog-id=22 op=LOAD Feb 9 10:28:37.715000 audit: BPF prog-id=23 op=LOAD Feb 9 10:28:37.733000 audit: BPF prog-id=19 op=UNLOAD Feb 9 10:28:37.733000 audit: BPF prog-id=20 op=UNLOAD Feb 9 10:28:37.796000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 10:28:34.574721 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:28:36.107720 systemd[1]: Queued start job for default target multi-user.target. Feb 9 10:28:34.575147 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:28:36.111801 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 10:28:34.575158 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:28:34.575176 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 10:28:34.575182 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 10:28:34.575198 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 10:28:34.575206 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 10:28:34.575315 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 10:28:34.575335 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:28:34.575351 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:28:34.575755 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 10:28:34.575773 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 10:28:34.575783 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 10:28:34.575791 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 10:28:34.575799 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 10:28:34.575807 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:34Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 10:28:35.762521 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:35Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:28:35.762671 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:35Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:28:35.762724 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:35Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:28:35.762816 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:35Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:28:35.762846 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:35Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 10:28:35.762880 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-09T10:28:35Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 10:28:37.796000 audit[1261]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc825668c0 a2=4000 a3=7ffc8256695c items=0 ppid=1 pid=1261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:37.796000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 10:28:37.878531 systemd[1]: Starting systemd-network-generator.service... Feb 9 10:28:37.905380 systemd[1]: Starting systemd-remount-fs.service... Feb 9 10:28:37.932388 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:28:37.975117 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 10:28:37.975143 systemd[1]: Stopped verity-setup.service. Feb 9 10:28:37.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.020380 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 10:28:38.040538 systemd[1]: Started systemd-journald.service. Feb 9 10:28:38.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.048996 systemd[1]: Mounted dev-hugepages.mount. Feb 9 10:28:38.056624 systemd[1]: Mounted dev-mqueue.mount. Feb 9 10:28:38.063612 systemd[1]: Mounted media.mount. Feb 9 10:28:38.070607 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 10:28:38.079609 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 10:28:38.088584 systemd[1]: Mounted tmp.mount. Feb 9 10:28:38.095664 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 10:28:38.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.104680 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:28:38.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.112700 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 10:28:38.112806 systemd[1]: Finished modprobe@configfs.service. Feb 9 10:28:38.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.121787 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 10:28:38.121918 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 10:28:38.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.130817 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 10:28:38.130968 systemd[1]: Finished modprobe@drm.service. Feb 9 10:28:38.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.139970 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 10:28:38.140189 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 10:28:38.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.149164 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 10:28:38.149490 systemd[1]: Finished modprobe@fuse.service. Feb 9 10:28:38.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.158165 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 10:28:38.158487 systemd[1]: Finished modprobe@loop.service. Feb 9 10:28:38.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.167185 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:28:38.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.176132 systemd[1]: Finished systemd-network-generator.service. Feb 9 10:28:38.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.185130 systemd[1]: Finished systemd-remount-fs.service. Feb 9 10:28:38.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.194136 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:28:38.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.203707 systemd[1]: Reached target network-pre.target. Feb 9 10:28:38.215221 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 10:28:38.226031 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 10:28:38.232611 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 10:28:38.235862 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 10:28:38.244930 systemd[1]: Starting systemd-journal-flush.service... Feb 9 10:28:38.253583 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 10:28:38.254081 systemd[1]: Starting systemd-random-seed.service... Feb 9 10:28:38.254221 systemd-journald[1261]: Time spent on flushing to /var/log/journal/b5021a756d7a487baf83bcc3bbe56dda is 16.089ms for 1626 entries. Feb 9 10:28:38.254221 systemd-journald[1261]: System Journal (/var/log/journal/b5021a756d7a487baf83bcc3bbe56dda) is 8.0M, max 195.6M, 187.6M free. Feb 9 10:28:38.303092 systemd-journald[1261]: Received client request to flush runtime journal. Feb 9 10:28:38.269478 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 10:28:38.269963 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:28:38.284050 systemd[1]: Starting systemd-sysusers.service... Feb 9 10:28:38.292223 systemd[1]: Starting systemd-udev-settle.service... Feb 9 10:28:38.301043 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 10:28:38.310578 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 10:28:38.319549 systemd[1]: Finished systemd-journal-flush.service. Feb 9 10:28:38.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.328578 systemd[1]: Finished systemd-random-seed.service. Feb 9 10:28:38.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.337566 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:28:38.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.346526 systemd[1]: Finished systemd-sysusers.service. Feb 9 10:28:38.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.357218 systemd[1]: Reached target first-boot-complete.target. Feb 9 10:28:38.366679 udevadm[1276]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 10:28:38.553168 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 10:28:38.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.560000 audit: BPF prog-id=24 op=LOAD Feb 9 10:28:38.561000 audit: BPF prog-id=25 op=LOAD Feb 9 10:28:38.561000 audit: BPF prog-id=7 op=UNLOAD Feb 9 10:28:38.561000 audit: BPF prog-id=8 op=UNLOAD Feb 9 10:28:38.562716 systemd[1]: Starting systemd-udevd.service... Feb 9 10:28:38.574492 systemd-udevd[1278]: Using default interface naming scheme 'v252'. Feb 9 10:28:38.592226 systemd[1]: Started systemd-udevd.service. Feb 9 10:28:38.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.602733 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 10:28:38.602000 audit: BPF prog-id=26 op=LOAD Feb 9 10:28:38.604035 systemd[1]: Starting systemd-networkd.service... Feb 9 10:28:38.628000 audit: BPF prog-id=27 op=LOAD Feb 9 10:28:38.628000 audit: BPF prog-id=28 op=LOAD Feb 9 10:28:38.628000 audit: BPF prog-id=29 op=LOAD Feb 9 10:28:38.630350 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 10:28:38.630390 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 10:28:38.630598 systemd[1]: Starting systemd-userdbd.service... Feb 9 10:28:38.649349 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 10:28:38.691244 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1353) Feb 9 10:28:38.691299 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 10:28:38.626000 audit[1300]: AVC avc: denied { confidentiality } for pid=1300 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 10:28:38.732346 kernel: IPMI message handler: version 39.2 Feb 9 10:28:38.732395 kernel: ACPI: button: Power Button [PWRF] Feb 9 10:28:38.751345 kernel: ipmi device interface Feb 9 10:28:38.767314 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:28:38.784149 systemd[1]: Started systemd-userdbd.service. Feb 9 10:28:38.626000 audit[1300]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56204b3112b0 a1=4d8bc a2=7fe3d1fb3bc5 a3=5 items=42 ppid=1278 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:38.626000 audit: CWD cwd="/" Feb 9 10:28:38.626000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=1 name=(null) inode=12496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=2 name=(null) inode=12496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=3 name=(null) inode=12497 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=4 name=(null) inode=12496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=5 name=(null) inode=12498 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=6 name=(null) inode=12496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=7 name=(null) inode=12499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=8 name=(null) inode=12499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=9 name=(null) inode=12500 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=10 name=(null) inode=12499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=11 name=(null) inode=12501 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=12 name=(null) inode=12499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=13 name=(null) inode=12502 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=14 name=(null) inode=12499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=15 name=(null) inode=12503 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=16 name=(null) inode=12499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=17 name=(null) inode=12504 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=18 name=(null) inode=12496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=19 name=(null) inode=12505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=20 name=(null) inode=12505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=21 name=(null) inode=12506 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=22 name=(null) inode=12505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=23 name=(null) inode=12507 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=24 name=(null) inode=12505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=25 name=(null) inode=12508 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=26 name=(null) inode=12505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=27 name=(null) inode=12509 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=28 name=(null) inode=12505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=29 name=(null) inode=12510 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=30 name=(null) inode=12496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=31 name=(null) inode=12511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=32 name=(null) inode=12511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=33 name=(null) inode=12512 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=34 name=(null) inode=12511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=35 name=(null) inode=12513 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=36 name=(null) inode=12511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=37 name=(null) inode=12514 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=38 name=(null) inode=12511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=39 name=(null) inode=12515 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=40 name=(null) inode=12511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PATH item=41 name=(null) inode=12516 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:28:38.626000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 10:28:38.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:38.823352 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 10:28:38.823589 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 10:28:38.844347 kernel: ipmi_si: IPMI System Interface driver Feb 9 10:28:38.882916 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 10:28:38.883052 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 10:28:38.904189 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 10:28:38.923824 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 10:28:38.965345 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 10:28:39.021107 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 10:28:39.021294 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 10:28:39.021372 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 10:28:39.062237 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 10:28:39.062325 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 10:28:39.062342 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 10:28:39.123406 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 10:28:39.123447 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 10:28:39.147775 systemd-networkd[1329]: bond0: netdev ready Feb 9 10:28:39.157562 systemd-networkd[1329]: lo: Link UP Feb 9 10:28:39.157575 systemd-networkd[1329]: lo: Gained carrier Feb 9 10:28:39.158956 systemd-networkd[1329]: Enumeration completed Feb 9 10:28:39.159038 systemd[1]: Started systemd-networkd.service. Feb 9 10:28:39.159525 systemd-networkd[1329]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 10:28:39.160123 systemd-networkd[1329]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:5c:29:79.network. Feb 9 10:28:39.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:39.208903 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 9 10:28:39.209022 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 9 10:28:39.209112 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 9 10:28:39.266974 kernel: intel_rapl_common: Found RAPL domain package Feb 9 10:28:39.267005 kernel: intel_rapl_common: Found RAPL domain core Feb 9 10:28:39.267023 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 10:28:39.284535 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 10:28:39.302414 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 10:28:39.341939 systemd-networkd[1329]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:5c:29:78.network. Feb 9 10:28:39.342386 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 9 10:28:39.363345 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 10:28:39.371394 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 10:28:39.507396 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 10:28:39.565416 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 9 10:28:39.588427 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 9 10:28:39.608395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 10:28:39.615294 systemd-networkd[1329]: bond0: Link UP Feb 9 10:28:39.654122 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 10:28:39.654203 kernel: bond0: active interface up! Feb 9 10:28:39.680365 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 10:28:39.680534 systemd-networkd[1329]: enp1s0f1np1: Link UP Feb 9 10:28:39.681053 systemd-networkd[1329]: enp1s0f1np1: Gained carrier Feb 9 10:28:39.682042 systemd-networkd[1329]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:5c:29:78.network. Feb 9 10:28:39.695602 systemd[1]: Finished systemd-udev-settle.service. Feb 9 10:28:39.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:39.704132 systemd[1]: Starting lvm2-activation-early.service... Feb 9 10:28:39.719325 lvm[1383]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:28:39.736399 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 10:28:39.755744 systemd[1]: Finished lvm2-activation-early.service. Feb 9 10:28:39.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:39.764493 systemd[1]: Reached target cryptsetup.target. Feb 9 10:28:39.773032 systemd[1]: Starting lvm2-activation.service... Feb 9 10:28:39.775079 lvm[1384]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:28:39.787396 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:39.828344 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:39.851383 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:39.858796 systemd[1]: Finished lvm2-activation.service. Feb 9 10:28:39.873373 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:39.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:39.890475 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:28:39.896426 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:39.913466 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 10:28:39.913481 systemd[1]: Reached target local-fs.target. Feb 9 10:28:39.918411 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:39.936462 systemd[1]: Reached target machines.target. Feb 9 10:28:39.940410 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:39.958083 systemd[1]: Starting ldconfig.service... Feb 9 10:28:39.962386 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:39.979067 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 10:28:39.979088 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:28:39.979663 systemd[1]: Starting systemd-boot-update.service... Feb 9 10:28:39.984399 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:40.001527 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 10:28:40.005378 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:40.024824 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 10:28:40.026185 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:28:40.026206 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:28:40.026343 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:40.026792 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 10:28:40.026994 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1386 (bootctl) Feb 9 10:28:40.027775 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 10:28:40.047397 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:40.064778 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 10:28:40.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:40.067395 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:40.089346 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:40.108396 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:40.127387 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:40.147515 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:40.167408 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:40.167720 systemd-networkd[1329]: enp1s0f0np0: Link UP Feb 9 10:28:40.167882 systemd-networkd[1329]: bond0: Gained carrier Feb 9 10:28:40.167969 systemd-networkd[1329]: enp1s0f0np0: Gained carrier Feb 9 10:28:40.200518 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 10:28:40.208145 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Feb 9 10:28:40.203334 systemd-networkd[1329]: enp1s0f1np1: Link DOWN Feb 9 10:28:40.203358 systemd-networkd[1329]: enp1s0f1np1: Lost carrier Feb 9 10:28:40.210833 systemd-tmpfiles[1390]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 10:28:40.394395 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 10:28:40.411386 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Feb 9 10:28:40.411436 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 9 10:28:40.426485 systemd-networkd[1329]: enp1s0f1np1: Link UP Feb 9 10:28:40.426634 systemd-networkd[1329]: enp1s0f1np1: Gained carrier Feb 9 10:28:40.442387 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 9 10:28:40.459383 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 10:28:40.491137 systemd-tmpfiles[1390]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 10:28:40.608964 systemd-tmpfiles[1390]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 10:28:40.614073 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 10:28:40.614420 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 10:28:40.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:40.637210 systemd-fsck[1394]: fsck.fat 4.2 (2021-01-31) Feb 9 10:28:40.637210 systemd-fsck[1394]: /dev/sda1: 789 files, 115332/258078 clusters Feb 9 10:28:40.637978 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 10:28:40.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:40.648121 systemd[1]: Mounting boot.mount... Feb 9 10:28:40.659765 systemd[1]: Mounted boot.mount. Feb 9 10:28:40.679041 systemd[1]: Finished systemd-boot-update.service. Feb 9 10:28:40.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:40.707526 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 10:28:40.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:40.717163 systemd[1]: Starting audit-rules.service... Feb 9 10:28:40.724992 systemd[1]: Starting clean-ca-certificates.service... Feb 9 10:28:40.733945 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 10:28:40.734000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 10:28:40.734000 audit[1415]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd8722f80 a2=420 a3=0 items=0 ppid=1398 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:40.734000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 10:28:40.736314 augenrules[1415]: No rules Feb 9 10:28:40.744392 systemd[1]: Starting systemd-resolved.service... Feb 9 10:28:40.753244 systemd[1]: Starting systemd-timesyncd.service... Feb 9 10:28:40.760911 systemd[1]: Starting systemd-update-utmp.service... Feb 9 10:28:40.767683 systemd[1]: Finished audit-rules.service. Feb 9 10:28:40.774583 systemd[1]: Finished clean-ca-certificates.service. Feb 9 10:28:40.782537 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 10:28:40.793527 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 10:28:40.794216 systemd[1]: Finished systemd-update-utmp.service. Feb 9 10:28:40.797094 ldconfig[1385]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 10:28:40.802549 systemd[1]: Finished ldconfig.service. Feb 9 10:28:40.810039 systemd[1]: Starting systemd-update-done.service... Feb 9 10:28:40.816558 systemd[1]: Finished systemd-update-done.service. Feb 9 10:28:40.820886 systemd-resolved[1420]: Positive Trust Anchors: Feb 9 10:28:40.820895 systemd-resolved[1420]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:28:40.820914 systemd-resolved[1420]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:28:40.824485 systemd[1]: Started systemd-timesyncd.service. Feb 9 10:28:40.824866 systemd-resolved[1420]: Using system hostname 'ci-3510.3.2-a-970bb49438'. Feb 9 10:28:40.832526 systemd[1]: Started systemd-resolved.service. Feb 9 10:28:40.840497 systemd[1]: Reached target network.target. Feb 9 10:28:40.848430 systemd[1]: Reached target nss-lookup.target. Feb 9 10:28:40.856435 systemd[1]: Reached target sysinit.target. Feb 9 10:28:40.864458 systemd[1]: Started motdgen.path. Feb 9 10:28:40.871437 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 10:28:40.881415 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 10:28:40.889408 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 10:28:40.889426 systemd[1]: Reached target paths.target. Feb 9 10:28:40.896575 systemd[1]: Reached target time-set.target. Feb 9 10:28:40.904914 systemd[1]: Started logrotate.timer. Feb 9 10:28:40.911462 systemd[1]: Started mdadm.timer. Feb 9 10:28:40.918419 systemd[1]: Reached target timers.target. Feb 9 10:28:40.925552 systemd[1]: Listening on dbus.socket. Feb 9 10:28:40.932960 systemd[1]: Starting docker.socket... Feb 9 10:28:40.940695 systemd[1]: Listening on sshd.socket. Feb 9 10:28:40.947476 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:28:40.947685 systemd[1]: Listening on docker.socket. Feb 9 10:28:40.954461 systemd[1]: Reached target sockets.target. Feb 9 10:28:40.962417 systemd[1]: Reached target basic.target. Feb 9 10:28:40.969431 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:28:40.969444 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:28:40.969865 systemd[1]: Starting containerd.service... Feb 9 10:28:40.976831 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 10:28:40.985874 systemd[1]: Starting coreos-metadata.service... Feb 9 10:28:40.992908 systemd[1]: Starting dbus.service... Feb 9 10:28:40.998943 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 10:28:41.003372 jq[1435]: false Feb 9 10:28:41.006014 coreos-metadata[1428]: Feb 09 10:28:41.005 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 10:28:41.006238 systemd[1]: Starting extend-filesystems.service... Feb 9 10:28:41.012471 dbus-daemon[1434]: [system] SELinux support is enabled Feb 9 10:28:41.013435 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 10:28:41.014000 systemd[1]: Starting motdgen.service... Feb 9 10:28:41.014675 extend-filesystems[1437]: Found sda Feb 9 10:28:41.014675 extend-filesystems[1437]: Found sda1 Feb 9 10:28:41.041052 extend-filesystems[1437]: Found sda2 Feb 9 10:28:41.041052 extend-filesystems[1437]: Found sda3 Feb 9 10:28:41.041052 extend-filesystems[1437]: Found usr Feb 9 10:28:41.041052 extend-filesystems[1437]: Found sda4 Feb 9 10:28:41.041052 extend-filesystems[1437]: Found sda6 Feb 9 10:28:41.041052 extend-filesystems[1437]: Found sda7 Feb 9 10:28:41.041052 extend-filesystems[1437]: Found sda9 Feb 9 10:28:41.041052 extend-filesystems[1437]: Checking size of /dev/sda9 Feb 9 10:28:41.041052 extend-filesystems[1437]: Resized partition /dev/sda9 Feb 9 10:28:41.132465 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 9 10:28:41.132505 coreos-metadata[1431]: Feb 09 10:28:41.016 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 10:28:41.021081 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 10:28:41.132662 extend-filesystems[1452]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 10:28:41.055123 systemd[1]: Starting prepare-critools.service... Feb 9 10:28:41.074019 systemd[1]: Starting prepare-helm.service... Feb 9 10:28:41.091944 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 10:28:41.110949 systemd[1]: Starting sshd-keygen.service... Feb 9 10:28:41.125621 systemd[1]: Starting systemd-logind.service... Feb 9 10:28:41.144377 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:28:41.144871 systemd[1]: Starting tcsd.service... Feb 9 10:28:41.149552 systemd-logind[1465]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 10:28:41.149562 systemd-logind[1465]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 10:28:41.149571 systemd-logind[1465]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 10:28:41.149666 systemd-logind[1465]: New seat seat0. Feb 9 10:28:41.157775 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 10:28:41.158144 systemd[1]: Starting update-engine.service... Feb 9 10:28:41.164902 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 10:28:41.166394 jq[1468]: true Feb 9 10:28:41.173733 systemd[1]: Started dbus.service. Feb 9 10:28:41.182097 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 10:28:41.182184 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 10:28:41.182360 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 10:28:41.182437 systemd[1]: Finished motdgen.service. Feb 9 10:28:41.190499 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 10:28:41.190582 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 10:28:41.194425 systemd-networkd[1329]: bond0: Gained IPv6LL Feb 9 10:28:41.196395 tar[1470]: ./ Feb 9 10:28:41.196395 tar[1470]: ./loopback Feb 9 10:28:41.201302 jq[1476]: true Feb 9 10:28:41.201665 dbus-daemon[1434]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 10:28:41.202717 tar[1472]: linux-amd64/helm Feb 9 10:28:41.203465 update_engine[1467]: I0209 10:28:41.203004 1467 main.cc:92] Flatcar Update Engine starting Feb 9 10:28:41.204183 tar[1471]: crictl Feb 9 10:28:41.206529 update_engine[1467]: I0209 10:28:41.206513 1467 update_check_scheduler.cc:74] Next update check in 11m47s Feb 9 10:28:41.207050 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 10:28:41.207139 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 10:28:41.209896 systemd[1]: Started systemd-logind.service. Feb 9 10:28:41.212480 env[1477]: time="2024-02-09T10:28:41.212456105Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 10:28:41.216545 tar[1470]: ./bandwidth Feb 9 10:28:41.220631 systemd[1]: Started update-engine.service. Feb 9 10:28:41.220869 env[1477]: time="2024-02-09T10:28:41.220850895Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 10:28:41.222148 env[1477]: time="2024-02-09T10:28:41.222134114Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:28:41.222749 env[1477]: time="2024-02-09T10:28:41.222732745Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:28:41.222785 env[1477]: time="2024-02-09T10:28:41.222748603Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:28:41.224458 env[1477]: time="2024-02-09T10:28:41.224440986Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:28:41.224501 env[1477]: time="2024-02-09T10:28:41.224458738Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 10:28:41.224501 env[1477]: time="2024-02-09T10:28:41.224471734Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 10:28:41.224501 env[1477]: time="2024-02-09T10:28:41.224481842Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 10:28:41.224595 env[1477]: time="2024-02-09T10:28:41.224542553Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:28:41.224705 env[1477]: time="2024-02-09T10:28:41.224694148Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:28:41.224787 env[1477]: time="2024-02-09T10:28:41.224773997Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:28:41.224819 env[1477]: time="2024-02-09T10:28:41.224785774Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 10:28:41.226737 env[1477]: time="2024-02-09T10:28:41.226723311Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 10:28:41.226789 env[1477]: time="2024-02-09T10:28:41.226736083Z" level=info msg="metadata content store policy set" policy=shared Feb 9 10:28:41.229215 bash[1500]: Updated "/home/core/.ssh/authorized_keys" Feb 9 10:28:41.230545 systemd[1]: Started locksmithd.service. Feb 9 10:28:41.233788 env[1477]: time="2024-02-09T10:28:41.233772567Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 10:28:41.233823 env[1477]: time="2024-02-09T10:28:41.233791095Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 10:28:41.233823 env[1477]: time="2024-02-09T10:28:41.233802979Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 10:28:41.233823 env[1477]: time="2024-02-09T10:28:41.233819014Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 10:28:41.233876 env[1477]: time="2024-02-09T10:28:41.233827067Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 10:28:41.233876 env[1477]: time="2024-02-09T10:28:41.233834844Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 10:28:41.233876 env[1477]: time="2024-02-09T10:28:41.233842205Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 10:28:41.233876 env[1477]: time="2024-02-09T10:28:41.233855659Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 10:28:41.233876 env[1477]: time="2024-02-09T10:28:41.233864066Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 10:28:41.233876 env[1477]: time="2024-02-09T10:28:41.233872336Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 10:28:41.233996 env[1477]: time="2024-02-09T10:28:41.233879246Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 10:28:41.233996 env[1477]: time="2024-02-09T10:28:41.233886346Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 10:28:41.233996 env[1477]: time="2024-02-09T10:28:41.233942696Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 10:28:41.233996 env[1477]: time="2024-02-09T10:28:41.233992480Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 10:28:41.234156 env[1477]: time="2024-02-09T10:28:41.234139148Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 10:28:41.234184 env[1477]: time="2024-02-09T10:28:41.234170929Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 10:28:41.234202 env[1477]: time="2024-02-09T10:28:41.234189126Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 10:28:41.234237 env[1477]: time="2024-02-09T10:28:41.234229037Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 10:28:41.234254 env[1477]: time="2024-02-09T10:28:41.234242463Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 10:28:41.234272 env[1477]: time="2024-02-09T10:28:41.234253731Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 10:28:41.234272 env[1477]: time="2024-02-09T10:28:41.234264355Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 10:28:41.234306 env[1477]: time="2024-02-09T10:28:41.234275154Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 10:28:41.234306 env[1477]: time="2024-02-09T10:28:41.234286807Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 10:28:41.234306 env[1477]: time="2024-02-09T10:28:41.234297258Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 10:28:41.234369 env[1477]: time="2024-02-09T10:28:41.234308418Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 10:28:41.234369 env[1477]: time="2024-02-09T10:28:41.234321065Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 10:28:41.234427 env[1477]: time="2024-02-09T10:28:41.234416950Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 10:28:41.234445 env[1477]: time="2024-02-09T10:28:41.234431915Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 10:28:41.234461 env[1477]: time="2024-02-09T10:28:41.234444083Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 10:28:41.234461 env[1477]: time="2024-02-09T10:28:41.234455606Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 10:28:41.234501 env[1477]: time="2024-02-09T10:28:41.234467931Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 10:28:41.234501 env[1477]: time="2024-02-09T10:28:41.234480009Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 10:28:41.234501 env[1477]: time="2024-02-09T10:28:41.234495249Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 10:28:41.234560 env[1477]: time="2024-02-09T10:28:41.234522269Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 10:28:41.234741 env[1477]: time="2024-02-09T10:28:41.234700164Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 10:28:41.237290 env[1477]: time="2024-02-09T10:28:41.234753681Z" level=info msg="Connect containerd service" Feb 9 10:28:41.237290 env[1477]: time="2024-02-09T10:28:41.234781126Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 10:28:41.237290 env[1477]: time="2024-02-09T10:28:41.235181981Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 10:28:41.237290 env[1477]: time="2024-02-09T10:28:41.235279581Z" level=info msg="Start subscribing containerd event" Feb 9 10:28:41.237290 env[1477]: time="2024-02-09T10:28:41.235521723Z" level=info msg="Start recovering state" Feb 9 10:28:41.237290 env[1477]: time="2024-02-09T10:28:41.235546424Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 10:28:41.237290 env[1477]: time="2024-02-09T10:28:41.235615608Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 10:28:41.237290 env[1477]: time="2024-02-09T10:28:41.235735880Z" level=info msg="containerd successfully booted in 0.023624s" Feb 9 10:28:41.237290 env[1477]: time="2024-02-09T10:28:41.235823772Z" level=info msg="Start event monitor" Feb 9 10:28:41.237290 env[1477]: time="2024-02-09T10:28:41.235837531Z" level=info msg="Start snapshots syncer" Feb 9 10:28:41.237290 env[1477]: time="2024-02-09T10:28:41.235843835Z" level=info msg="Start cni network conf syncer for default" Feb 9 10:28:41.237290 env[1477]: time="2024-02-09T10:28:41.235849604Z" level=info msg="Start streaming server" Feb 9 10:28:41.237509 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 10:28:41.237594 systemd[1]: Reached target system-config.target. Feb 9 10:28:41.245479 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 10:28:41.245559 systemd[1]: Reached target user-config.target. Feb 9 10:28:41.249164 tar[1470]: ./ptp Feb 9 10:28:41.254935 systemd[1]: Started containerd.service. Feb 9 10:28:41.261615 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 10:28:41.272741 tar[1470]: ./vlan Feb 9 10:28:41.294482 locksmithd[1511]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 10:28:41.296291 tar[1470]: ./host-device Feb 9 10:28:41.317674 tar[1470]: ./tuning Feb 9 10:28:41.336764 tar[1470]: ./vrf Feb 9 10:28:41.356604 tar[1470]: ./sbr Feb 9 10:28:41.376092 tar[1470]: ./tap Feb 9 10:28:41.398375 tar[1470]: ./dhcp Feb 9 10:28:41.454894 tar[1470]: ./static Feb 9 10:28:41.462817 tar[1472]: linux-amd64/LICENSE Feb 9 10:28:41.462865 tar[1472]: linux-amd64/README.md Feb 9 10:28:41.465380 systemd[1]: Finished prepare-helm.service. Feb 9 10:28:41.471010 tar[1470]: ./firewall Feb 9 10:28:41.482298 systemd[1]: Finished prepare-critools.service. Feb 9 10:28:41.495740 tar[1470]: ./macvlan Feb 9 10:28:41.517954 tar[1470]: ./dummy Feb 9 10:28:41.539816 tar[1470]: ./bridge Feb 9 10:28:41.558380 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 9 10:28:41.586880 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 10:28:41.587148 extend-filesystems[1452]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 10:28:41.587148 extend-filesystems[1452]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 10:28:41.587148 extend-filesystems[1452]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 9 10:28:41.631440 extend-filesystems[1437]: Resized filesystem in /dev/sda9 Feb 9 10:28:41.631440 extend-filesystems[1437]: Found sdb Feb 9 10:28:41.646445 tar[1470]: ./ipvlan Feb 9 10:28:41.646445 tar[1470]: ./portmap Feb 9 10:28:41.646445 tar[1470]: ./host-local Feb 9 10:28:41.587538 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 10:28:41.587628 systemd[1]: Finished extend-filesystems.service. Feb 9 10:28:41.659706 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 10:28:41.691343 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:1 Feb 9 10:28:41.694054 sshd_keygen[1464]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 10:28:41.705502 systemd[1]: Finished sshd-keygen.service. Feb 9 10:28:41.713229 systemd[1]: Starting issuegen.service... Feb 9 10:28:41.720673 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 10:28:41.720747 systemd[1]: Finished issuegen.service. Feb 9 10:28:41.728143 systemd[1]: Starting systemd-user-sessions.service... Feb 9 10:28:41.736638 systemd[1]: Finished systemd-user-sessions.service. Feb 9 10:28:41.745066 systemd[1]: Started getty@tty1.service. Feb 9 10:28:41.753026 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 10:28:41.761507 systemd[1]: Reached target getty.target. Feb 9 10:28:42.728386 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 9 10:28:46.773923 login[1539]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 10:28:46.781582 systemd-logind[1465]: New session 1 of user core. Feb 9 10:28:46.782051 systemd[1]: Created slice user-500.slice. Feb 9 10:28:46.782617 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 10:28:46.782814 login[1538]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 10:28:46.784880 systemd-logind[1465]: New session 2 of user core. Feb 9 10:28:46.787564 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 10:28:46.788212 systemd[1]: Starting user@500.service... Feb 9 10:28:46.790028 (systemd)[1541]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:46.874232 systemd[1541]: Queued start job for default target default.target. Feb 9 10:28:46.874465 systemd[1541]: Reached target paths.target. Feb 9 10:28:46.874477 systemd[1541]: Reached target sockets.target. Feb 9 10:28:46.874484 systemd[1541]: Reached target timers.target. Feb 9 10:28:46.874491 systemd[1541]: Reached target basic.target. Feb 9 10:28:46.874509 systemd[1541]: Reached target default.target. Feb 9 10:28:46.874523 systemd[1541]: Startup finished in 81ms. Feb 9 10:28:46.874568 systemd[1]: Started user@500.service. Feb 9 10:28:46.875106 systemd[1]: Started session-1.scope. Feb 9 10:28:46.875458 systemd[1]: Started session-2.scope. Feb 9 10:28:46.955232 coreos-metadata[1428]: Feb 09 10:28:46.955 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 10:28:46.955574 coreos-metadata[1431]: Feb 09 10:28:46.955 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 10:28:47.720352 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 9 10:28:47.720504 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 9 10:28:47.955828 coreos-metadata[1431]: Feb 09 10:28:47.955 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 10:28:47.956860 coreos-metadata[1428]: Feb 09 10:28:47.955 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 10:28:48.006248 coreos-metadata[1431]: Feb 09 10:28:48.006 INFO Fetch successful Feb 9 10:28:48.007587 coreos-metadata[1428]: Feb 09 10:28:48.007 INFO Fetch successful Feb 9 10:28:48.028511 systemd[1]: Finished coreos-metadata.service. Feb 9 10:28:48.029441 systemd[1]: Started packet-phone-home.service. Feb 9 10:28:48.030665 unknown[1428]: wrote ssh authorized keys file for user: core Feb 9 10:28:48.037101 curl[1563]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 10:28:48.037248 curl[1563]: Dload Upload Total Spent Left Speed Feb 9 10:28:48.042529 update-ssh-keys[1564]: Updated "/home/core/.ssh/authorized_keys" Feb 9 10:28:48.042724 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 10:28:48.042968 systemd[1]: Reached target multi-user.target. Feb 9 10:28:48.043669 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 10:28:48.047683 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 10:28:48.047758 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 10:28:48.047899 systemd[1]: Startup finished in 1.848s (kernel) + 20.046s (initrd) + 14.168s (userspace) = 36.064s. Feb 9 10:28:48.235094 curl[1563]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 10:28:48.237564 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 10:28:48.279868 systemd[1]: Created slice system-sshd.slice. Feb 9 10:28:48.282764 systemd[1]: Started sshd@0-147.75.49.59:22-147.75.109.163:53490.service. Feb 9 10:28:48.335271 sshd[1567]: Accepted publickey for core from 147.75.109.163 port 53490 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:28:48.336020 sshd[1567]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:48.338413 systemd-logind[1465]: New session 3 of user core. Feb 9 10:28:48.338911 systemd[1]: Started session-3.scope. Feb 9 10:28:48.351110 systemd-timesyncd[1421]: Contacted time server 104.167.241.197:123 (0.flatcar.pool.ntp.org). Feb 9 10:28:48.351147 systemd-timesyncd[1421]: Initial clock synchronization to Fri 2024-02-09 10:28:48.252696 UTC. Feb 9 10:28:48.388408 systemd[1]: Started sshd@1-147.75.49.59:22-147.75.109.163:53494.service. Feb 9 10:28:48.415733 sshd[1572]: Accepted publickey for core from 147.75.109.163 port 53494 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:28:48.416432 sshd[1572]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:48.418513 systemd-logind[1465]: New session 4 of user core. Feb 9 10:28:48.418968 systemd[1]: Started session-4.scope. Feb 9 10:28:48.482621 sshd[1572]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:48.489172 systemd[1]: sshd@1-147.75.49.59:22-147.75.109.163:53494.service: Deactivated successfully. Feb 9 10:28:48.490799 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 10:28:48.492431 systemd-logind[1465]: Session 4 logged out. Waiting for processes to exit. Feb 9 10:28:48.495044 systemd[1]: Started sshd@2-147.75.49.59:22-147.75.109.163:53510.service. Feb 9 10:28:48.497445 systemd-logind[1465]: Removed session 4. Feb 9 10:28:48.547546 sshd[1578]: Accepted publickey for core from 147.75.109.163 port 53510 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:28:48.548225 sshd[1578]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:48.550637 systemd-logind[1465]: New session 5 of user core. Feb 9 10:28:48.551023 systemd[1]: Started session-5.scope. Feb 9 10:28:48.597700 sshd[1578]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:48.599939 systemd[1]: sshd@2-147.75.49.59:22-147.75.109.163:53510.service: Deactivated successfully. Feb 9 10:28:48.600451 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 10:28:48.601003 systemd-logind[1465]: Session 5 logged out. Waiting for processes to exit. Feb 9 10:28:48.601831 systemd[1]: Started sshd@3-147.75.49.59:22-147.75.109.163:53514.service. Feb 9 10:28:48.602481 systemd-logind[1465]: Removed session 5. Feb 9 10:28:48.674245 sshd[1585]: Accepted publickey for core from 147.75.109.163 port 53514 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:28:48.676252 sshd[1585]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:48.682453 systemd-logind[1465]: New session 6 of user core. Feb 9 10:28:48.683874 systemd[1]: Started session-6.scope. Feb 9 10:28:48.755902 sshd[1585]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:48.762575 systemd[1]: sshd@3-147.75.49.59:22-147.75.109.163:53514.service: Deactivated successfully. Feb 9 10:28:48.764172 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 10:28:48.765887 systemd-logind[1465]: Session 6 logged out. Waiting for processes to exit. Feb 9 10:28:48.768434 systemd[1]: Started sshd@4-147.75.49.59:22-147.75.109.163:53516.service. Feb 9 10:28:48.770890 systemd-logind[1465]: Removed session 6. Feb 9 10:28:48.857731 sshd[1591]: Accepted publickey for core from 147.75.109.163 port 53516 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:28:48.859059 sshd[1591]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:48.862253 systemd-logind[1465]: New session 7 of user core. Feb 9 10:28:48.862958 systemd[1]: Started session-7.scope. Feb 9 10:28:48.940032 sudo[1594]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 10:28:48.940656 sudo[1594]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:28:48.963852 dbus-daemon[1434]: Н\xb5 \u007fU: received setenforce notice (enforcing=-514380208) Feb 9 10:28:48.968890 sudo[1594]: pam_unix(sudo:session): session closed for user root Feb 9 10:28:48.973973 sshd[1591]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:48.982789 systemd[1]: sshd@4-147.75.49.59:22-147.75.109.163:53516.service: Deactivated successfully. Feb 9 10:28:48.984968 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 10:28:48.987035 systemd-logind[1465]: Session 7 logged out. Waiting for processes to exit. Feb 9 10:28:48.990172 systemd[1]: Started sshd@5-147.75.49.59:22-147.75.109.163:53520.service. Feb 9 10:28:48.992908 systemd-logind[1465]: Removed session 7. Feb 9 10:28:49.072712 sshd[1598]: Accepted publickey for core from 147.75.109.163 port 53520 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:28:49.074365 sshd[1598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:49.079700 systemd-logind[1465]: New session 8 of user core. Feb 9 10:28:49.081605 systemd[1]: Started session-8.scope. Feb 9 10:28:49.143352 sudo[1602]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 10:28:49.143458 sudo[1602]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:28:49.145207 sudo[1602]: pam_unix(sudo:session): session closed for user root Feb 9 10:28:49.147467 sudo[1601]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 10:28:49.147575 sudo[1601]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:28:49.152752 systemd[1]: Stopping audit-rules.service... Feb 9 10:28:49.152000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:28:49.153615 auditctl[1605]: No rules Feb 9 10:28:49.153776 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 10:28:49.153862 systemd[1]: Stopped audit-rules.service. Feb 9 10:28:49.154747 systemd[1]: Starting audit-rules.service... Feb 9 10:28:49.158838 kernel: kauditd_printk_skb: 95 callbacks suppressed Feb 9 10:28:49.158869 kernel: audit: type=1305 audit(1707474529.152:170): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:28:49.164234 augenrules[1622]: No rules Feb 9 10:28:49.164534 systemd[1]: Finished audit-rules.service. Feb 9 10:28:49.164976 sudo[1601]: pam_unix(sudo:session): session closed for user root Feb 9 10:28:49.165749 sshd[1598]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:49.167487 systemd[1]: sshd@5-147.75.49.59:22-147.75.109.163:53520.service: Deactivated successfully. Feb 9 10:28:49.167829 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 10:28:49.168156 systemd-logind[1465]: Session 8 logged out. Waiting for processes to exit. Feb 9 10:28:49.168731 systemd[1]: Started sshd@6-147.75.49.59:22-147.75.109.163:53530.service. Feb 9 10:28:49.169159 systemd-logind[1465]: Removed session 8. Feb 9 10:28:49.152000 audit[1605]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff9f1d7dc0 a2=420 a3=0 items=0 ppid=1 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:49.204850 kernel: audit: type=1300 audit(1707474529.152:170): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff9f1d7dc0 a2=420 a3=0 items=0 ppid=1 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:49.204934 kernel: audit: type=1327 audit(1707474529.152:170): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:28:49.152000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:28:49.214265 kernel: audit: type=1131 audit(1707474529.152:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:49.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:49.235822 sshd[1628]: Accepted publickey for core from 147.75.109.163 port 53530 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:28:49.236457 kernel: audit: type=1130 audit(1707474529.163:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:49.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:49.236682 sshd[1628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:49.238878 systemd-logind[1465]: New session 9 of user core. Feb 9 10:28:49.239282 systemd[1]: Started session-9.scope. Feb 9 10:28:49.258619 kernel: audit: type=1106 audit(1707474529.163:173): pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:28:49.163000 audit[1601]: USER_END pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:28:49.284278 kernel: audit: type=1104 audit(1707474529.163:174): pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:28:49.163000 audit[1601]: CRED_DISP pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:28:49.285159 sudo[1631]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 10:28:49.285269 sudo[1631]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:28:49.307571 kernel: audit: type=1106 audit(1707474529.164:175): pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:28:49.164000 audit[1598]: USER_END pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:28:49.339344 kernel: audit: type=1104 audit(1707474529.165:176): pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:28:49.165000 audit[1598]: CRED_DISP pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:28:49.364992 kernel: audit: type=1131 audit(1707474529.166:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.75.49.59:22-147.75.109.163:53520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:49.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.75.49.59:22-147.75.109.163:53520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:49.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.49.59:22-147.75.109.163:53530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:49.234000 audit[1628]: USER_ACCT pid=1628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:28:49.235000 audit[1628]: CRED_ACQ pid=1628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:28:49.235000 audit[1628]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7c062e90 a2=3 a3=0 items=0 ppid=1 pid=1628 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:49.235000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:28:49.240000 audit[1628]: USER_START pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:28:49.240000 audit[1630]: CRED_ACQ pid=1630 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:28:49.284000 audit[1631]: USER_ACCT pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:28:49.284000 audit[1631]: CRED_REFR pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:28:49.285000 audit[1631]: USER_START pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:28:51.707361 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 10:28:51.711477 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 10:28:51.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:51.711672 systemd[1]: Reached target network-online.target. Feb 9 10:28:51.712378 systemd[1]: Starting docker.service... Feb 9 10:28:51.729737 env[1658]: time="2024-02-09T10:28:51.729681538Z" level=info msg="Starting up" Feb 9 10:28:51.730488 env[1658]: time="2024-02-09T10:28:51.730449912Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 10:28:51.730488 env[1658]: time="2024-02-09T10:28:51.730457941Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 10:28:51.730488 env[1658]: time="2024-02-09T10:28:51.730467799Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 10:28:51.730488 env[1658]: time="2024-02-09T10:28:51.730473647Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 10:28:51.731343 env[1658]: time="2024-02-09T10:28:51.731307345Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 10:28:51.731343 env[1658]: time="2024-02-09T10:28:51.731315019Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 10:28:51.731435 env[1658]: time="2024-02-09T10:28:51.731346133Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 10:28:51.731435 env[1658]: time="2024-02-09T10:28:51.731373934Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 10:28:51.746767 env[1658]: time="2024-02-09T10:28:51.746725629Z" level=info msg="Loading containers: start." Feb 9 10:28:51.802000 audit[1700]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:51.802000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd4328bf90 a2=0 a3=7ffd4328bf7c items=0 ppid=1658 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:51.802000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 10:28:51.803000 audit[1702]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:51.803000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe9899c150 a2=0 a3=7ffe9899c13c items=0 ppid=1658 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:51.803000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 10:28:51.804000 audit[1704]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:51.804000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd92849940 a2=0 a3=7ffd9284992c items=0 ppid=1658 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:51.804000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 10:28:51.805000 audit[1706]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:51.805000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffca0a5a180 a2=0 a3=7ffca0a5a16c items=0 ppid=1658 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:51.805000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 10:28:51.806000 audit[1708]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:51.806000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd6f1e3a50 a2=0 a3=7ffd6f1e3a3c items=0 ppid=1658 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:51.806000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 10:28:51.841000 audit[1713]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:51.841000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff02758b80 a2=0 a3=7fff02758b6c items=0 ppid=1658 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:51.841000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 10:28:51.848000 audit[1715]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:51.848000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff0c38c670 a2=0 a3=7fff0c38c65c items=0 ppid=1658 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:51.848000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 10:28:51.851000 audit[1717]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:51.851000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd9f33a570 a2=0 a3=7ffd9f33a55c items=0 ppid=1658 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:51.851000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 10:28:51.856000 audit[1719]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:51.856000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe237da4c0 a2=0 a3=7ffe237da4ac items=0 ppid=1658 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:51.856000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:28:51.871000 audit[1723]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:51.871000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc35aa7ca0 a2=0 a3=7ffc35aa7c8c items=0 ppid=1658 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:51.871000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:28:51.874000 audit[1724]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:51.874000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd5051c3a0 a2=0 a3=7ffd5051c38c items=0 ppid=1658 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:51.874000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:28:51.899426 kernel: Initializing XFRM netlink socket Feb 9 10:28:51.946311 env[1658]: time="2024-02-09T10:28:51.946288526Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 10:28:52.001000 audit[1732]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:52.001000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc0dbfc8c0 a2=0 a3=7ffc0dbfc8ac items=0 ppid=1658 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:52.001000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 10:28:52.018000 audit[1735]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:52.018000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc6c1a24c0 a2=0 a3=7ffc6c1a24ac items=0 ppid=1658 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:52.018000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 10:28:52.021000 audit[1738]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:52.021000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd90161ba0 a2=0 a3=7ffd90161b8c items=0 ppid=1658 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:52.021000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 10:28:52.023000 audit[1740]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:52.023000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd33094590 a2=0 a3=7ffd3309457c items=0 ppid=1658 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:52.023000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 10:28:52.026000 audit[1742]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:52.026000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd43724060 a2=0 a3=7ffd4372404c items=0 ppid=1658 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:52.026000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 10:28:52.028000 audit[1744]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:52.028000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff8d7bcc90 a2=0 a3=7fff8d7bcc7c items=0 ppid=1658 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:52.028000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 10:28:52.030000 audit[1746]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:52.030000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffeee2044f0 a2=0 a3=7ffeee2044dc items=0 ppid=1658 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:52.030000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 10:28:52.040000 audit[1749]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:52.040000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc7212f420 a2=0 a3=7ffc7212f40c items=0 ppid=1658 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:52.040000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 10:28:52.043000 audit[1751]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:52.043000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd6de160b0 a2=0 a3=7ffd6de1609c items=0 ppid=1658 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:52.043000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 10:28:52.046000 audit[1753]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:52.046000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff639b62f0 a2=0 a3=7fff639b62dc items=0 ppid=1658 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:52.046000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 10:28:52.049000 audit[1755]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:52.049000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd8f7e7d90 a2=0 a3=7ffd8f7e7d7c items=0 ppid=1658 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:52.049000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 10:28:52.051351 systemd-networkd[1329]: docker0: Link UP Feb 9 10:28:52.060000 audit[1759]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:52.060000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe8f8ebb60 a2=0 a3=7ffe8f8ebb4c items=0 ppid=1658 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:52.060000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:28:52.062000 audit[1760]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:28:52.062000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffac92bf00 a2=0 a3=7fffac92beec items=0 ppid=1658 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:28:52.062000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 10:28:52.064596 env[1658]: time="2024-02-09T10:28:52.064513821Z" level=info msg="Loading containers: done." Feb 9 10:28:52.085415 env[1658]: time="2024-02-09T10:28:52.085304905Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 10:28:52.085756 env[1658]: time="2024-02-09T10:28:52.085711057Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 10:28:52.086025 env[1658]: time="2024-02-09T10:28:52.085946756Z" level=info msg="Daemon has completed initialization" Feb 9 10:28:52.087636 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck56857157-merged.mount: Deactivated successfully. Feb 9 10:28:52.110800 systemd[1]: Started docker.service. Feb 9 10:28:52.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:52.127241 env[1658]: time="2024-02-09T10:28:52.127119184Z" level=info msg="API listen on /run/docker.sock" Feb 9 10:28:52.173402 systemd[1]: Reloading. Feb 9 10:28:52.226440 /usr/lib/systemd/system-generators/torcx-generator[1813]: time="2024-02-09T10:28:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:28:52.226459 /usr/lib/systemd/system-generators/torcx-generator[1813]: time="2024-02-09T10:28:52Z" level=info msg="torcx already run" Feb 9 10:28:52.292518 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:28:52.292529 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:28:52.306136 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:28:52.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit: BPF prog-id=37 op=LOAD Feb 9 10:28:52.352000 audit: BPF prog-id=21 op=UNLOAD Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit: BPF prog-id=38 op=LOAD Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit: BPF prog-id=39 op=LOAD Feb 9 10:28:52.352000 audit: BPF prog-id=22 op=UNLOAD Feb 9 10:28:52.352000 audit: BPF prog-id=23 op=UNLOAD Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit: BPF prog-id=40 op=LOAD Feb 9 10:28:52.353000 audit: BPF prog-id=35 op=UNLOAD Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit: BPF prog-id=41 op=LOAD Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit: BPF prog-id=42 op=LOAD Feb 9 10:28:52.353000 audit: BPF prog-id=24 op=UNLOAD Feb 9 10:28:52.353000 audit: BPF prog-id=25 op=UNLOAD Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.353000 audit: BPF prog-id=43 op=LOAD Feb 9 10:28:52.353000 audit: BPF prog-id=30 op=UNLOAD Feb 9 10:28:52.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.354000 audit: BPF prog-id=44 op=LOAD Feb 9 10:28:52.354000 audit: BPF prog-id=26 op=UNLOAD Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit: BPF prog-id=45 op=LOAD Feb 9 10:28:52.355000 audit: BPF prog-id=32 op=UNLOAD Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit: BPF prog-id=46 op=LOAD Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.355000 audit: BPF prog-id=47 op=LOAD Feb 9 10:28:52.355000 audit: BPF prog-id=33 op=UNLOAD Feb 9 10:28:52.355000 audit: BPF prog-id=34 op=UNLOAD Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit: BPF prog-id=48 op=LOAD Feb 9 10:28:52.356000 audit: BPF prog-id=27 op=UNLOAD Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit: BPF prog-id=49 op=LOAD Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.356000 audit: BPF prog-id=50 op=LOAD Feb 9 10:28:52.356000 audit: BPF prog-id=28 op=UNLOAD Feb 9 10:28:52.356000 audit: BPF prog-id=29 op=UNLOAD Feb 9 10:28:52.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:28:52.357000 audit: BPF prog-id=51 op=LOAD Feb 9 10:28:52.357000 audit: BPF prog-id=31 op=UNLOAD Feb 9 10:28:52.361786 systemd[1]: Started kubelet.service. Feb 9 10:28:52.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:28:52.383680 kubelet[1869]: E0209 10:28:52.383626 1869 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 10:28:52.384860 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:28:52.384926 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:28:52.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:28:53.023616 env[1477]: time="2024-02-09T10:28:53.023577014Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 9 10:28:53.708392 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4185562039.mount: Deactivated successfully. Feb 9 10:28:56.036942 env[1477]: time="2024-02-09T10:28:56.036893538Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:56.037557 env[1477]: time="2024-02-09T10:28:56.037544741Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:56.038527 env[1477]: time="2024-02-09T10:28:56.038518181Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:56.039701 env[1477]: time="2024-02-09T10:28:56.039688397Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:56.040161 env[1477]: time="2024-02-09T10:28:56.040148352Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47\"" Feb 9 10:28:56.048388 env[1477]: time="2024-02-09T10:28:56.048358401Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 9 10:28:58.981516 env[1477]: time="2024-02-09T10:28:58.981443257Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:58.982221 env[1477]: time="2024-02-09T10:28:58.982179637Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:58.983032 env[1477]: time="2024-02-09T10:28:58.982992056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:58.983941 env[1477]: time="2024-02-09T10:28:58.983901790Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:28:58.984507 env[1477]: time="2024-02-09T10:28:58.984471906Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c\"" Feb 9 10:28:58.990963 env[1477]: time="2024-02-09T10:28:58.990909598Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 9 10:29:00.634742 env[1477]: time="2024-02-09T10:29:00.634679873Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:00.635236 env[1477]: time="2024-02-09T10:29:00.635225605Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:00.636670 env[1477]: time="2024-02-09T10:29:00.636648891Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:00.638066 env[1477]: time="2024-02-09T10:29:00.638051927Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:00.638622 env[1477]: time="2024-02-09T10:29:00.638565494Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe\"" Feb 9 10:29:00.644017 env[1477]: time="2024-02-09T10:29:00.644000195Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 9 10:29:01.598583 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount903471241.mount: Deactivated successfully. Feb 9 10:29:02.452394 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 10:29:02.452539 systemd[1]: Stopped kubelet.service. Feb 9 10:29:02.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:02.453485 systemd[1]: Started kubelet.service. Feb 9 10:29:02.458172 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 9 10:29:02.458209 kernel: audit: type=1130 audit(1707474542.452:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:02.477546 kubelet[1938]: E0209 10:29:02.477470 1938 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 10:29:02.479923 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:29:02.480054 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:29:02.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:02.481968 env[1477]: time="2024-02-09T10:29:02.481926460Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:02.482807 env[1477]: time="2024-02-09T10:29:02.482791240Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:02.484277 env[1477]: time="2024-02-09T10:29:02.484249819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:02.485211 env[1477]: time="2024-02-09T10:29:02.485196923Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:02.485846 env[1477]: time="2024-02-09T10:29:02.485830009Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 9 10:29:02.491963 env[1477]: time="2024-02-09T10:29:02.491930346Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 10:29:02.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:02.590999 kernel: audit: type=1131 audit(1707474542.452:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:02.591034 kernel: audit: type=1130 audit(1707474542.453:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:02.591052 kernel: audit: type=1131 audit(1707474542.479:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:29:02.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:29:03.034366 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount664493293.mount: Deactivated successfully. Feb 9 10:29:03.035839 env[1477]: time="2024-02-09T10:29:03.035788034Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:03.036459 env[1477]: time="2024-02-09T10:29:03.036445827Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:03.037147 env[1477]: time="2024-02-09T10:29:03.037136597Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:03.037952 env[1477]: time="2024-02-09T10:29:03.037919155Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:03.038200 env[1477]: time="2024-02-09T10:29:03.038165043Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 10:29:03.046693 env[1477]: time="2024-02-09T10:29:03.046662353Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 9 10:29:03.616758 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1186021067.mount: Deactivated successfully. Feb 9 10:29:06.867755 env[1477]: time="2024-02-09T10:29:06.867669785Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:06.868814 env[1477]: time="2024-02-09T10:29:06.868795298Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:06.869949 env[1477]: time="2024-02-09T10:29:06.869910731Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:06.870930 env[1477]: time="2024-02-09T10:29:06.870889631Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:06.871812 env[1477]: time="2024-02-09T10:29:06.871770359Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Feb 9 10:29:06.876514 env[1477]: time="2024-02-09T10:29:06.876480038Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 10:29:07.448930 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2069838390.mount: Deactivated successfully. Feb 9 10:29:07.887400 env[1477]: time="2024-02-09T10:29:07.887357550Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:07.888109 env[1477]: time="2024-02-09T10:29:07.888094901Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:07.888970 env[1477]: time="2024-02-09T10:29:07.888942288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:07.889533 env[1477]: time="2024-02-09T10:29:07.889520462Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:07.889913 env[1477]: time="2024-02-09T10:29:07.889884186Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 10:29:09.657640 systemd[1]: Stopped kubelet.service. Feb 9 10:29:09.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:09.665586 systemd[1]: Reloading. Feb 9 10:29:09.690312 /usr/lib/systemd/system-generators/torcx-generator[2121]: time="2024-02-09T10:29:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:29:09.690340 /usr/lib/systemd/system-generators/torcx-generator[2121]: time="2024-02-09T10:29:09Z" level=info msg="torcx already run" Feb 9 10:29:09.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:09.717404 kernel: audit: type=1130 audit(1707474549.657:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:09.717470 kernel: audit: type=1131 audit(1707474549.657:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:09.795408 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:29:09.795415 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:29:09.806143 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:29:09.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:09.973406 kernel: audit: type=1400 audit(1707474549.850:393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:09.973479 kernel: audit: type=1400 audit(1707474549.850:394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:09.973510 kernel: audit: type=1400 audit(1707474549.850:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:09.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:09.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:09.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.098823 kernel: audit: type=1400 audit(1707474549.850:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.098897 kernel: audit: type=1400 audit(1707474549.850:397): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:09.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.162354 kernel: audit: type=1400 audit(1707474549.850:398): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:09.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.225756 kernel: audit: type=1400 audit(1707474549.850:399): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:09.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.289269 kernel: audit: type=1400 audit(1707474549.850:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:09.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:09.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.034000 audit: BPF prog-id=52 op=LOAD Feb 9 10:29:10.034000 audit: BPF prog-id=37 op=UNLOAD Feb 9 10:29:10.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.160000 audit: BPF prog-id=53 op=LOAD Feb 9 10:29:10.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.287000 audit: BPF prog-id=54 op=LOAD Feb 9 10:29:10.287000 audit: BPF prog-id=38 op=UNLOAD Feb 9 10:29:10.287000 audit: BPF prog-id=39 op=UNLOAD Feb 9 10:29:10.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.351000 audit: BPF prog-id=55 op=LOAD Feb 9 10:29:10.352000 audit: BPF prog-id=40 op=UNLOAD Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit: BPF prog-id=56 op=LOAD Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit: BPF prog-id=57 op=LOAD Feb 9 10:29:10.352000 audit: BPF prog-id=41 op=UNLOAD Feb 9 10:29:10.352000 audit: BPF prog-id=42 op=UNLOAD Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.352000 audit: BPF prog-id=58 op=LOAD Feb 9 10:29:10.352000 audit: BPF prog-id=43 op=UNLOAD Feb 9 10:29:10.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.353000 audit: BPF prog-id=59 op=LOAD Feb 9 10:29:10.353000 audit: BPF prog-id=44 op=UNLOAD Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit: BPF prog-id=60 op=LOAD Feb 9 10:29:10.354000 audit: BPF prog-id=45 op=UNLOAD Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit: BPF prog-id=61 op=LOAD Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.354000 audit: BPF prog-id=62 op=LOAD Feb 9 10:29:10.354000 audit: BPF prog-id=46 op=UNLOAD Feb 9 10:29:10.354000 audit: BPF prog-id=47 op=UNLOAD Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit: BPF prog-id=63 op=LOAD Feb 9 10:29:10.355000 audit: BPF prog-id=48 op=UNLOAD Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit: BPF prog-id=64 op=LOAD Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.355000 audit: BPF prog-id=65 op=LOAD Feb 9 10:29:10.355000 audit: BPF prog-id=49 op=UNLOAD Feb 9 10:29:10.355000 audit: BPF prog-id=50 op=UNLOAD Feb 9 10:29:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.356000 audit: BPF prog-id=66 op=LOAD Feb 9 10:29:10.356000 audit: BPF prog-id=51 op=UNLOAD Feb 9 10:29:10.363875 systemd[1]: Started kubelet.service. Feb 9 10:29:10.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:10.387285 kubelet[2180]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:29:10.387285 kubelet[2180]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 10:29:10.387285 kubelet[2180]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:29:10.387607 kubelet[2180]: I0209 10:29:10.387456 2180 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:29:10.759875 kubelet[2180]: I0209 10:29:10.759829 2180 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 10:29:10.759875 kubelet[2180]: I0209 10:29:10.759841 2180 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:29:10.759956 kubelet[2180]: I0209 10:29:10.759953 2180 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 10:29:10.761936 kubelet[2180]: I0209 10:29:10.761928 2180 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:29:10.762527 kubelet[2180]: E0209 10:29:10.762493 2180 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://147.75.49.59:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:10.782273 kubelet[2180]: I0209 10:29:10.782263 2180 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:29:10.782459 kubelet[2180]: I0209 10:29:10.782451 2180 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:29:10.782552 kubelet[2180]: I0209 10:29:10.782543 2180 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 10:29:10.782634 kubelet[2180]: I0209 10:29:10.782559 2180 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 10:29:10.782634 kubelet[2180]: I0209 10:29:10.782567 2180 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 10:29:10.782634 kubelet[2180]: I0209 10:29:10.782625 2180 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:29:10.782759 kubelet[2180]: I0209 10:29:10.782675 2180 kubelet.go:393] "Attempting to sync node with API server" Feb 9 10:29:10.782759 kubelet[2180]: I0209 10:29:10.782687 2180 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:29:10.782759 kubelet[2180]: I0209 10:29:10.782704 2180 kubelet.go:309] "Adding apiserver pod source" Feb 9 10:29:10.782759 kubelet[2180]: I0209 10:29:10.782731 2180 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:29:10.783025 kubelet[2180]: W0209 10:29:10.783007 2180 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://147.75.49.59:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:10.783025 kubelet[2180]: W0209 10:29:10.783000 2180 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://147.75.49.59:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-970bb49438&limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:10.783064 kubelet[2180]: E0209 10:29:10.783032 2180 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.49.59:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:10.783064 kubelet[2180]: E0209 10:29:10.783035 2180 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.49.59:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-970bb49438&limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:10.783064 kubelet[2180]: I0209 10:29:10.783056 2180 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:29:10.783279 kubelet[2180]: W0209 10:29:10.783274 2180 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 10:29:10.783599 kubelet[2180]: I0209 10:29:10.783563 2180 server.go:1232] "Started kubelet" Feb 9 10:29:10.783657 kubelet[2180]: I0209 10:29:10.783610 2180 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:29:10.783688 kubelet[2180]: I0209 10:29:10.783661 2180 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 10:29:10.783815 kubelet[2180]: I0209 10:29:10.783804 2180 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 10:29:10.783848 kubelet[2180]: E0209 10:29:10.783816 2180 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:29:10.783848 kubelet[2180]: E0209 10:29:10.783831 2180 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:29:10.783848 kubelet[2180]: E0209 10:29:10.783754 2180 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-970bb49438.17b22b0eae792e52", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-970bb49438", UID:"ci-3510.3.2-a-970bb49438", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-970bb49438"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 10, 783553106, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 10, 783553106, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-970bb49438"}': 'Post "https://147.75.49.59:6443/api/v1/namespaces/default/events": dial tcp 147.75.49.59:6443: connect: connection refused'(may retry after sleeping) Feb 9 10:29:10.784147 kubelet[2180]: I0209 10:29:10.784140 2180 server.go:462] "Adding debug handlers to kubelet server" Feb 9 10:29:10.783000 audit[2180]: AVC avc: denied { mac_admin } for pid=2180 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.783000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:29:10.783000 audit[2180]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c7ca80 a1=c0008906c0 a2=c000c7ca50 a3=25 items=0 ppid=1 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.783000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:29:10.784000 audit[2180]: AVC avc: denied { mac_admin } for pid=2180 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:10.784000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:29:10.784000 audit[2180]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000570320 a1=c0008906d8 a2=c000c7cb10 a3=25 items=0 ppid=1 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.784000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:29:10.784621 kubelet[2180]: I0209 10:29:10.784350 2180 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:29:10.784621 kubelet[2180]: I0209 10:29:10.784378 2180 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:29:10.784621 kubelet[2180]: I0209 10:29:10.784422 2180 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:29:10.784621 kubelet[2180]: I0209 10:29:10.784482 2180 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 10:29:10.784621 kubelet[2180]: E0209 10:29:10.784505 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:10.784621 kubelet[2180]: I0209 10:29:10.784509 2180 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 10:29:10.784621 kubelet[2180]: I0209 10:29:10.784533 2180 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 10:29:10.784803 kubelet[2180]: W0209 10:29:10.784630 2180 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://147.75.49.59:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:10.784803 kubelet[2180]: E0209 10:29:10.784653 2180 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.49.59:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:10.784803 kubelet[2180]: E0209 10:29:10.784655 2180 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.49.59:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-970bb49438?timeout=10s\": dial tcp 147.75.49.59:6443: connect: connection refused" interval="200ms" Feb 9 10:29:10.785000 audit[2203]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:10.785000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdcb1b7380 a2=0 a3=7ffdcb1b736c items=0 ppid=2180 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:29:10.786000 audit[2206]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:10.786000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff25ba7ec0 a2=0 a3=7fff25ba7eac items=0 ppid=2180 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.786000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:29:10.787000 audit[2208]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:10.787000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe6ab399c0 a2=0 a3=7ffe6ab399ac items=0 ppid=2180 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:29:10.788000 audit[2210]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:10.788000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe5db5d350 a2=0 a3=7ffe5db5d33c items=0 ppid=2180 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.788000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:29:10.804000 audit[2213]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:10.804000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffeb5eb9d00 a2=0 a3=7ffeb5eb9cec items=0 ppid=2180 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.804000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 10:29:10.805419 kubelet[2180]: I0209 10:29:10.805361 2180 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 10:29:10.805000 audit[2214]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:10.805000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff0e8d3020 a2=0 a3=7fff0e8d300c items=0 ppid=2180 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:29:10.805957 kubelet[2180]: I0209 10:29:10.805858 2180 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 10:29:10.805957 kubelet[2180]: I0209 10:29:10.805875 2180 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 10:29:10.805957 kubelet[2180]: I0209 10:29:10.805886 2180 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 10:29:10.805957 kubelet[2180]: E0209 10:29:10.805911 2180 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 10:29:10.805000 audit[2216]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:10.805000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffad9737e0 a2=0 a3=7fffad9737cc items=0 ppid=2180 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.805000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:29:10.806135 kubelet[2180]: W0209 10:29:10.806115 2180 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://147.75.49.59:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:10.806159 kubelet[2180]: E0209 10:29:10.806145 2180 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.75.49.59:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:10.805000 audit[2217]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:10.805000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe4e9eec90 a2=0 a3=7ffe4e9eec7c items=0 ppid=2180 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:29:10.806000 audit[2218]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:10.806000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0586bf00 a2=0 a3=7fff0586beec items=0 ppid=2180 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:29:10.806000 audit[2219]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:10.806000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd976426d0 a2=0 a3=7ffd976426bc items=0 ppid=2180 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.806000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:29:10.806000 audit[2220]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:10.806000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcff876c30 a2=0 a3=7ffcff876c1c items=0 ppid=2180 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:29:10.806000 audit[2221]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:10.806000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffee3dd2400 a2=0 a3=7ffee3dd23ec items=0 ppid=2180 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:10.806000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:29:10.906903 kubelet[2180]: E0209 10:29:10.906795 2180 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 10:29:10.967528 kubelet[2180]: I0209 10:29:10.967430 2180 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-970bb49438" Feb 9 10:29:10.968170 kubelet[2180]: E0209 10:29:10.968096 2180 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.75.49.59:6443/api/v1/nodes\": dial tcp 147.75.49.59:6443: connect: connection refused" node="ci-3510.3.2-a-970bb49438" Feb 9 10:29:10.968760 kubelet[2180]: I0209 10:29:10.968677 2180 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:29:10.968760 kubelet[2180]: I0209 10:29:10.968730 2180 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:29:10.969075 kubelet[2180]: I0209 10:29:10.968784 2180 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:29:10.970597 kubelet[2180]: I0209 10:29:10.970509 2180 policy_none.go:49] "None policy: Start" Feb 9 10:29:10.971846 kubelet[2180]: I0209 10:29:10.971756 2180 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:29:10.971846 kubelet[2180]: I0209 10:29:10.971819 2180 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:29:10.981830 systemd[1]: Created slice kubepods.slice. Feb 9 10:29:10.985416 kubelet[2180]: E0209 10:29:10.985360 2180 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.49.59:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-970bb49438?timeout=10s\": dial tcp 147.75.49.59:6443: connect: connection refused" interval="400ms" Feb 9 10:29:10.991858 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 10:29:10.998933 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 10:29:11.018000 audit[2180]: AVC avc: denied { mac_admin } for pid=2180 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:11.018000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:29:11.018000 audit[2180]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011708d0 a1=c0008c0fa8 a2=c0011708a0 a3=25 items=0 ppid=1 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:11.018000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:29:11.019968 kubelet[2180]: I0209 10:29:11.019095 2180 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:29:11.019968 kubelet[2180]: I0209 10:29:11.019234 2180 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:29:11.019968 kubelet[2180]: I0209 10:29:11.019634 2180 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:29:11.020586 kubelet[2180]: E0209 10:29:11.020538 2180 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:11.107636 kubelet[2180]: I0209 10:29:11.107565 2180 topology_manager.go:215] "Topology Admit Handler" podUID="890f0eabb5dff2425eea08eb6e845f2b" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.111473 kubelet[2180]: I0209 10:29:11.111426 2180 topology_manager.go:215] "Topology Admit Handler" podUID="a7ed17659effe6e0a59a2321492cd123" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.114855 kubelet[2180]: I0209 10:29:11.114802 2180 topology_manager.go:215] "Topology Admit Handler" podUID="fe47a9791e60bb474701ecb70b65b760" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.127671 systemd[1]: Created slice kubepods-burstable-pod890f0eabb5dff2425eea08eb6e845f2b.slice. Feb 9 10:29:11.153644 systemd[1]: Created slice kubepods-burstable-poda7ed17659effe6e0a59a2321492cd123.slice. Feb 9 10:29:11.161188 systemd[1]: Created slice kubepods-burstable-podfe47a9791e60bb474701ecb70b65b760.slice. Feb 9 10:29:11.171840 kubelet[2180]: I0209 10:29:11.171782 2180 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.172540 kubelet[2180]: E0209 10:29:11.172456 2180 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.75.49.59:6443/api/v1/nodes\": dial tcp 147.75.49.59:6443: connect: connection refused" node="ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.186033 kubelet[2180]: I0209 10:29:11.185948 2180 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/890f0eabb5dff2425eea08eb6e845f2b-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-970bb49438\" (UID: \"890f0eabb5dff2425eea08eb6e845f2b\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.286918 kubelet[2180]: I0209 10:29:11.286726 2180 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/890f0eabb5dff2425eea08eb6e845f2b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-970bb49438\" (UID: \"890f0eabb5dff2425eea08eb6e845f2b\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.286918 kubelet[2180]: I0209 10:29:11.286848 2180 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/890f0eabb5dff2425eea08eb6e845f2b-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-970bb49438\" (UID: \"890f0eabb5dff2425eea08eb6e845f2b\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.287442 kubelet[2180]: I0209 10:29:11.286947 2180 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a7ed17659effe6e0a59a2321492cd123-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-970bb49438\" (UID: \"a7ed17659effe6e0a59a2321492cd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.287442 kubelet[2180]: I0209 10:29:11.287054 2180 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a7ed17659effe6e0a59a2321492cd123-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-970bb49438\" (UID: \"a7ed17659effe6e0a59a2321492cd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.287442 kubelet[2180]: I0209 10:29:11.287166 2180 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a7ed17659effe6e0a59a2321492cd123-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-970bb49438\" (UID: \"a7ed17659effe6e0a59a2321492cd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.287442 kubelet[2180]: I0209 10:29:11.287272 2180 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a7ed17659effe6e0a59a2321492cd123-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-970bb49438\" (UID: \"a7ed17659effe6e0a59a2321492cd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.287442 kubelet[2180]: I0209 10:29:11.287429 2180 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a7ed17659effe6e0a59a2321492cd123-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-970bb49438\" (UID: \"a7ed17659effe6e0a59a2321492cd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.287991 kubelet[2180]: I0209 10:29:11.287553 2180 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fe47a9791e60bb474701ecb70b65b760-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-970bb49438\" (UID: \"fe47a9791e60bb474701ecb70b65b760\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.387278 kubelet[2180]: E0209 10:29:11.387188 2180 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.49.59:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-970bb49438?timeout=10s\": dial tcp 147.75.49.59:6443: connect: connection refused" interval="800ms" Feb 9 10:29:11.450077 env[1477]: time="2024-02-09T10:29:11.449924285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-970bb49438,Uid:890f0eabb5dff2425eea08eb6e845f2b,Namespace:kube-system,Attempt:0,}" Feb 9 10:29:11.459079 env[1477]: time="2024-02-09T10:29:11.458960425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-970bb49438,Uid:a7ed17659effe6e0a59a2321492cd123,Namespace:kube-system,Attempt:0,}" Feb 9 10:29:11.465979 env[1477]: time="2024-02-09T10:29:11.465873597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-970bb49438,Uid:fe47a9791e60bb474701ecb70b65b760,Namespace:kube-system,Attempt:0,}" Feb 9 10:29:11.576619 kubelet[2180]: I0209 10:29:11.576466 2180 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.577165 kubelet[2180]: E0209 10:29:11.577123 2180 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://147.75.49.59:6443/api/v1/nodes\": dial tcp 147.75.49.59:6443: connect: connection refused" node="ci-3510.3.2-a-970bb49438" Feb 9 10:29:11.820630 kubelet[2180]: W0209 10:29:11.820534 2180 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://147.75.49.59:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-970bb49438&limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:11.820630 kubelet[2180]: E0209 10:29:11.820606 2180 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.49.59:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-970bb49438&limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:11.927796 kubelet[2180]: W0209 10:29:11.927531 2180 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://147.75.49.59:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:11.927796 kubelet[2180]: E0209 10:29:11.927673 2180 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.49.59:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:11.971086 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount974993309.mount: Deactivated successfully. Feb 9 10:29:11.972427 env[1477]: time="2024-02-09T10:29:11.972336580Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:11.973670 env[1477]: time="2024-02-09T10:29:11.973657686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:11.974277 env[1477]: time="2024-02-09T10:29:11.974236579Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:11.974876 env[1477]: time="2024-02-09T10:29:11.974827361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:11.975230 env[1477]: time="2024-02-09T10:29:11.975180088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:11.976035 env[1477]: time="2024-02-09T10:29:11.975993552Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:11.976463 env[1477]: time="2024-02-09T10:29:11.976424318Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:11.977772 env[1477]: time="2024-02-09T10:29:11.977726567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:11.978171 env[1477]: time="2024-02-09T10:29:11.978136271Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:11.979771 env[1477]: time="2024-02-09T10:29:11.979729588Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:11.980187 env[1477]: time="2024-02-09T10:29:11.980151152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:11.980980 env[1477]: time="2024-02-09T10:29:11.980945908Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:11.987977 env[1477]: time="2024-02-09T10:29:11.987944468Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:29:11.987977 env[1477]: time="2024-02-09T10:29:11.987967948Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:29:11.987977 env[1477]: time="2024-02-09T10:29:11.987978778Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:29:11.988085 env[1477]: time="2024-02-09T10:29:11.988043028Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f55be7f6275e24de7b402cf83328f990dab391957a6c5cc22e3ada31c2aa43ad pid=2233 runtime=io.containerd.runc.v2 Feb 9 10:29:11.988687 env[1477]: time="2024-02-09T10:29:11.988663894Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:29:11.988725 env[1477]: time="2024-02-09T10:29:11.988685470Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:29:11.988725 env[1477]: time="2024-02-09T10:29:11.988697597Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:29:11.988781 env[1477]: time="2024-02-09T10:29:11.988764492Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6794abd173c10580f9f178d69b6dc3386033ea2d3f84185b0711a7507392b462 pid=2240 runtime=io.containerd.runc.v2 Feb 9 10:29:11.990300 env[1477]: time="2024-02-09T10:29:11.990264752Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:29:11.990300 env[1477]: time="2024-02-09T10:29:11.990286747Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:29:11.990300 env[1477]: time="2024-02-09T10:29:11.990296952Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:29:11.990453 env[1477]: time="2024-02-09T10:29:11.990400416Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/274439e58ff59fd0b5fd3debe610b8d43617e946febca4c0ed3a89d3181a5a2a pid=2262 runtime=io.containerd.runc.v2 Feb 9 10:29:11.995926 systemd[1]: Started cri-containerd-274439e58ff59fd0b5fd3debe610b8d43617e946febca4c0ed3a89d3181a5a2a.scope. Feb 9 10:29:12.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit: BPF prog-id=67 op=LOAD Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=2262 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237343433396535386666353966643062356664336465626536313062 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=c items=0 ppid=2262 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237343433396535386666353966643062356664336465626536313062 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit: BPF prog-id=68 op=LOAD Feb 9 10:29:12.000000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c000308c60 items=0 ppid=2262 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237343433396535386666353966643062356664336465626536313062 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit: BPF prog-id=69 op=LOAD Feb 9 10:29:12.000000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c000308ca8 items=0 ppid=2262 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237343433396535386666353966643062356664336465626536313062 Feb 9 10:29:12.000000 audit: BPF prog-id=69 op=UNLOAD Feb 9 10:29:12.000000 audit: BPF prog-id=68 op=UNLOAD Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.000000 audit: BPF prog-id=70 op=LOAD Feb 9 10:29:12.000000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c0003090b8 items=0 ppid=2262 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237343433396535386666353966643062356664336465626536313062 Feb 9 10:29:12.004887 systemd[1]: Started cri-containerd-f55be7f6275e24de7b402cf83328f990dab391957a6c5cc22e3ada31c2aa43ad.scope. Feb 9 10:29:12.006217 systemd[1]: Started cri-containerd-6794abd173c10580f9f178d69b6dc3386033ea2d3f84185b0711a7507392b462.scope. Feb 9 10:29:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit: BPF prog-id=71 op=LOAD Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2233 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635356265376636323735653234646537623430326366383333323866 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2233 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635356265376636323735653234646537623430326366383333323866 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit: BPF prog-id=72 op=LOAD Feb 9 10:29:12.010000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000990c0 items=0 ppid=2233 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635356265376636323735653234646537623430326366383333323866 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit: BPF prog-id=73 op=LOAD Feb 9 10:29:12.010000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000099108 items=0 ppid=2233 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635356265376636323735653234646537623430326366383333323866 Feb 9 10:29:12.010000 audit: BPF prog-id=73 op=UNLOAD Feb 9 10:29:12.010000 audit: BPF prog-id=72 op=UNLOAD Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.010000 audit: BPF prog-id=74 op=LOAD Feb 9 10:29:12.010000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000099518 items=0 ppid=2233 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635356265376636323735653234646537623430326366383333323866 Feb 9 10:29:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit: BPF prog-id=75 op=LOAD Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2240 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637393461626431373363313035383066396631373864363962366463 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2240 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637393461626431373363313035383066396631373864363962366463 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit: BPF prog-id=76 op=LOAD Feb 9 10:29:12.011000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00028cee0 items=0 ppid=2240 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637393461626431373363313035383066396631373864363962366463 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit: BPF prog-id=77 op=LOAD Feb 9 10:29:12.011000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00028cf28 items=0 ppid=2240 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637393461626431373363313035383066396631373864363962366463 Feb 9 10:29:12.011000 audit: BPF prog-id=77 op=UNLOAD Feb 9 10:29:12.011000 audit: BPF prog-id=76 op=UNLOAD Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { perfmon } for pid=2263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit[2263]: AVC avc: denied { bpf } for pid=2263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.011000 audit: BPF prog-id=78 op=LOAD Feb 9 10:29:12.011000 audit[2263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00028d338 items=0 ppid=2240 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637393461626431373363313035383066396631373864363962366463 Feb 9 10:29:12.028993 env[1477]: time="2024-02-09T10:29:12.028964793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-970bb49438,Uid:890f0eabb5dff2425eea08eb6e845f2b,Namespace:kube-system,Attempt:0,} returns sandbox id \"6794abd173c10580f9f178d69b6dc3386033ea2d3f84185b0711a7507392b462\"" Feb 9 10:29:12.030511 env[1477]: time="2024-02-09T10:29:12.030496101Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-970bb49438,Uid:fe47a9791e60bb474701ecb70b65b760,Namespace:kube-system,Attempt:0,} returns sandbox id \"274439e58ff59fd0b5fd3debe610b8d43617e946febca4c0ed3a89d3181a5a2a\"" Feb 9 10:29:12.030750 env[1477]: time="2024-02-09T10:29:12.030736613Z" level=info msg="CreateContainer within sandbox \"6794abd173c10580f9f178d69b6dc3386033ea2d3f84185b0711a7507392b462\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 10:29:12.031319 env[1477]: time="2024-02-09T10:29:12.031306548Z" level=info msg="CreateContainer within sandbox \"274439e58ff59fd0b5fd3debe610b8d43617e946febca4c0ed3a89d3181a5a2a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 10:29:12.036922 env[1477]: time="2024-02-09T10:29:12.036878152Z" level=info msg="CreateContainer within sandbox \"274439e58ff59fd0b5fd3debe610b8d43617e946febca4c0ed3a89d3181a5a2a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"06609cc4236b40863acdf1bc5e9a0e8fa13b0cfd7efc2f407d30bac42faf7345\"" Feb 9 10:29:12.037182 env[1477]: time="2024-02-09T10:29:12.037139015Z" level=info msg="StartContainer for \"06609cc4236b40863acdf1bc5e9a0e8fa13b0cfd7efc2f407d30bac42faf7345\"" Feb 9 10:29:12.037241 env[1477]: time="2024-02-09T10:29:12.037228363Z" level=info msg="CreateContainer within sandbox \"6794abd173c10580f9f178d69b6dc3386033ea2d3f84185b0711a7507392b462\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"7732dc78e9b545d8e99ccbee15521b3869c97d1b1b7d0ddcc013765f3522aeb3\"" Feb 9 10:29:12.037399 env[1477]: time="2024-02-09T10:29:12.037355398Z" level=info msg="StartContainer for \"7732dc78e9b545d8e99ccbee15521b3869c97d1b1b7d0ddcc013765f3522aeb3\"" Feb 9 10:29:12.040752 env[1477]: time="2024-02-09T10:29:12.040724599Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-970bb49438,Uid:a7ed17659effe6e0a59a2321492cd123,Namespace:kube-system,Attempt:0,} returns sandbox id \"f55be7f6275e24de7b402cf83328f990dab391957a6c5cc22e3ada31c2aa43ad\"" Feb 9 10:29:12.041959 env[1477]: time="2024-02-09T10:29:12.041944805Z" level=info msg="CreateContainer within sandbox \"f55be7f6275e24de7b402cf83328f990dab391957a6c5cc22e3ada31c2aa43ad\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 10:29:12.044739 systemd[1]: Started cri-containerd-7732dc78e9b545d8e99ccbee15521b3869c97d1b1b7d0ddcc013765f3522aeb3.scope. Feb 9 10:29:12.047003 env[1477]: time="2024-02-09T10:29:12.046948861Z" level=info msg="CreateContainer within sandbox \"f55be7f6275e24de7b402cf83328f990dab391957a6c5cc22e3ada31c2aa43ad\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"4aacc8d71b4c7bbb28344e50c77bfadea74f2f94e35a4586d71193d77d622c5d\"" Feb 9 10:29:12.047199 env[1477]: time="2024-02-09T10:29:12.047184432Z" level=info msg="StartContainer for \"4aacc8d71b4c7bbb28344e50c77bfadea74f2f94e35a4586d71193d77d622c5d\"" Feb 9 10:29:12.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit: BPF prog-id=79 op=LOAD Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2240 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333264633738653962353435643865393963636265653135353231 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2240 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333264633738653962353435643865393963636265653135353231 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit: BPF prog-id=80 op=LOAD Feb 9 10:29:12.050000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000097da0 items=0 ppid=2240 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333264633738653962353435643865393963636265653135353231 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit: BPF prog-id=81 op=LOAD Feb 9 10:29:12.050000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000097de8 items=0 ppid=2240 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333264633738653962353435643865393963636265653135353231 Feb 9 10:29:12.050000 audit: BPF prog-id=81 op=UNLOAD Feb 9 10:29:12.050000 audit: BPF prog-id=80 op=UNLOAD Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.050000 audit: BPF prog-id=82 op=LOAD Feb 9 10:29:12.050000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0004161f8 items=0 ppid=2240 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333264633738653962353435643865393963636265653135353231 Feb 9 10:29:12.056945 systemd[1]: Started cri-containerd-06609cc4236b40863acdf1bc5e9a0e8fa13b0cfd7efc2f407d30bac42faf7345.scope. Feb 9 10:29:12.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit: BPF prog-id=83 op=LOAD Feb 9 10:29:12.061000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2262 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363039636334323336623430383633616364663162633565396130 Feb 9 10:29:12.061000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2262 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363039636334323336623430383633616364663162633565396130 Feb 9 10:29:12.061000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.061000 audit: BPF prog-id=84 op=LOAD Feb 9 10:29:12.061000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003cc030 items=0 ppid=2262 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363039636334323336623430383633616364663162633565396130 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit: BPF prog-id=85 op=LOAD Feb 9 10:29:12.062000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003cc078 items=0 ppid=2262 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363039636334323336623430383633616364663162633565396130 Feb 9 10:29:12.062000 audit: BPF prog-id=85 op=UNLOAD Feb 9 10:29:12.062000 audit: BPF prog-id=84 op=UNLOAD Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.062000 audit: BPF prog-id=86 op=LOAD Feb 9 10:29:12.062000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003cc488 items=0 ppid=2262 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036363039636334323336623430383633616364663162633565396130 Feb 9 10:29:12.066694 systemd[1]: Started cri-containerd-4aacc8d71b4c7bbb28344e50c77bfadea74f2f94e35a4586d71193d77d622c5d.scope. Feb 9 10:29:12.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit: BPF prog-id=87 op=LOAD Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2233 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461616363386437316234633762626232383334346535306337376266 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2233 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461616363386437316234633762626232383334346535306337376266 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit: BPF prog-id=88 op=LOAD Feb 9 10:29:12.072000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003da0a0 items=0 ppid=2233 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461616363386437316234633762626232383334346535306337376266 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit: BPF prog-id=89 op=LOAD Feb 9 10:29:12.072000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003da0e8 items=0 ppid=2233 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461616363386437316234633762626232383334346535306337376266 Feb 9 10:29:12.072000 audit: BPF prog-id=89 op=UNLOAD Feb 9 10:29:12.072000 audit: BPF prog-id=88 op=UNLOAD Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { perfmon } for pid=2384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit[2384]: AVC avc: denied { bpf } for pid=2384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:12.072000 audit: BPF prog-id=90 op=LOAD Feb 9 10:29:12.072000 audit[2384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003da4f8 items=0 ppid=2233 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:12.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461616363386437316234633762626232383334346535306337376266 Feb 9 10:29:12.082204 env[1477]: time="2024-02-09T10:29:12.082181135Z" level=info msg="StartContainer for \"06609cc4236b40863acdf1bc5e9a0e8fa13b0cfd7efc2f407d30bac42faf7345\" returns successfully" Feb 9 10:29:12.086036 env[1477]: time="2024-02-09T10:29:12.086011420Z" level=info msg="StartContainer for \"7732dc78e9b545d8e99ccbee15521b3869c97d1b1b7d0ddcc013765f3522aeb3\" returns successfully" Feb 9 10:29:12.104393 env[1477]: time="2024-02-09T10:29:12.104367615Z" level=info msg="StartContainer for \"4aacc8d71b4c7bbb28344e50c77bfadea74f2f94e35a4586d71193d77d622c5d\" returns successfully" Feb 9 10:29:12.109980 kubelet[2180]: W0209 10:29:12.109947 2180 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://147.75.49.59:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:12.109980 kubelet[2180]: E0209 10:29:12.109982 2180 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.49.59:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.49.59:6443: connect: connection refused Feb 9 10:29:12.379000 kubelet[2180]: I0209 10:29:12.378961 2180 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-970bb49438" Feb 9 10:29:12.745000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:12.745000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:12.745000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0015ae020 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:29:12.745000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000670c90 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:29:12.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:12.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:12.757000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:12.757000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:12.757000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c000772030 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:29:12.757000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00454ddc0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:29:12.757000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:29:12.757000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:29:12.758000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:12.758000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c001ca05d0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:29:12.758000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:29:12.758000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:12.758000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c001ca0660 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:29:12.758000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:29:12.759000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:12.759000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c000bba020 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:29:12.759000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:12.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:29:12.759000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c001ca0870 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:29:12.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:29:12.770894 kubelet[2180]: E0209 10:29:12.770877 2180 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-970bb49438\" not found" node="ci-3510.3.2-a-970bb49438" Feb 9 10:29:12.869633 kubelet[2180]: I0209 10:29:12.869605 2180 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-970bb49438" Feb 9 10:29:12.878411 kubelet[2180]: E0209 10:29:12.878375 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:12.979082 kubelet[2180]: E0209 10:29:12.979017 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:13.079814 kubelet[2180]: E0209 10:29:13.079629 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:13.180292 kubelet[2180]: E0209 10:29:13.180224 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:13.280540 kubelet[2180]: E0209 10:29:13.280470 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:13.381483 kubelet[2180]: E0209 10:29:13.381295 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:13.482560 kubelet[2180]: E0209 10:29:13.482487 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:13.583571 kubelet[2180]: E0209 10:29:13.583476 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:13.684669 kubelet[2180]: E0209 10:29:13.684498 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:13.784730 kubelet[2180]: E0209 10:29:13.784647 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:13.885163 kubelet[2180]: E0209 10:29:13.885116 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:13.985282 kubelet[2180]: E0209 10:29:13.985240 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:14.086365 kubelet[2180]: E0209 10:29:14.086252 2180 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:14.785131 kubelet[2180]: I0209 10:29:14.785016 2180 apiserver.go:52] "Watching apiserver" Feb 9 10:29:14.884975 kubelet[2180]: I0209 10:29:14.884909 2180 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 10:29:15.482204 kubelet[2180]: W0209 10:29:15.482190 2180 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 10:29:16.020487 systemd[1]: Reloading. Feb 9 10:29:16.054682 /usr/lib/systemd/system-generators/torcx-generator[2507]: time="2024-02-09T10:29:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:29:16.054699 /usr/lib/systemd/system-generators/torcx-generator[2507]: time="2024-02-09T10:29:16Z" level=info msg="torcx already run" Feb 9 10:29:16.070253 kubelet[2180]: W0209 10:29:16.070238 2180 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 10:29:16.108617 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:29:16.108625 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:29:16.122856 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:29:16.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.204699 kernel: kauditd_printk_skb: 579 callbacks suppressed Feb 9 10:29:16.204729 kernel: audit: type=1400 audit(1707474556.176:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.330877 kernel: audit: type=1400 audit(1707474556.176:698): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.330908 kernel: audit: type=1400 audit(1707474556.176:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.393933 kernel: audit: type=1400 audit(1707474556.176:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.457407 kernel: audit: type=1400 audit(1707474556.176:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.520853 kernel: audit: type=1400 audit(1707474556.176:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.584333 kernel: audit: type=1400 audit(1707474556.176:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.647756 kernel: audit: type=1400 audit(1707474556.176:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.711198 kernel: audit: type=1400 audit(1707474556.176:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.775170 kernel: audit: type=1400 audit(1707474556.329:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.329000 audit: BPF prog-id=91 op=LOAD Feb 9 10:29:16.329000 audit: BPF prog-id=87 op=UNLOAD Feb 9 10:29:16.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.456000 audit: BPF prog-id=92 op=LOAD Feb 9 10:29:16.456000 audit: BPF prog-id=52 op=UNLOAD Feb 9 10:29:16.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.564000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:16.564000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013c30a0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:29:16.564000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:16.565000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:16.565000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000251640 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:29:16.565000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:16.565000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:16.565000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000de7080 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:29:16.565000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:16.566000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:29:16.566000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d56b60 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:29:16.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:16.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.583000 audit: BPF prog-id=93 op=LOAD Feb 9 10:29:16.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.710000 audit: BPF prog-id=94 op=LOAD Feb 9 10:29:16.710000 audit: BPF prog-id=53 op=UNLOAD Feb 9 10:29:16.710000 audit: BPF prog-id=54 op=UNLOAD Feb 9 10:29:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.839000 audit: BPF prog-id=95 op=LOAD Feb 9 10:29:16.839000 audit: BPF prog-id=67 op=UNLOAD Feb 9 10:29:16.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.839000 audit: BPF prog-id=96 op=LOAD Feb 9 10:29:16.839000 audit: BPF prog-id=55 op=UNLOAD Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit: BPF prog-id=97 op=LOAD Feb 9 10:29:16.840000 audit: BPF prog-id=79 op=UNLOAD Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit: BPF prog-id=98 op=LOAD Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.840000 audit: BPF prog-id=99 op=LOAD Feb 9 10:29:16.840000 audit: BPF prog-id=56 op=UNLOAD Feb 9 10:29:16.840000 audit: BPF prog-id=57 op=UNLOAD Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit: BPF prog-id=100 op=LOAD Feb 9 10:29:16.841000 audit: BPF prog-id=58 op=UNLOAD Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.841000 audit: BPF prog-id=101 op=LOAD Feb 9 10:29:16.841000 audit: BPF prog-id=59 op=UNLOAD Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit: BPF prog-id=102 op=LOAD Feb 9 10:29:16.842000 audit: BPF prog-id=83 op=UNLOAD Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit: BPF prog-id=103 op=LOAD Feb 9 10:29:16.843000 audit: BPF prog-id=60 op=UNLOAD Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit: BPF prog-id=104 op=LOAD Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.843000 audit: BPF prog-id=105 op=LOAD Feb 9 10:29:16.843000 audit: BPF prog-id=61 op=UNLOAD Feb 9 10:29:16.843000 audit: BPF prog-id=62 op=UNLOAD Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit: BPF prog-id=106 op=LOAD Feb 9 10:29:16.844000 audit: BPF prog-id=75 op=UNLOAD Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit: BPF prog-id=107 op=LOAD Feb 9 10:29:16.844000 audit: BPF prog-id=63 op=UNLOAD Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit: BPF prog-id=108 op=LOAD Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit: BPF prog-id=109 op=LOAD Feb 9 10:29:16.844000 audit: BPF prog-id=64 op=UNLOAD Feb 9 10:29:16.844000 audit: BPF prog-id=65 op=UNLOAD Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.844000 audit: BPF prog-id=110 op=LOAD Feb 9 10:29:16.844000 audit: BPF prog-id=71 op=UNLOAD Feb 9 10:29:16.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.845000 audit: BPF prog-id=111 op=LOAD Feb 9 10:29:16.845000 audit: BPF prog-id=66 op=UNLOAD Feb 9 10:29:16.852618 systemd[1]: Stopping kubelet.service... Feb 9 10:29:16.876055 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 10:29:16.876525 systemd[1]: Stopped kubelet.service. Feb 9 10:29:16.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:16.880404 systemd[1]: Started kubelet.service. Feb 9 10:29:16.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:16.903833 kubelet[2567]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:29:16.903833 kubelet[2567]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 10:29:16.903833 kubelet[2567]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:29:16.904130 kubelet[2567]: I0209 10:29:16.903854 2567 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:29:16.906981 kubelet[2567]: I0209 10:29:16.906941 2567 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 10:29:16.906981 kubelet[2567]: I0209 10:29:16.906957 2567 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:29:16.907170 kubelet[2567]: I0209 10:29:16.907140 2567 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 10:29:16.908307 kubelet[2567]: I0209 10:29:16.908301 2567 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 10:29:16.908904 kubelet[2567]: I0209 10:29:16.908892 2567 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:29:16.926551 kubelet[2567]: I0209 10:29:16.926534 2567 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:29:16.926653 kubelet[2567]: I0209 10:29:16.926646 2567 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:29:16.926749 kubelet[2567]: I0209 10:29:16.926743 2567 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 10:29:16.926829 kubelet[2567]: I0209 10:29:16.926756 2567 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 10:29:16.926829 kubelet[2567]: I0209 10:29:16.926762 2567 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 10:29:16.926829 kubelet[2567]: I0209 10:29:16.926779 2567 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:29:16.926829 kubelet[2567]: I0209 10:29:16.926827 2567 kubelet.go:393] "Attempting to sync node with API server" Feb 9 10:29:16.926899 kubelet[2567]: I0209 10:29:16.926836 2567 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:29:16.926899 kubelet[2567]: I0209 10:29:16.926849 2567 kubelet.go:309] "Adding apiserver pod source" Feb 9 10:29:16.926899 kubelet[2567]: I0209 10:29:16.926858 2567 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:29:16.927350 kubelet[2567]: I0209 10:29:16.927326 2567 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:29:16.927706 kubelet[2567]: I0209 10:29:16.927700 2567 server.go:1232] "Started kubelet" Feb 9 10:29:16.927756 kubelet[2567]: I0209 10:29:16.927747 2567 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:29:16.927816 kubelet[2567]: I0209 10:29:16.927805 2567 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 10:29:16.928055 kubelet[2567]: I0209 10:29:16.928041 2567 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 10:29:16.928219 kubelet[2567]: E0209 10:29:16.928206 2567 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:29:16.928257 kubelet[2567]: E0209 10:29:16.928226 2567 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:29:16.929246 kubelet[2567]: I0209 10:29:16.929239 2567 server.go:462] "Adding debug handlers to kubelet server" Feb 9 10:29:16.928000 audit[2567]: AVC avc: denied { mac_admin } for pid=2567 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.928000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:29:16.928000 audit[2567]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00080c900 a1=c00090c4e0 a2=c00080c8d0 a3=25 items=0 ppid=1 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:16.928000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:29:16.928000 audit[2567]: AVC avc: denied { mac_admin } for pid=2567 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.928000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:29:16.928000 audit[2567]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010421a0 a1=c00090c4f8 a2=c00080c990 a3=25 items=0 ppid=1 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:16.928000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:29:16.929568 kubelet[2567]: I0209 10:29:16.929296 2567 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:29:16.929568 kubelet[2567]: I0209 10:29:16.929325 2567 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:29:16.929568 kubelet[2567]: I0209 10:29:16.929351 2567 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:29:16.929568 kubelet[2567]: I0209 10:29:16.929378 2567 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 10:29:16.929568 kubelet[2567]: E0209 10:29:16.929415 2567 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-970bb49438\" not found" Feb 9 10:29:16.929568 kubelet[2567]: I0209 10:29:16.929439 2567 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 10:29:16.929568 kubelet[2567]: I0209 10:29:16.929530 2567 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 10:29:16.938081 kubelet[2567]: I0209 10:29:16.938065 2567 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 10:29:16.938611 kubelet[2567]: I0209 10:29:16.938600 2567 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 10:29:16.938659 kubelet[2567]: I0209 10:29:16.938622 2567 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 10:29:16.938659 kubelet[2567]: I0209 10:29:16.938638 2567 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 10:29:16.938712 kubelet[2567]: E0209 10:29:16.938674 2567 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 10:29:16.951894 kubelet[2567]: I0209 10:29:16.951877 2567 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:29:16.951894 kubelet[2567]: I0209 10:29:16.951891 2567 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:29:16.951894 kubelet[2567]: I0209 10:29:16.951901 2567 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:29:16.952018 kubelet[2567]: I0209 10:29:16.951994 2567 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 10:29:16.952018 kubelet[2567]: I0209 10:29:16.952007 2567 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 9 10:29:16.952018 kubelet[2567]: I0209 10:29:16.952011 2567 policy_none.go:49] "None policy: Start" Feb 9 10:29:16.952285 kubelet[2567]: I0209 10:29:16.952278 2567 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:29:16.952319 kubelet[2567]: I0209 10:29:16.952290 2567 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:29:16.952393 kubelet[2567]: I0209 10:29:16.952386 2567 state_mem.go:75] "Updated machine memory state" Feb 9 10:29:16.954214 kubelet[2567]: I0209 10:29:16.954208 2567 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:29:16.953000 audit[2567]: AVC avc: denied { mac_admin } for pid=2567 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:16.953000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:29:16.953000 audit[2567]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f70ed0 a1=c001261b78 a2=c000f70ea0 a3=25 items=0 ppid=1 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:16.953000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:29:16.954401 kubelet[2567]: I0209 10:29:16.954237 2567 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:29:16.954401 kubelet[2567]: I0209 10:29:16.954355 2567 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:29:17.031820 kubelet[2567]: I0209 10:29:17.031806 2567 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.036941 kubelet[2567]: I0209 10:29:17.036899 2567 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.036941 kubelet[2567]: I0209 10:29:17.036942 2567 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.039066 kubelet[2567]: I0209 10:29:17.039036 2567 topology_manager.go:215] "Topology Admit Handler" podUID="a7ed17659effe6e0a59a2321492cd123" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.039101 kubelet[2567]: I0209 10:29:17.039085 2567 topology_manager.go:215] "Topology Admit Handler" podUID="fe47a9791e60bb474701ecb70b65b760" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.039128 kubelet[2567]: I0209 10:29:17.039104 2567 topology_manager.go:215] "Topology Admit Handler" podUID="890f0eabb5dff2425eea08eb6e845f2b" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.042150 kubelet[2567]: W0209 10:29:17.042105 2567 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 10:29:17.043217 kubelet[2567]: W0209 10:29:17.043209 2567 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 10:29:17.043258 kubelet[2567]: E0209 10:29:17.043251 2567 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-970bb49438\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.043399 kubelet[2567]: W0209 10:29:17.043392 2567 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 10:29:17.043433 kubelet[2567]: E0209 10:29:17.043418 2567 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-970bb49438\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.231008 kubelet[2567]: I0209 10:29:17.230977 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a7ed17659effe6e0a59a2321492cd123-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-970bb49438\" (UID: \"a7ed17659effe6e0a59a2321492cd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.231149 kubelet[2567]: I0209 10:29:17.231030 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/890f0eabb5dff2425eea08eb6e845f2b-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-970bb49438\" (UID: \"890f0eabb5dff2425eea08eb6e845f2b\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.231149 kubelet[2567]: I0209 10:29:17.231063 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/890f0eabb5dff2425eea08eb6e845f2b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-970bb49438\" (UID: \"890f0eabb5dff2425eea08eb6e845f2b\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.231149 kubelet[2567]: I0209 10:29:17.231091 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a7ed17659effe6e0a59a2321492cd123-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-970bb49438\" (UID: \"a7ed17659effe6e0a59a2321492cd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.231149 kubelet[2567]: I0209 10:29:17.231127 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a7ed17659effe6e0a59a2321492cd123-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-970bb49438\" (UID: \"a7ed17659effe6e0a59a2321492cd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.231390 kubelet[2567]: I0209 10:29:17.231158 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a7ed17659effe6e0a59a2321492cd123-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-970bb49438\" (UID: \"a7ed17659effe6e0a59a2321492cd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.231390 kubelet[2567]: I0209 10:29:17.231196 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a7ed17659effe6e0a59a2321492cd123-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-970bb49438\" (UID: \"a7ed17659effe6e0a59a2321492cd123\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.231390 kubelet[2567]: I0209 10:29:17.231248 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fe47a9791e60bb474701ecb70b65b760-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-970bb49438\" (UID: \"fe47a9791e60bb474701ecb70b65b760\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.231390 kubelet[2567]: I0209 10:29:17.231287 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/890f0eabb5dff2425eea08eb6e845f2b-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-970bb49438\" (UID: \"890f0eabb5dff2425eea08eb6e845f2b\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.927979 kubelet[2567]: I0209 10:29:17.927895 2567 apiserver.go:52] "Watching apiserver" Feb 9 10:29:17.952150 kubelet[2567]: W0209 10:29:17.952065 2567 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 10:29:17.952412 kubelet[2567]: E0209 10:29:17.952203 2567 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-970bb49438\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-970bb49438" Feb 9 10:29:17.993292 kubelet[2567]: I0209 10:29:17.993271 2567 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-970bb49438" podStartSLOduration=2.993237281 podCreationTimestamp="2024-02-09 10:29:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:29:17.986466396 +0000 UTC m=+1.103379236" watchObservedRunningTime="2024-02-09 10:29:17.993237281 +0000 UTC m=+1.110150115" Feb 9 10:29:17.993426 kubelet[2567]: I0209 10:29:17.993365 2567 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-970bb49438" podStartSLOduration=1.993332685 podCreationTimestamp="2024-02-09 10:29:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:29:17.993299475 +0000 UTC m=+1.110212308" watchObservedRunningTime="2024-02-09 10:29:17.993332685 +0000 UTC m=+1.110245513" Feb 9 10:29:18.000129 kubelet[2567]: I0209 10:29:18.000091 2567 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-970bb49438" podStartSLOduration=1.000064709 podCreationTimestamp="2024-02-09 10:29:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:29:17.999927356 +0000 UTC m=+1.116840192" watchObservedRunningTime="2024-02-09 10:29:18.000064709 +0000 UTC m=+1.116977561" Feb 9 10:29:18.029789 kubelet[2567]: I0209 10:29:18.029717 2567 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 10:29:22.024719 sudo[1631]: pam_unix(sudo:session): session closed for user root Feb 9 10:29:22.024000 audit[1631]: USER_END pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:22.027745 sshd[1628]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:22.033646 systemd[1]: sshd@6-147.75.49.59:22-147.75.109.163:53530.service: Deactivated successfully. Feb 9 10:29:22.035459 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 10:29:22.035863 systemd[1]: session-9.scope: Consumed 3.098s CPU time. Feb 9 10:29:22.037261 systemd-logind[1465]: Session 9 logged out. Waiting for processes to exit. Feb 9 10:29:22.039504 systemd-logind[1465]: Removed session 9. Feb 9 10:29:22.066017 kernel: kauditd_printk_skb: 260 callbacks suppressed Feb 9 10:29:22.066096 kernel: audit: type=1106 audit(1707474562.024:950): pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:22.024000 audit[1631]: CRED_DISP pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:22.243974 kernel: audit: type=1104 audit(1707474562.024:951): pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:22.244011 kernel: audit: type=1106 audit(1707474562.029:952): pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:29:22.029000 audit[1628]: USER_END pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:29:22.030000 audit[1628]: CRED_DISP pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:29:22.430132 kernel: audit: type=1104 audit(1707474562.030:953): pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:29:22.430204 kernel: audit: type=1131 audit(1707474562.033:954): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.49.59:22-147.75.109.163:53530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:22.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.49.59:22-147.75.109.163:53530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:25.987743 update_engine[1467]: I0209 10:29:25.987617 1467 update_attempter.cc:509] Updating boot flags... Feb 9 10:29:28.796000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=524902 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 10:29:28.796000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000641780 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:29:28.890345 kernel: audit: type=1400 audit(1707474568.796:955): avc: denied { watch } for pid=2410 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=524902 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 10:29:28.890374 kernel: audit: type=1300 audit(1707474568.796:955): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000641780 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:29:28.796000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:29.082095 kubelet[2567]: I0209 10:29:29.082018 2567 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 10:29:29.082348 kubelet[2567]: I0209 10:29:29.082324 2567 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 10:29:29.082378 env[1477]: time="2024-02-09T10:29:29.082228311Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 10:29:29.104825 kernel: audit: type=1327 audit(1707474568.796:955): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:29:29.856645 kubelet[2567]: I0209 10:29:29.856580 2567 topology_manager.go:215] "Topology Admit Handler" podUID="941088e9-703c-438a-a4ea-aa88732d5f34" podNamespace="kube-system" podName="kube-proxy-dkffk" Feb 9 10:29:29.874815 systemd[1]: Created slice kubepods-besteffort-pod941088e9_703c_438a_a4ea_aa88732d5f34.slice. Feb 9 10:29:29.909576 kubelet[2567]: I0209 10:29:29.909473 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/941088e9-703c-438a-a4ea-aa88732d5f34-kube-proxy\") pod \"kube-proxy-dkffk\" (UID: \"941088e9-703c-438a-a4ea-aa88732d5f34\") " pod="kube-system/kube-proxy-dkffk" Feb 9 10:29:29.909852 kubelet[2567]: I0209 10:29:29.909609 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/941088e9-703c-438a-a4ea-aa88732d5f34-xtables-lock\") pod \"kube-proxy-dkffk\" (UID: \"941088e9-703c-438a-a4ea-aa88732d5f34\") " pod="kube-system/kube-proxy-dkffk" Feb 9 10:29:29.909852 kubelet[2567]: I0209 10:29:29.909715 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9mzhn\" (UniqueName: \"kubernetes.io/projected/941088e9-703c-438a-a4ea-aa88732d5f34-kube-api-access-9mzhn\") pod \"kube-proxy-dkffk\" (UID: \"941088e9-703c-438a-a4ea-aa88732d5f34\") " pod="kube-system/kube-proxy-dkffk" Feb 9 10:29:29.909852 kubelet[2567]: I0209 10:29:29.909826 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/941088e9-703c-438a-a4ea-aa88732d5f34-lib-modules\") pod \"kube-proxy-dkffk\" (UID: \"941088e9-703c-438a-a4ea-aa88732d5f34\") " pod="kube-system/kube-proxy-dkffk" Feb 9 10:29:30.086414 kubelet[2567]: I0209 10:29:30.086385 2567 topology_manager.go:215] "Topology Admit Handler" podUID="1d94d718-cac7-430b-b8f4-541f16feb19a" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-wpldc" Feb 9 10:29:30.091939 systemd[1]: Created slice kubepods-besteffort-pod1d94d718_cac7_430b_b8f4_541f16feb19a.slice. Feb 9 10:29:30.112453 kubelet[2567]: I0209 10:29:30.112248 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1d94d718-cac7-430b-b8f4-541f16feb19a-var-lib-calico\") pod \"tigera-operator-55585899bf-wpldc\" (UID: \"1d94d718-cac7-430b-b8f4-541f16feb19a\") " pod="tigera-operator/tigera-operator-55585899bf-wpldc" Feb 9 10:29:30.112453 kubelet[2567]: I0209 10:29:30.112380 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wrvjm\" (UniqueName: \"kubernetes.io/projected/1d94d718-cac7-430b-b8f4-541f16feb19a-kube-api-access-wrvjm\") pod \"tigera-operator-55585899bf-wpldc\" (UID: \"1d94d718-cac7-430b-b8f4-541f16feb19a\") " pod="tigera-operator/tigera-operator-55585899bf-wpldc" Feb 9 10:29:30.206300 env[1477]: time="2024-02-09T10:29:30.206158861Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dkffk,Uid:941088e9-703c-438a-a4ea-aa88732d5f34,Namespace:kube-system,Attempt:0,}" Feb 9 10:29:30.230369 env[1477]: time="2024-02-09T10:29:30.230135399Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:29:30.230369 env[1477]: time="2024-02-09T10:29:30.230267804Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:29:30.230369 env[1477]: time="2024-02-09T10:29:30.230310897Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:29:30.230909 env[1477]: time="2024-02-09T10:29:30.230779148Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc2c3ddbab03af629f7bbe70cc2fecf082a5504b0e97cfc8f060ea5c173d79f0 pid=2750 runtime=io.containerd.runc.v2 Feb 9 10:29:30.270013 systemd[1]: Started cri-containerd-bc2c3ddbab03af629f7bbe70cc2fecf082a5504b0e97cfc8f060ea5c173d79f0.scope. Feb 9 10:29:30.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.394204 env[1477]: time="2024-02-09T10:29:30.394166125Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-wpldc,Uid:1d94d718-cac7-430b-b8f4-541f16feb19a,Namespace:tigera-operator,Attempt:0,}" Feb 9 10:29:30.401266 env[1477]: time="2024-02-09T10:29:30.401242106Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:29:30.401266 env[1477]: time="2024-02-09T10:29:30.401262721Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:29:30.401346 env[1477]: time="2024-02-09T10:29:30.401272664Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:29:30.401375 env[1477]: time="2024-02-09T10:29:30.401334772Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/06ca025b14558ae5ae3d3c49ce7a0362befd802b296263728abf5eca61bbdcdf pid=2784 runtime=io.containerd.runc.v2 Feb 9 10:29:30.416241 kernel: audit: type=1400 audit(1707474570.284:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.416280 kernel: audit: type=1400 audit(1707474570.284:957): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.416299 kernel: audit: type=1400 audit(1707474570.284:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.483533 systemd[1]: Started cri-containerd-06ca025b14558ae5ae3d3c49ce7a0362befd802b296263728abf5eca61bbdcdf.scope. Feb 9 10:29:30.544640 kernel: audit: type=1400 audit(1707474570.284:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.544672 kernel: audit: type=1400 audit(1707474570.284:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.609055 kernel: audit: type=1400 audit(1707474570.284:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673405 kernel: audit: type=1400 audit(1707474570.284:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.479000 audit: BPF prog-id=112 op=LOAD Feb 9 10:29:30.480000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.480000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2750 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263326333646462616230336166363239663762626537306363326665 Feb 9 10:29:30.480000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.480000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2750 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263326333646462616230336166363239663762626537306363326665 Feb 9 10:29:30.480000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.480000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.480000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.480000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.480000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.480000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.480000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.480000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.480000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.480000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.480000 audit: BPF prog-id=113 op=LOAD Feb 9 10:29:30.480000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002848e0 items=0 ppid=2750 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263326333646462616230336166363239663762626537306363326665 Feb 9 10:29:30.608000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.608000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.608000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.608000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.608000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.608000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.608000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.608000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit: BPF prog-id=114 op=LOAD Feb 9 10:29:30.673000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2784 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036636130323562313435353861653561653364336334396365376130 Feb 9 10:29:30.673000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2784 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036636130323562313435353861653561653364336334396365376130 Feb 9 10:29:30.673000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.608000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.608000 audit: BPF prog-id=115 op=LOAD Feb 9 10:29:30.608000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000284928 items=0 ppid=2750 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263326333646462616230336166363239663762626537306363326665 Feb 9 10:29:30.737000 audit: BPF prog-id=115 op=UNLOAD Feb 9 10:29:30.737000 audit: BPF prog-id=113 op=UNLOAD Feb 9 10:29:30.737000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2761]: AVC avc: denied { perfmon } for pid=2761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.673000 audit: BPF prog-id=116 op=LOAD Feb 9 10:29:30.673000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003e4600 items=0 ppid=2784 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036636130323562313435353861653561653364336334396365376130 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit: BPF prog-id=117 op=LOAD Feb 9 10:29:30.737000 audit[2761]: AVC avc: denied { bpf } for pid=2761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit: BPF prog-id=118 op=LOAD Feb 9 10:29:30.737000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003e4648 items=0 ppid=2784 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036636130323562313435353861653561653364336334396365376130 Feb 9 10:29:30.737000 audit[2761]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000284d38 items=0 ppid=2750 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263326333646462616230336166363239663762626537306363326665 Feb 9 10:29:30.737000 audit: BPF prog-id=117 op=UNLOAD Feb 9 10:29:30.737000 audit: BPF prog-id=116 op=UNLOAD Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.737000 audit: BPF prog-id=119 op=LOAD Feb 9 10:29:30.737000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003e4a58 items=0 ppid=2784 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036636130323562313435353861653561653364336334396365376130 Feb 9 10:29:30.755166 env[1477]: time="2024-02-09T10:29:30.755142612Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dkffk,Uid:941088e9-703c-438a-a4ea-aa88732d5f34,Namespace:kube-system,Attempt:0,} returns sandbox id \"bc2c3ddbab03af629f7bbe70cc2fecf082a5504b0e97cfc8f060ea5c173d79f0\"" Feb 9 10:29:30.756271 env[1477]: time="2024-02-09T10:29:30.756255691Z" level=info msg="CreateContainer within sandbox \"bc2c3ddbab03af629f7bbe70cc2fecf082a5504b0e97cfc8f060ea5c173d79f0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 10:29:30.761830 env[1477]: time="2024-02-09T10:29:30.761813090Z" level=info msg="CreateContainer within sandbox \"bc2c3ddbab03af629f7bbe70cc2fecf082a5504b0e97cfc8f060ea5c173d79f0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"81d45b1feb5cbe07e3b964cd2b8162686b3acc37eb7de4958249fe913d125441\"" Feb 9 10:29:30.762079 env[1477]: time="2024-02-09T10:29:30.762062705Z" level=info msg="StartContainer for \"81d45b1feb5cbe07e3b964cd2b8162686b3acc37eb7de4958249fe913d125441\"" Feb 9 10:29:30.766699 env[1477]: time="2024-02-09T10:29:30.766639659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-wpldc,Uid:1d94d718-cac7-430b-b8f4-541f16feb19a,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"06ca025b14558ae5ae3d3c49ce7a0362befd802b296263728abf5eca61bbdcdf\"" Feb 9 10:29:30.767398 env[1477]: time="2024-02-09T10:29:30.767384264Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 10:29:30.782302 systemd[1]: Started cri-containerd-81d45b1feb5cbe07e3b964cd2b8162686b3acc37eb7de4958249fe913d125441.scope. Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2750 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643435623166656235636265303765336239363463643262383136 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit: BPF prog-id=120 op=LOAD Feb 9 10:29:30.789000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003aa310 items=0 ppid=2750 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643435623166656235636265303765336239363463643262383136 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit: BPF prog-id=121 op=LOAD Feb 9 10:29:30.789000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003aa358 items=0 ppid=2750 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643435623166656235636265303765336239363463643262383136 Feb 9 10:29:30.789000 audit: BPF prog-id=121 op=UNLOAD Feb 9 10:29:30.789000 audit: BPF prog-id=120 op=UNLOAD Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { perfmon } for pid=2830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit[2830]: AVC avc: denied { bpf } for pid=2830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.789000 audit: BPF prog-id=122 op=LOAD Feb 9 10:29:30.789000 audit[2830]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003aa3e8 items=0 ppid=2750 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831643435623166656235636265303765336239363463643262383136 Feb 9 10:29:30.796518 env[1477]: time="2024-02-09T10:29:30.796493007Z" level=info msg="StartContainer for \"81d45b1feb5cbe07e3b964cd2b8162686b3acc37eb7de4958249fe913d125441\" returns successfully" Feb 9 10:29:30.827000 audit[2892]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.827000 audit[2892]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc0005620 a2=0 a3=7ffcc000560c items=0 ppid=2840 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.827000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 10:29:30.827000 audit[2893]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:30.827000 audit[2893]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc24357470 a2=0 a3=7ffc2435745c items=0 ppid=2840 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 10:29:30.827000 audit[2894]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.827000 audit[2894]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe96c80540 a2=0 a3=7ffe96c8052c items=0 ppid=2840 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.827000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 10:29:30.827000 audit[2895]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:30.827000 audit[2895]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8df9bf50 a2=0 a3=7ffd8df9bf3c items=0 ppid=2840 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 10:29:30.828000 audit[2896]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.828000 audit[2896]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffecdd4ed10 a2=0 a3=7ffecdd4ecfc items=0 ppid=2840 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.828000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 10:29:30.828000 audit[2897]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2897 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:30.828000 audit[2897]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd183e4a80 a2=0 a3=7ffd183e4a6c items=0 ppid=2840 pid=2897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.828000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 10:29:30.930000 audit[2898]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.930000 audit[2898]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc30ba6300 a2=0 a3=7ffc30ba62ec items=0 ppid=2840 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.930000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 10:29:30.938000 audit[2900]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.938000 audit[2900]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff7a2d91b0 a2=0 a3=7fff7a2d919c items=0 ppid=2840 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.938000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 10:29:30.948000 audit[2903]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.948000 audit[2903]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeeee4b450 a2=0 a3=7ffeeee4b43c items=0 ppid=2840 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.948000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 10:29:30.951000 audit[2904]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.951000 audit[2904]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd93fccfa0 a2=0 a3=7ffd93fccf8c items=0 ppid=2840 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.951000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 10:29:30.958000 audit[2906]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.958000 audit[2906]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef95f5340 a2=0 a3=7ffef95f532c items=0 ppid=2840 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 10:29:30.961000 audit[2907]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.961000 audit[2907]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd45eb3d80 a2=0 a3=7ffd45eb3d6c items=0 ppid=2840 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.961000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 10:29:30.968000 audit[2909]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.968000 audit[2909]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdf6269190 a2=0 a3=7ffdf626917c items=0 ppid=2840 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 10:29:30.979000 audit[2912]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.979000 audit[2912]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd60a65f30 a2=0 a3=7ffd60a65f1c items=0 ppid=2840 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 10:29:30.982000 audit[2913]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.982000 audit[2913]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc32225140 a2=0 a3=7ffc3222512c items=0 ppid=2840 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 10:29:30.989000 audit[2915]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.989000 audit[2915]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff86f6b560 a2=0 a3=7fff86f6b54c items=0 ppid=2840 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 10:29:30.992000 audit[2916]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:30.992000 audit[2916]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb7772910 a2=0 a3=7ffcb77728fc items=0 ppid=2840 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 10:29:30.995314 kubelet[2567]: I0209 10:29:30.995244 2567 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-dkffk" podStartSLOduration=1.995135222 podCreationTimestamp="2024-02-09 10:29:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:29:30.994772791 +0000 UTC m=+14.111685698" watchObservedRunningTime="2024-02-09 10:29:30.995135222 +0000 UTC m=+14.112048090" Feb 9 10:29:31.000000 audit[2919]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.000000 audit[2919]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff56609640 a2=0 a3=7fff5660962c items=0 ppid=2840 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:29:31.010000 audit[2922]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.010000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc80c60da0 a2=0 a3=7ffc80c60d8c items=0 ppid=2840 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:29:31.021000 audit[2925]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.021000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe87d48520 a2=0 a3=7ffe87d4850c items=0 ppid=2840 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 10:29:31.024000 audit[2926]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.024000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdddf931d0 a2=0 a3=7ffdddf931bc items=0 ppid=2840 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 10:29:31.030000 audit[2928]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.030000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffc0fe4860 a2=0 a3=7fffc0fe484c items=0 ppid=2840 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:29:31.040000 audit[2931]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.040000 audit[2931]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc214df1e0 a2=0 a3=7ffc214df1cc items=0 ppid=2840 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:29:31.043000 audit[2932]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.043000 audit[2932]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc23832f0 a2=0 a3=7ffcc23832dc items=0 ppid=2840 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.043000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:29:31.049000 audit[2934]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.049000 audit[2934]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffd8bcb9b0 a2=0 a3=7fffd8bcb99c items=0 ppid=2840 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:29:31.093000 audit[2940]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:31.093000 audit[2940]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffeb8a3a660 a2=0 a3=7ffeb8a3a64c items=0 ppid=2840 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:31.105000 audit[2940]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:31.105000 audit[2940]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffeb8a3a660 a2=0 a3=7ffeb8a3a64c items=0 ppid=2840 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.105000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:31.108000 audit[2946]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2946 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.108000 audit[2946]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe10ccce10 a2=0 a3=7ffe10cccdfc items=0 ppid=2840 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 10:29:31.112000 audit[2948]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2948 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.112000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc7f403170 a2=0 a3=7ffc7f40315c items=0 ppid=2840 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.112000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 10:29:31.120000 audit[2951]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.120000 audit[2951]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff0b144af0 a2=0 a3=7fff0b144adc items=0 ppid=2840 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 10:29:31.122000 audit[2952]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.122000 audit[2952]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd4b46010 a2=0 a3=7ffdd4b45ffc items=0 ppid=2840 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.122000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 10:29:31.127000 audit[2954]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.127000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea96c2b00 a2=0 a3=7ffea96c2aec items=0 ppid=2840 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 10:29:31.128000 audit[2955]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2955 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.128000 audit[2955]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc43db2aa0 a2=0 a3=7ffc43db2a8c items=0 ppid=2840 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 10:29:31.133000 audit[2957]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.133000 audit[2957]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc8d188700 a2=0 a3=7ffc8d1886ec items=0 ppid=2840 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 10:29:31.140000 audit[2960]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.140000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffffaafb540 a2=0 a3=7ffffaafb52c items=0 ppid=2840 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 10:29:31.142000 audit[2961]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2961 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.142000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe25c7eb20 a2=0 a3=7ffe25c7eb0c items=0 ppid=2840 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 10:29:31.147000 audit[2963]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.147000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1308f010 a2=0 a3=7ffc1308effc items=0 ppid=2840 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.147000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 10:29:31.149000 audit[2964]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2964 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.149000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce8d2eff0 a2=0 a3=7ffce8d2efdc items=0 ppid=2840 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.149000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 10:29:31.154000 audit[2966]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.154000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb050e590 a2=0 a3=7ffeb050e57c items=0 ppid=2840 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.154000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:29:31.161000 audit[2969]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.161000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff14d97ea0 a2=0 a3=7fff14d97e8c items=0 ppid=2840 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.161000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 10:29:31.168000 audit[2972]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.168000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc69be8e30 a2=0 a3=7ffc69be8e1c items=0 ppid=2840 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.168000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 10:29:31.170000 audit[2973]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.170000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf57bf460 a2=0 a3=7ffdf57bf44c items=0 ppid=2840 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 10:29:31.174000 audit[2975]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.174000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffa26cc1b0 a2=0 a3=7fffa26cc19c items=0 ppid=2840 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:29:31.181000 audit[2978]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2978 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.181000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd0bc9ed80 a2=0 a3=7ffd0bc9ed6c items=0 ppid=2840 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:29:31.183000 audit[2979]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2979 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.183000 audit[2979]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc831ce70 a2=0 a3=7ffdc831ce5c items=0 ppid=2840 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:29:31.187000 audit[2981]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.187000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc3e56f7d0 a2=0 a3=7ffc3e56f7bc items=0 ppid=2840 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.187000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:29:31.189000 audit[2982]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2982 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.189000 audit[2982]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffece0c1c10 a2=0 a3=7ffece0c1bfc items=0 ppid=2840 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:29:31.194000 audit[2984]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.194000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe91522980 a2=0 a3=7ffe9152296c items=0 ppid=2840 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:29:31.200000 audit[2987]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2987 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.200000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff95915900 a2=0 a3=7fff959158ec items=0 ppid=2840 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:29:31.206000 audit[2989]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2989 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 10:29:31.206000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc882dced0 a2=0 a3=7ffc882dcebc items=0 ppid=2840 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.206000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:31.207000 audit[2989]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2989 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 10:29:31.207000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc882dced0 a2=0 a3=7ffc882dcebc items=0 ppid=2840 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.207000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:31.931012 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3524643121.mount: Deactivated successfully. Feb 9 10:29:32.755021 env[1477]: time="2024-02-09T10:29:32.755000076Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:32.755726 env[1477]: time="2024-02-09T10:29:32.755714806Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:32.756586 env[1477]: time="2024-02-09T10:29:32.756540991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:32.757768 env[1477]: time="2024-02-09T10:29:32.757709934Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:32.758015 env[1477]: time="2024-02-09T10:29:32.757955518Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 10:29:32.759058 env[1477]: time="2024-02-09T10:29:32.759018536Z" level=info msg="CreateContainer within sandbox \"06ca025b14558ae5ae3d3c49ce7a0362befd802b296263728abf5eca61bbdcdf\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 10:29:32.763620 env[1477]: time="2024-02-09T10:29:32.763584538Z" level=info msg="CreateContainer within sandbox \"06ca025b14558ae5ae3d3c49ce7a0362befd802b296263728abf5eca61bbdcdf\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"d6288bdd81453efbf897a4a97da6b07cccaa9067cee5e3f2b461e5655a712678\"" Feb 9 10:29:32.763927 env[1477]: time="2024-02-09T10:29:32.763872896Z" level=info msg="StartContainer for \"d6288bdd81453efbf897a4a97da6b07cccaa9067cee5e3f2b461e5655a712678\"" Feb 9 10:29:32.786059 systemd[1]: Started cri-containerd-d6288bdd81453efbf897a4a97da6b07cccaa9067cee5e3f2b461e5655a712678.scope. Feb 9 10:29:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit: BPF prog-id=123 op=LOAD Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2784 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:32.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323838626464383134353365666266383937613461393764613662 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2784 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:32.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323838626464383134353365666266383937613461393764613662 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit: BPF prog-id=124 op=LOAD Feb 9 10:29:32.790000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001df090 items=0 ppid=2784 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:32.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323838626464383134353365666266383937613461393764613662 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.790000 audit: BPF prog-id=125 op=LOAD Feb 9 10:29:32.790000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001df0d8 items=0 ppid=2784 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:32.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323838626464383134353365666266383937613461393764613662 Feb 9 10:29:32.791000 audit: BPF prog-id=125 op=UNLOAD Feb 9 10:29:32.791000 audit: BPF prog-id=124 op=UNLOAD Feb 9 10:29:32.791000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.791000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.791000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.791000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.791000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.791000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.791000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.791000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.791000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.791000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.791000 audit: BPF prog-id=126 op=LOAD Feb 9 10:29:32.791000 audit[2997]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001df4e8 items=0 ppid=2784 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:32.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323838626464383134353365666266383937613461393764613662 Feb 9 10:29:32.797220 env[1477]: time="2024-02-09T10:29:32.797168810Z" level=info msg="StartContainer for \"d6288bdd81453efbf897a4a97da6b07cccaa9067cee5e3f2b461e5655a712678\" returns successfully" Feb 9 10:29:33.004720 kubelet[2567]: I0209 10:29:33.004623 2567 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-wpldc" podStartSLOduration=1.013557414 podCreationTimestamp="2024-02-09 10:29:30 +0000 UTC" firstStartedPulling="2024-02-09 10:29:30.76715916 +0000 UTC m=+13.884071979" lastFinishedPulling="2024-02-09 10:29:32.758130293 +0000 UTC m=+15.875043111" observedRunningTime="2024-02-09 10:29:33.003935261 +0000 UTC m=+16.120848151" watchObservedRunningTime="2024-02-09 10:29:33.004528546 +0000 UTC m=+16.121441428" Feb 9 10:29:34.531000 audit[3042]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:34.558407 kernel: kauditd_printk_skb: 360 callbacks suppressed Feb 9 10:29:34.558463 kernel: audit: type=1325 audit(1707474574.531:1067): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:34.531000 audit[3042]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe001a6f90 a2=0 a3=7ffe001a6f7c items=0 ppid=2840 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:34.644699 kubelet[2567]: I0209 10:29:34.644678 2567 topology_manager.go:215] "Topology Admit Handler" podUID="f52dd857-4b92-437b-bb53-c0cd0303697a" podNamespace="calico-system" podName="calico-typha-66cb95bd5f-dbflp" Feb 9 10:29:34.647855 systemd[1]: Created slice kubepods-besteffort-podf52dd857_4b92_437b_bb53_c0cd0303697a.slice. Feb 9 10:29:34.715981 kernel: audit: type=1300 audit(1707474574.531:1067): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe001a6f90 a2=0 a3=7ffe001a6f7c items=0 ppid=2840 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:34.716044 kernel: audit: type=1327 audit(1707474574.531:1067): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:34.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:34.744335 kubelet[2567]: I0209 10:29:34.744292 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g6lnh\" (UniqueName: \"kubernetes.io/projected/f52dd857-4b92-437b-bb53-c0cd0303697a-kube-api-access-g6lnh\") pod \"calico-typha-66cb95bd5f-dbflp\" (UID: \"f52dd857-4b92-437b-bb53-c0cd0303697a\") " pod="calico-system/calico-typha-66cb95bd5f-dbflp" Feb 9 10:29:34.744335 kubelet[2567]: I0209 10:29:34.744316 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f52dd857-4b92-437b-bb53-c0cd0303697a-tigera-ca-bundle\") pod \"calico-typha-66cb95bd5f-dbflp\" (UID: \"f52dd857-4b92-437b-bb53-c0cd0303697a\") " pod="calico-system/calico-typha-66cb95bd5f-dbflp" Feb 9 10:29:34.744434 kubelet[2567]: I0209 10:29:34.744354 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f52dd857-4b92-437b-bb53-c0cd0303697a-typha-certs\") pod \"calico-typha-66cb95bd5f-dbflp\" (UID: \"f52dd857-4b92-437b-bb53-c0cd0303697a\") " pod="calico-system/calico-typha-66cb95bd5f-dbflp" Feb 9 10:29:34.531000 audit[3042]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:34.788242 kubelet[2567]: I0209 10:29:34.788189 2567 topology_manager.go:215] "Topology Admit Handler" podUID="9dc548b2-0a3d-4f55-aa82-19807629573b" podNamespace="calico-system" podName="calico-node-nrqdd" Feb 9 10:29:34.791010 systemd[1]: Created slice kubepods-besteffort-pod9dc548b2_0a3d_4f55_aa82_19807629573b.slice. Feb 9 10:29:34.531000 audit[3042]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe001a6f90 a2=0 a3=31030 items=0 ppid=2840 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:34.845201 kubelet[2567]: I0209 10:29:34.845162 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9dc548b2-0a3d-4f55-aa82-19807629573b-var-lib-calico\") pod \"calico-node-nrqdd\" (UID: \"9dc548b2-0a3d-4f55-aa82-19807629573b\") " pod="calico-system/calico-node-nrqdd" Feb 9 10:29:34.845201 kubelet[2567]: I0209 10:29:34.845183 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9dc548b2-0a3d-4f55-aa82-19807629573b-node-certs\") pod \"calico-node-nrqdd\" (UID: \"9dc548b2-0a3d-4f55-aa82-19807629573b\") " pod="calico-system/calico-node-nrqdd" Feb 9 10:29:34.845278 kubelet[2567]: I0209 10:29:34.845209 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9dc548b2-0a3d-4f55-aa82-19807629573b-cni-net-dir\") pod \"calico-node-nrqdd\" (UID: \"9dc548b2-0a3d-4f55-aa82-19807629573b\") " pod="calico-system/calico-node-nrqdd" Feb 9 10:29:34.845319 kubelet[2567]: I0209 10:29:34.845310 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9dc548b2-0a3d-4f55-aa82-19807629573b-xtables-lock\") pod \"calico-node-nrqdd\" (UID: \"9dc548b2-0a3d-4f55-aa82-19807629573b\") " pod="calico-system/calico-node-nrqdd" Feb 9 10:29:34.845399 kubelet[2567]: I0209 10:29:34.845352 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9dc548b2-0a3d-4f55-aa82-19807629573b-var-run-calico\") pod \"calico-node-nrqdd\" (UID: \"9dc548b2-0a3d-4f55-aa82-19807629573b\") " pod="calico-system/calico-node-nrqdd" Feb 9 10:29:34.845399 kubelet[2567]: I0209 10:29:34.845389 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9dc548b2-0a3d-4f55-aa82-19807629573b-policysync\") pod \"calico-node-nrqdd\" (UID: \"9dc548b2-0a3d-4f55-aa82-19807629573b\") " pod="calico-system/calico-node-nrqdd" Feb 9 10:29:34.845456 kubelet[2567]: I0209 10:29:34.845415 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9dc548b2-0a3d-4f55-aa82-19807629573b-cni-bin-dir\") pod \"calico-node-nrqdd\" (UID: \"9dc548b2-0a3d-4f55-aa82-19807629573b\") " pod="calico-system/calico-node-nrqdd" Feb 9 10:29:34.845456 kubelet[2567]: I0209 10:29:34.845450 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9dc548b2-0a3d-4f55-aa82-19807629573b-tigera-ca-bundle\") pod \"calico-node-nrqdd\" (UID: \"9dc548b2-0a3d-4f55-aa82-19807629573b\") " pod="calico-system/calico-node-nrqdd" Feb 9 10:29:34.845496 kubelet[2567]: I0209 10:29:34.845470 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9dc548b2-0a3d-4f55-aa82-19807629573b-cni-log-dir\") pod \"calico-node-nrqdd\" (UID: \"9dc548b2-0a3d-4f55-aa82-19807629573b\") " pod="calico-system/calico-node-nrqdd" Feb 9 10:29:34.845496 kubelet[2567]: I0209 10:29:34.845487 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9dc548b2-0a3d-4f55-aa82-19807629573b-flexvol-driver-host\") pod \"calico-node-nrqdd\" (UID: \"9dc548b2-0a3d-4f55-aa82-19807629573b\") " pod="calico-system/calico-node-nrqdd" Feb 9 10:29:34.845535 kubelet[2567]: I0209 10:29:34.845506 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c694h\" (UniqueName: \"kubernetes.io/projected/9dc548b2-0a3d-4f55-aa82-19807629573b-kube-api-access-c694h\") pod \"calico-node-nrqdd\" (UID: \"9dc548b2-0a3d-4f55-aa82-19807629573b\") " pod="calico-system/calico-node-nrqdd" Feb 9 10:29:34.845555 kubelet[2567]: I0209 10:29:34.845540 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9dc548b2-0a3d-4f55-aa82-19807629573b-lib-modules\") pod \"calico-node-nrqdd\" (UID: \"9dc548b2-0a3d-4f55-aa82-19807629573b\") " pod="calico-system/calico-node-nrqdd" Feb 9 10:29:34.936921 kernel: audit: type=1325 audit(1707474574.531:1068): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:34.936970 kernel: audit: type=1300 audit(1707474574.531:1068): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe001a6f90 a2=0 a3=31030 items=0 ppid=2840 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:34.936990 kernel: audit: type=1327 audit(1707474574.531:1068): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:34.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:34.946590 kubelet[2567]: E0209 10:29:34.946572 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:34.946590 kubelet[2567]: W0209 10:29:34.946586 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:34.946590 kubelet[2567]: E0209 10:29:34.946598 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:34.947775 kubelet[2567]: E0209 10:29:34.947762 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:34.947775 kubelet[2567]: W0209 10:29:34.947776 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:34.947849 kubelet[2567]: E0209 10:29:34.947787 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:34.950166 env[1477]: time="2024-02-09T10:29:34.950141632Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-66cb95bd5f-dbflp,Uid:f52dd857-4b92-437b-bb53-c0cd0303697a,Namespace:calico-system,Attempt:0,}" Feb 9 10:29:34.952785 kubelet[2567]: I0209 10:29:34.952769 2567 topology_manager.go:215] "Topology Admit Handler" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" podNamespace="calico-system" podName="csi-node-driver-tcmq8" Feb 9 10:29:34.952936 kubelet[2567]: E0209 10:29:34.952928 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:29:34.955626 kubelet[2567]: E0209 10:29:34.955614 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:34.955626 kubelet[2567]: W0209 10:29:34.955623 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:34.955712 kubelet[2567]: E0209 10:29:34.955635 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:34.959326 env[1477]: time="2024-02-09T10:29:34.959287656Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:29:34.959326 env[1477]: time="2024-02-09T10:29:34.959312718Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:29:34.959326 env[1477]: time="2024-02-09T10:29:34.959322789Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:29:34.959486 env[1477]: time="2024-02-09T10:29:34.959424037Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ecde64c1dbdd6fa6745ebe85a7586a14dc98a9ed70d83e0c3392f041ddc8258 pid=3059 runtime=io.containerd.runc.v2 Feb 9 10:29:34.781000 audit[3044]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:35.010463 systemd[1]: Started cri-containerd-2ecde64c1dbdd6fa6745ebe85a7586a14dc98a9ed70d83e0c3392f041ddc8258.scope. Feb 9 10:29:35.039789 kubelet[2567]: E0209 10:29:35.039710 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.039789 kubelet[2567]: W0209 10:29:35.039721 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.039789 kubelet[2567]: E0209 10:29:35.039735 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.039990 kubelet[2567]: E0209 10:29:35.039891 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.039990 kubelet[2567]: W0209 10:29:35.039897 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.039990 kubelet[2567]: E0209 10:29:35.039905 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.040111 kubelet[2567]: E0209 10:29:35.040024 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.040111 kubelet[2567]: W0209 10:29:35.040030 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.040111 kubelet[2567]: E0209 10:29:35.040037 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.040245 kubelet[2567]: E0209 10:29:35.040145 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.040245 kubelet[2567]: W0209 10:29:35.040150 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.040245 kubelet[2567]: E0209 10:29:35.040156 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.040245 kubelet[2567]: E0209 10:29:35.040225 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.040245 kubelet[2567]: W0209 10:29:35.040229 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.040245 kubelet[2567]: E0209 10:29:35.040235 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.040486 kubelet[2567]: E0209 10:29:35.040301 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.040486 kubelet[2567]: W0209 10:29:35.040305 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.040486 kubelet[2567]: E0209 10:29:35.040311 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.040486 kubelet[2567]: E0209 10:29:35.040377 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.040486 kubelet[2567]: W0209 10:29:35.040381 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.040486 kubelet[2567]: E0209 10:29:35.040386 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.040486 kubelet[2567]: E0209 10:29:35.040442 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.040486 kubelet[2567]: W0209 10:29:35.040446 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.040486 kubelet[2567]: E0209 10:29:35.040451 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.040836 kubelet[2567]: E0209 10:29:35.040509 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.040836 kubelet[2567]: W0209 10:29:35.040513 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.040836 kubelet[2567]: E0209 10:29:35.040518 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.040836 kubelet[2567]: E0209 10:29:35.040580 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.040836 kubelet[2567]: W0209 10:29:35.040584 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.040836 kubelet[2567]: E0209 10:29:35.040589 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.040836 kubelet[2567]: E0209 10:29:35.040644 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.040836 kubelet[2567]: W0209 10:29:35.040647 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.040836 kubelet[2567]: E0209 10:29:35.040652 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.040836 kubelet[2567]: E0209 10:29:35.040707 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.041203 kubelet[2567]: W0209 10:29:35.040711 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.041203 kubelet[2567]: E0209 10:29:35.040717 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.041203 kubelet[2567]: E0209 10:29:35.040774 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.041203 kubelet[2567]: W0209 10:29:35.040778 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.041203 kubelet[2567]: E0209 10:29:35.040783 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.041203 kubelet[2567]: E0209 10:29:35.040877 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.041203 kubelet[2567]: W0209 10:29:35.040881 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.041203 kubelet[2567]: E0209 10:29:35.040886 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.041203 kubelet[2567]: E0209 10:29:35.040943 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.041203 kubelet[2567]: W0209 10:29:35.040947 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.041592 kubelet[2567]: E0209 10:29:35.040952 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.041592 kubelet[2567]: E0209 10:29:35.041007 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.041592 kubelet[2567]: W0209 10:29:35.041010 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.041592 kubelet[2567]: E0209 10:29:35.041015 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.041592 kubelet[2567]: E0209 10:29:35.041073 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.041592 kubelet[2567]: W0209 10:29:35.041077 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.041592 kubelet[2567]: E0209 10:29:35.041082 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.041592 kubelet[2567]: E0209 10:29:35.041135 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.041592 kubelet[2567]: W0209 10:29:35.041138 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.041592 kubelet[2567]: E0209 10:29:35.041143 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.041954 kubelet[2567]: E0209 10:29:35.041200 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.041954 kubelet[2567]: W0209 10:29:35.041203 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.041954 kubelet[2567]: E0209 10:29:35.041208 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.041954 kubelet[2567]: E0209 10:29:35.041263 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.041954 kubelet[2567]: W0209 10:29:35.041267 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.041954 kubelet[2567]: E0209 10:29:35.041272 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.046570 kubelet[2567]: E0209 10:29:35.046529 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.046570 kubelet[2567]: W0209 10:29:35.046536 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.046570 kubelet[2567]: E0209 10:29:35.046544 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.046570 kubelet[2567]: I0209 10:29:35.046562 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/126ee306-c62d-4960-a4cb-21b7a8caba1f-registration-dir\") pod \"csi-node-driver-tcmq8\" (UID: \"126ee306-c62d-4960-a4cb-21b7a8caba1f\") " pod="calico-system/csi-node-driver-tcmq8" Feb 9 10:29:35.046737 kubelet[2567]: E0209 10:29:35.046675 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.046737 kubelet[2567]: W0209 10:29:35.046682 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.046737 kubelet[2567]: E0209 10:29:35.046693 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.046737 kubelet[2567]: I0209 10:29:35.046704 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/126ee306-c62d-4960-a4cb-21b7a8caba1f-kubelet-dir\") pod \"csi-node-driver-tcmq8\" (UID: \"126ee306-c62d-4960-a4cb-21b7a8caba1f\") " pod="calico-system/csi-node-driver-tcmq8" Feb 9 10:29:35.046826 kubelet[2567]: E0209 10:29:35.046810 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.046826 kubelet[2567]: W0209 10:29:35.046819 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.046862 kubelet[2567]: E0209 10:29:35.046832 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.046959 kubelet[2567]: E0209 10:29:35.046924 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.046959 kubelet[2567]: W0209 10:29:35.046930 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.046959 kubelet[2567]: E0209 10:29:35.046943 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.047072 kubelet[2567]: E0209 10:29:35.047032 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.047072 kubelet[2567]: W0209 10:29:35.047040 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.047072 kubelet[2567]: E0209 10:29:35.047052 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.047072 kubelet[2567]: I0209 10:29:35.047069 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/126ee306-c62d-4960-a4cb-21b7a8caba1f-socket-dir\") pod \"csi-node-driver-tcmq8\" (UID: \"126ee306-c62d-4960-a4cb-21b7a8caba1f\") " pod="calico-system/csi-node-driver-tcmq8" Feb 9 10:29:35.047186 kubelet[2567]: E0209 10:29:35.047181 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.047222 kubelet[2567]: W0209 10:29:35.047189 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.047222 kubelet[2567]: E0209 10:29:35.047202 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.047295 kubelet[2567]: E0209 10:29:35.047289 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.047295 kubelet[2567]: W0209 10:29:35.047295 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.047361 kubelet[2567]: E0209 10:29:35.047308 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.047473 kubelet[2567]: E0209 10:29:35.047465 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.047473 kubelet[2567]: W0209 10:29:35.047472 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.047547 kubelet[2567]: E0209 10:29:35.047484 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.047547 kubelet[2567]: I0209 10:29:35.047501 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sfqjn\" (UniqueName: \"kubernetes.io/projected/126ee306-c62d-4960-a4cb-21b7a8caba1f-kube-api-access-sfqjn\") pod \"csi-node-driver-tcmq8\" (UID: \"126ee306-c62d-4960-a4cb-21b7a8caba1f\") " pod="calico-system/csi-node-driver-tcmq8" Feb 9 10:29:35.047676 kubelet[2567]: E0209 10:29:35.047667 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.047676 kubelet[2567]: W0209 10:29:35.047675 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.047757 kubelet[2567]: E0209 10:29:35.047687 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.047757 kubelet[2567]: I0209 10:29:35.047705 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/126ee306-c62d-4960-a4cb-21b7a8caba1f-varrun\") pod \"csi-node-driver-tcmq8\" (UID: \"126ee306-c62d-4960-a4cb-21b7a8caba1f\") " pod="calico-system/csi-node-driver-tcmq8" Feb 9 10:29:35.047839 kubelet[2567]: E0209 10:29:35.047833 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.047877 kubelet[2567]: W0209 10:29:35.047839 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.047877 kubelet[2567]: E0209 10:29:35.047851 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.047939 kubelet[2567]: E0209 10:29:35.047932 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.047974 kubelet[2567]: W0209 10:29:35.047939 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.047974 kubelet[2567]: E0209 10:29:35.047950 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.048049 kubelet[2567]: E0209 10:29:35.048043 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.048049 kubelet[2567]: W0209 10:29:35.048048 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.048110 kubelet[2567]: E0209 10:29:35.048058 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.048142 kubelet[2567]: E0209 10:29:35.048134 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.048142 kubelet[2567]: W0209 10:29:35.048140 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.048204 kubelet[2567]: E0209 10:29:35.048150 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.048239 kubelet[2567]: E0209 10:29:35.048233 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.048270 kubelet[2567]: W0209 10:29:35.048238 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.048270 kubelet[2567]: E0209 10:29:35.048247 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.048330 kubelet[2567]: E0209 10:29:35.048324 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.048330 kubelet[2567]: W0209 10:29:35.048330 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.048384 kubelet[2567]: E0209 10:29:35.048344 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:34.781000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffef0f61910 a2=0 a3=7ffef0f618fc items=0 ppid=2840 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:35.092267 env[1477]: time="2024-02-09T10:29:35.092237421Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nrqdd,Uid:9dc548b2-0a3d-4f55-aa82-19807629573b,Namespace:calico-system,Attempt:0,}" Feb 9 10:29:35.099234 env[1477]: time="2024-02-09T10:29:35.099191229Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:29:35.099234 env[1477]: time="2024-02-09T10:29:35.099212305Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:29:35.099234 env[1477]: time="2024-02-09T10:29:35.099219222Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:29:35.099445 env[1477]: time="2024-02-09T10:29:35.099289387Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2bd51b21e82de0269ccd06ae64cd37b36f247c27cbd55e0b8303b4f68c7ae90f pid=3126 runtime=io.containerd.runc.v2 Feb 9 10:29:35.148692 kubelet[2567]: E0209 10:29:35.148674 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.148692 kubelet[2567]: W0209 10:29:35.148683 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.148692 kubelet[2567]: E0209 10:29:35.148694 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.148863 kubelet[2567]: E0209 10:29:35.148820 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.148863 kubelet[2567]: W0209 10:29:35.148824 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.148863 kubelet[2567]: E0209 10:29:35.148834 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.148993 kubelet[2567]: E0209 10:29:35.148961 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.148993 kubelet[2567]: W0209 10:29:35.148967 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.148993 kubelet[2567]: E0209 10:29:35.148974 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.149103 kubelet[2567]: E0209 10:29:35.149091 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.149103 kubelet[2567]: W0209 10:29:35.149097 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.149181 kubelet[2567]: E0209 10:29:35.149107 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.149233 kubelet[2567]: E0209 10:29:35.149183 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.149233 kubelet[2567]: W0209 10:29:35.149188 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.149233 kubelet[2567]: E0209 10:29:35.149195 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.149360 kubelet[2567]: E0209 10:29:35.149312 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.149360 kubelet[2567]: W0209 10:29:35.149318 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.149360 kubelet[2567]: E0209 10:29:35.149328 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.149499 kubelet[2567]: E0209 10:29:35.149439 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.149499 kubelet[2567]: W0209 10:29:35.149445 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.149499 kubelet[2567]: E0209 10:29:35.149454 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.149630 kubelet[2567]: E0209 10:29:35.149558 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.149630 kubelet[2567]: W0209 10:29:35.149563 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.149630 kubelet[2567]: E0209 10:29:35.149572 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.149751 kubelet[2567]: E0209 10:29:35.149738 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.149751 kubelet[2567]: W0209 10:29:35.149744 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.149751 kubelet[2567]: E0209 10:29:35.149753 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.149885 kubelet[2567]: E0209 10:29:35.149862 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.149885 kubelet[2567]: W0209 10:29:35.149868 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.149885 kubelet[2567]: E0209 10:29:35.149877 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.150004 kubelet[2567]: E0209 10:29:35.149991 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.150004 kubelet[2567]: W0209 10:29:35.149996 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.150004 kubelet[2567]: E0209 10:29:35.150005 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.150130 kubelet[2567]: E0209 10:29:35.150087 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.150130 kubelet[2567]: W0209 10:29:35.150091 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.150130 kubelet[2567]: E0209 10:29:35.150103 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.150242 kubelet[2567]: E0209 10:29:35.150154 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.150242 kubelet[2567]: W0209 10:29:35.150159 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.150242 kubelet[2567]: E0209 10:29:35.150169 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.150242 kubelet[2567]: E0209 10:29:35.150218 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.150242 kubelet[2567]: W0209 10:29:35.150222 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.150242 kubelet[2567]: E0209 10:29:35.150229 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.150484 kubelet[2567]: E0209 10:29:35.150304 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.150484 kubelet[2567]: W0209 10:29:35.150309 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.150484 kubelet[2567]: E0209 10:29:35.150315 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.150484 kubelet[2567]: E0209 10:29:35.150391 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.150484 kubelet[2567]: W0209 10:29:35.150397 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.150484 kubelet[2567]: E0209 10:29:35.150405 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.150484 kubelet[2567]: E0209 10:29:35.150463 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.150484 kubelet[2567]: W0209 10:29:35.150467 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.150484 kubelet[2567]: E0209 10:29:35.150473 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.150813 kubelet[2567]: E0209 10:29:35.150530 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.150813 kubelet[2567]: W0209 10:29:35.150534 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.150813 kubelet[2567]: E0209 10:29:35.150540 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.150813 kubelet[2567]: E0209 10:29:35.150609 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.150813 kubelet[2567]: W0209 10:29:35.150613 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.150813 kubelet[2567]: E0209 10:29:35.150619 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.150813 kubelet[2567]: E0209 10:29:35.150683 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.150813 kubelet[2567]: W0209 10:29:35.150687 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.150813 kubelet[2567]: E0209 10:29:35.150694 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.150813 kubelet[2567]: E0209 10:29:35.150749 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.151166 kubelet[2567]: W0209 10:29:35.150753 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.151166 kubelet[2567]: E0209 10:29:35.150759 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.151166 kubelet[2567]: E0209 10:29:35.150832 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.151166 kubelet[2567]: W0209 10:29:35.150837 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.151166 kubelet[2567]: E0209 10:29:35.150845 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.151166 kubelet[2567]: E0209 10:29:35.150903 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.151166 kubelet[2567]: W0209 10:29:35.150906 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.151166 kubelet[2567]: E0209 10:29:35.150913 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.151166 kubelet[2567]: E0209 10:29:35.150983 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.151166 kubelet[2567]: W0209 10:29:35.150987 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.151549 kubelet[2567]: E0209 10:29:35.150995 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.151549 kubelet[2567]: E0209 10:29:35.151067 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.151549 kubelet[2567]: W0209 10:29:35.151070 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.151549 kubelet[2567]: E0209 10:29:35.151076 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.156869 kernel: audit: type=1325 audit(1707474574.781:1069): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:35.156906 kernel: audit: type=1300 audit(1707474574.781:1069): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffef0f61910 a2=0 a3=7ffef0f618fc items=0 ppid=2840 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:34.781000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:35.157242 kubelet[2567]: E0209 10:29:35.157211 2567 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:35.157242 kubelet[2567]: W0209 10:29:35.157217 2567 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:35.157242 kubelet[2567]: E0209 10:29:35.157225 2567 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:35.157350 kernel: audit: type=1327 audit(1707474574.781:1069): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:35.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.217423 systemd[1]: Started cri-containerd-2bd51b21e82de0269ccd06ae64cd37b36f247c27cbd55e0b8303b4f68c7ae90f.scope. Feb 9 10:29:35.279993 kernel: audit: type=1400 audit(1707474575.064:1070): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit: BPF prog-id=127 op=LOAD Feb 9 10:29:34.998000 audit[3044]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:34.998000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffef0f61910 a2=0 a3=31030 items=0 ppid=2840 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:34.998000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:35.215000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3059 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:35.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265636465363463316462646436666136373435656265383561373538 Feb 9 10:29:35.215000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3059 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:35.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265636465363463316462646436666136373435656265383561373538 Feb 9 10:29:35.215000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.215000 audit: BPF prog-id=129 op=LOAD Feb 9 10:29:35.279000 audit: BPF prog-id=128 op=LOAD Feb 9 10:29:35.215000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002183f0 items=0 ppid=3059 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:35.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265636465363463316462646436666136373435656265383561373538 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit: BPF prog-id=130 op=LOAD Feb 9 10:29:35.279000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218438 items=0 ppid=3059 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:35.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265636465363463316462646436666136373435656265383561373538 Feb 9 10:29:35.279000 audit: BPF prog-id=130 op=UNLOAD Feb 9 10:29:35.279000 audit: BPF prog-id=129 op=UNLOAD Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3126 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:35.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262643531623231653832646530323639636364303661653634636433 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3126 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:35.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262643531623231653832646530323639636364303661653634636433 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.279000 audit: BPF prog-id=131 op=LOAD Feb 9 10:29:35.280000 audit: BPF prog-id=132 op=LOAD Feb 9 10:29:35.279000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218848 items=0 ppid=3059 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:35.280000 audit[3135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000364bc0 items=0 ppid=3126 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:35.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262643531623231653832646530323639636364303661653634636433 Feb 9 10:29:35.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265636465363463316462646436666136373435656265383561373538 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit: BPF prog-id=133 op=LOAD Feb 9 10:29:35.280000 audit[3135]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000364c08 items=0 ppid=3126 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:35.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262643531623231653832646530323639636364303661653634636433 Feb 9 10:29:35.280000 audit: BPF prog-id=133 op=UNLOAD Feb 9 10:29:35.280000 audit: BPF prog-id=132 op=UNLOAD Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:35.280000 audit: BPF prog-id=134 op=LOAD Feb 9 10:29:35.280000 audit[3135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000365018 items=0 ppid=3126 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:35.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262643531623231653832646530323639636364303661653634636433 Feb 9 10:29:35.298287 env[1477]: time="2024-02-09T10:29:35.298224840Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nrqdd,Uid:9dc548b2-0a3d-4f55-aa82-19807629573b,Namespace:calico-system,Attempt:0,} returns sandbox id \"2bd51b21e82de0269ccd06ae64cd37b36f247c27cbd55e0b8303b4f68c7ae90f\"" Feb 9 10:29:35.299002 env[1477]: time="2024-02-09T10:29:35.298990153Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 10:29:35.308865 env[1477]: time="2024-02-09T10:29:35.308840529Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-66cb95bd5f-dbflp,Uid:f52dd857-4b92-437b-bb53-c0cd0303697a,Namespace:calico-system,Attempt:0,} returns sandbox id \"2ecde64c1dbdd6fa6745ebe85a7586a14dc98a9ed70d83e0c3392f041ddc8258\"" Feb 9 10:29:36.940592 kubelet[2567]: E0209 10:29:36.940532 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:29:38.939866 kubelet[2567]: E0209 10:29:38.939772 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:29:38.991776 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2242532528.mount: Deactivated successfully. Feb 9 10:29:40.940131 kubelet[2567]: E0209 10:29:40.940048 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:29:42.939941 kubelet[2567]: E0209 10:29:42.939831 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:29:44.939202 kubelet[2567]: E0209 10:29:44.939148 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:29:46.940407 kubelet[2567]: E0209 10:29:46.940305 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:29:48.939426 kubelet[2567]: E0209 10:29:48.939264 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:29:50.940189 kubelet[2567]: E0209 10:29:50.940113 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:29:52.939372 kubelet[2567]: E0209 10:29:52.939222 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:29:54.940261 kubelet[2567]: E0209 10:29:54.940195 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:29:56.928330 env[1477]: time="2024-02-09T10:29:56.928253369Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:56.929187 env[1477]: time="2024-02-09T10:29:56.929171320Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:56.930414 env[1477]: time="2024-02-09T10:29:56.930392410Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:56.931831 env[1477]: time="2024-02-09T10:29:56.931818085Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:56.932252 env[1477]: time="2024-02-09T10:29:56.932238883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 10:29:56.932606 env[1477]: time="2024-02-09T10:29:56.932560305Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 10:29:56.933403 env[1477]: time="2024-02-09T10:29:56.933388271Z" level=info msg="CreateContainer within sandbox \"2bd51b21e82de0269ccd06ae64cd37b36f247c27cbd55e0b8303b4f68c7ae90f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 10:29:56.938330 env[1477]: time="2024-02-09T10:29:56.938293352Z" level=info msg="CreateContainer within sandbox \"2bd51b21e82de0269ccd06ae64cd37b36f247c27cbd55e0b8303b4f68c7ae90f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e4189eb66c91b9b27c855def26c9b0e0926b463d37d4e9103240e225cacdb97d\"" Feb 9 10:29:56.938625 env[1477]: time="2024-02-09T10:29:56.938594396Z" level=info msg="StartContainer for \"e4189eb66c91b9b27c855def26c9b0e0926b463d37d4e9103240e225cacdb97d\"" Feb 9 10:29:56.939876 kubelet[2567]: E0209 10:29:56.939862 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:29:56.961119 systemd[1]: Started cri-containerd-e4189eb66c91b9b27c855def26c9b0e0926b463d37d4e9103240e225cacdb97d.scope. Feb 9 10:29:56.967000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.995030 kernel: kauditd_printk_skb: 116 callbacks suppressed Feb 9 10:29:56.995124 kernel: audit: type=1400 audit(1707474596.967:1107): avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.967000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3126 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:57.060408 kernel: audit: type=1300 audit(1707474596.967:1107): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3126 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534313839656236366339316239623237633835356465663236633962 Feb 9 10:29:57.252402 kernel: audit: type=1327 audit(1707474596.967:1107): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534313839656236366339316239623237633835356465663236633962 Feb 9 10:29:57.252445 kernel: audit: type=1400 audit(1707474596.967:1108): avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.967000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.316270 kernel: audit: type=1400 audit(1707474596.967:1108): avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.967000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.380142 kernel: audit: type=1400 audit(1707474596.967:1108): avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.967000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.444063 kernel: audit: type=1400 audit(1707474596.967:1108): avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.967000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.508383 kernel: audit: type=1400 audit(1707474596.967:1108): avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.967000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.572756 kernel: audit: type=1400 audit(1707474596.967:1108): avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.967000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.587324 env[1477]: time="2024-02-09T10:29:57.587301056Z" level=info msg="StartContainer for \"e4189eb66c91b9b27c855def26c9b0e0926b463d37d4e9103240e225cacdb97d\" returns successfully" Feb 9 10:29:56.967000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.637377 systemd[1]: cri-containerd-e4189eb66c91b9b27c855def26c9b0e0926b463d37d4e9103240e225cacdb97d.scope: Deactivated successfully. Feb 9 10:29:57.701545 kernel: audit: type=1400 audit(1707474596.967:1108): avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.967000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.967000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.967000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.967000 audit: BPF prog-id=135 op=LOAD Feb 9 10:29:56.967000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003044d0 items=0 ppid=3126 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534313839656236366339316239623237633835356465663236633962 Feb 9 10:29:57.059000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.059000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.059000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.059000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.059000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.059000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.059000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.059000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.059000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.059000 audit: BPF prog-id=136 op=LOAD Feb 9 10:29:57.059000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000304518 items=0 ppid=3126 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:57.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534313839656236366339316239623237633835356465663236633962 Feb 9 10:29:57.252000 audit: BPF prog-id=136 op=UNLOAD Feb 9 10:29:57.252000 audit: BPF prog-id=135 op=UNLOAD Feb 9 10:29:57.252000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.252000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.252000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.252000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.252000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.252000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.252000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.252000 audit[3200]: AVC avc: denied { perfmon } for pid=3200 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.252000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.252000 audit[3200]: AVC avc: denied { bpf } for pid=3200 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:57.252000 audit: BPF prog-id=137 op=LOAD Feb 9 10:29:57.252000 audit[3200]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003045a8 items=0 ppid=3126 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:57.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534313839656236366339316239623237633835356465663236633962 Feb 9 10:29:57.715000 audit: BPF prog-id=137 op=UNLOAD Feb 9 10:29:57.941183 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e4189eb66c91b9b27c855def26c9b0e0926b463d37d4e9103240e225cacdb97d-rootfs.mount: Deactivated successfully. Feb 9 10:29:57.950160 env[1477]: time="2024-02-09T10:29:57.950130725Z" level=info msg="shim disconnected" id=e4189eb66c91b9b27c855def26c9b0e0926b463d37d4e9103240e225cacdb97d Feb 9 10:29:57.950334 env[1477]: time="2024-02-09T10:29:57.950163838Z" level=warning msg="cleaning up after shim disconnected" id=e4189eb66c91b9b27c855def26c9b0e0926b463d37d4e9103240e225cacdb97d namespace=k8s.io Feb 9 10:29:57.950334 env[1477]: time="2024-02-09T10:29:57.950170897Z" level=info msg="cleaning up dead shim" Feb 9 10:29:57.966321 env[1477]: time="2024-02-09T10:29:57.966274604Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:29:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3239 runtime=io.containerd.runc.v2\n" Feb 9 10:29:58.939258 kubelet[2567]: E0209 10:29:58.939190 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:00.939835 kubelet[2567]: E0209 10:30:00.939728 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:01.203478 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4258244897.mount: Deactivated successfully. Feb 9 10:30:02.940325 kubelet[2567]: E0209 10:30:02.940224 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:04.939488 kubelet[2567]: E0209 10:30:04.939384 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:06.462353 env[1477]: time="2024-02-09T10:30:06.462286958Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:06.463230 env[1477]: time="2024-02-09T10:30:06.463194425Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:06.464586 env[1477]: time="2024-02-09T10:30:06.464544360Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:06.465584 env[1477]: time="2024-02-09T10:30:06.465537999Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:06.466012 env[1477]: time="2024-02-09T10:30:06.465968962Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 10:30:06.466235 env[1477]: time="2024-02-09T10:30:06.466222310Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 10:30:06.470050 env[1477]: time="2024-02-09T10:30:06.470031986Z" level=info msg="CreateContainer within sandbox \"2ecde64c1dbdd6fa6745ebe85a7586a14dc98a9ed70d83e0c3392f041ddc8258\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 10:30:06.475023 env[1477]: time="2024-02-09T10:30:06.474978235Z" level=info msg="CreateContainer within sandbox \"2ecde64c1dbdd6fa6745ebe85a7586a14dc98a9ed70d83e0c3392f041ddc8258\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"542e12c430386557a47e048dac5c4dcd63a8c4183d98c6740ded00e75f5b10a2\"" Feb 9 10:30:06.475210 env[1477]: time="2024-02-09T10:30:06.475197066Z" level=info msg="StartContainer for \"542e12c430386557a47e048dac5c4dcd63a8c4183d98c6740ded00e75f5b10a2\"" Feb 9 10:30:06.495812 systemd[1]: Started cri-containerd-542e12c430386557a47e048dac5c4dcd63a8c4183d98c6740ded00e75f5b10a2.scope. Feb 9 10:30:06.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.529190 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 10:30:06.529255 kernel: audit: type=1400 audit(1707474606.501:1114): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.657333 kernel: audit: type=1400 audit(1707474606.501:1115): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.658356 kernel: audit: type=1400 audit(1707474606.501:1116): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.785922 kernel: audit: type=1400 audit(1707474606.501:1117): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.785982 kernel: audit: type=1400 audit(1707474606.501:1118): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.850323 kernel: audit: type=1400 audit(1707474606.501:1119): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.914732 kernel: audit: type=1400 audit(1707474606.501:1120): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.939100 kubelet[2567]: E0209 10:30:06.939089 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:06.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:07.043495 kernel: audit: type=1400 audit(1707474606.501:1121): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:07.043553 kernel: audit: type=1400 audit(1707474606.501:1122): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:07.171762 kernel: audit: type=1400 audit(1707474606.592:1123): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.592000 audit: BPF prog-id=138 op=LOAD Feb 9 10:30:06.593000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.593000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3059 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:06.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534326531326334333033383635353761343765303438646163356334 Feb 9 10:30:06.593000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.593000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3059 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:06.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534326531326334333033383635353761343765303438646163356334 Feb 9 10:30:06.593000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.593000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.593000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.593000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.593000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.593000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.593000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.593000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.593000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.593000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.593000 audit: BPF prog-id=139 op=LOAD Feb 9 10:30:06.593000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001f9e60 items=0 ppid=3059 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:06.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534326531326334333033383635353761343765303438646163356334 Feb 9 10:30:06.721000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.721000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.721000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.721000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.721000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.721000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.721000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.721000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.721000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.721000 audit: BPF prog-id=140 op=LOAD Feb 9 10:30:06.721000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001f9ea8 items=0 ppid=3059 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:06.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534326531326334333033383635353761343765303438646163356334 Feb 9 10:30:06.849000 audit: BPF prog-id=140 op=UNLOAD Feb 9 10:30:06.849000 audit: BPF prog-id=139 op=UNLOAD Feb 9 10:30:06.849000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.849000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.849000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.849000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.849000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.849000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.849000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.849000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.849000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.849000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:06.849000 audit: BPF prog-id=141 op=LOAD Feb 9 10:30:06.849000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bc2b8 items=0 ppid=3059 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:06.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534326531326334333033383635353761343765303438646163356334 Feb 9 10:30:07.200481 env[1477]: time="2024-02-09T10:30:07.200430137Z" level=info msg="StartContainer for \"542e12c430386557a47e048dac5c4dcd63a8c4183d98c6740ded00e75f5b10a2\" returns successfully" Feb 9 10:30:08.106172 kubelet[2567]: I0209 10:30:08.106044 2567 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-66cb95bd5f-dbflp" podStartSLOduration=2.949213421 podCreationTimestamp="2024-02-09 10:29:34 +0000 UTC" firstStartedPulling="2024-02-09 10:29:35.309394792 +0000 UTC m=+18.426307613" lastFinishedPulling="2024-02-09 10:30:06.466137008 +0000 UTC m=+49.583049827" observedRunningTime="2024-02-09 10:30:08.105046054 +0000 UTC m=+51.221958962" watchObservedRunningTime="2024-02-09 10:30:08.105955635 +0000 UTC m=+51.222868503" Feb 9 10:30:08.145000 audit[3308]: NETFILTER_CFG table=filter:93 family=2 entries=15 op=nft_register_rule pid=3308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:08.145000 audit[3308]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd76dea010 a2=0 a3=7ffd76de9ffc items=0 ppid=2840 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:08.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:08.147000 audit[3308]: NETFILTER_CFG table=nat:94 family=2 entries=19 op=nft_register_chain pid=3308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:08.147000 audit[3308]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffd76dea010 a2=0 a3=7ffd76de9ffc items=0 ppid=2840 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:08.147000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:08.940157 kubelet[2567]: E0209 10:30:08.940041 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:10.161763 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3459435293.mount: Deactivated successfully. Feb 9 10:30:10.940092 kubelet[2567]: E0209 10:30:10.939974 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:12.746000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:12.774753 kernel: kauditd_printk_skb: 53 callbacks suppressed Feb 9 10:30:12.774790 kernel: audit: type=1400 audit(1707474612.746:1134): avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:12.746000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001430b10 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:30:12.939551 kubelet[2567]: E0209 10:30:12.939511 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:12.989499 kernel: audit: type=1300 audit(1707474612.746:1134): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001430b10 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:30:12.989546 kernel: audit: type=1327 audit(1707474612.746:1134): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:12.746000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:12.746000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:13.174583 kernel: audit: type=1400 audit(1707474612.746:1135): avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:13.174617 kernel: audit: type=1300 audit(1707474612.746:1135): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a9f640 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:30:12.746000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a9f640 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:30:13.295952 kernel: audit: type=1327 audit(1707474612.746:1135): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:12.746000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:13.389932 kernel: audit: type=1400 audit(1707474612.757:1136): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:12.757000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:12.757000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00be68500 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:30:13.580477 kernel: audit: type=1300 audit(1707474612.757:1136): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00be68500 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:30:13.580521 kernel: audit: type=1327 audit(1707474612.757:1136): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:30:12.757000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:30:13.675695 kernel: audit: type=1400 audit(1707474612.757:1137): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:12.757000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:12.757000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c007177e60 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:30:12.757000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:30:12.759000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:12.759000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c007177f20 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:30:12.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:30:12.759000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:12.759000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00d20fb00 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:30:12.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:30:12.759000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:12.759000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00f8ba860 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:30:12.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:30:12.759000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:12.759000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0036465d0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:30:12.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:30:14.940232 kubelet[2567]: E0209 10:30:14.940125 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:16.565000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:16.565000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a9fa40 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:30:16.565000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:16.566000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:16.566000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f8aa80 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:30:16.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:16.566000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:16.566000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00015ecc0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:30:16.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:16.567000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:30:16.567000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00132ee20 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:30:16.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:30:16.939321 kubelet[2567]: E0209 10:30:16.939276 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:18.939825 kubelet[2567]: E0209 10:30:18.939752 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:20.940091 kubelet[2567]: E0209 10:30:20.939982 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:22.939354 kubelet[2567]: E0209 10:30:22.939309 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:23.026432 env[1477]: time="2024-02-09T10:30:23.026362171Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:23.026926 env[1477]: time="2024-02-09T10:30:23.026888038Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:23.028128 env[1477]: time="2024-02-09T10:30:23.028085225Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:23.028896 env[1477]: time="2024-02-09T10:30:23.028850548Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:23.029765 env[1477]: time="2024-02-09T10:30:23.029720604Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 10:30:23.041816 env[1477]: time="2024-02-09T10:30:23.041800641Z" level=info msg="CreateContainer within sandbox \"2bd51b21e82de0269ccd06ae64cd37b36f247c27cbd55e0b8303b4f68c7ae90f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 10:30:23.046999 env[1477]: time="2024-02-09T10:30:23.046958668Z" level=info msg="CreateContainer within sandbox \"2bd51b21e82de0269ccd06ae64cd37b36f247c27cbd55e0b8303b4f68c7ae90f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"1f8c09516152044d5d132390b8e4631a546708607196473b36ec703b9c1c9ec8\"" Feb 9 10:30:23.047422 env[1477]: time="2024-02-09T10:30:23.047399594Z" level=info msg="StartContainer for \"1f8c09516152044d5d132390b8e4631a546708607196473b36ec703b9c1c9ec8\"" Feb 9 10:30:23.071308 systemd[1]: Started cri-containerd-1f8c09516152044d5d132390b8e4631a546708607196473b36ec703b9c1c9ec8.scope. Feb 9 10:30:23.078000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.105740 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 10:30:23.105826 kernel: audit: type=1400 audit(1707474623.078:1146): avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.078000 audit[3320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3126 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:23.266036 kernel: audit: type=1300 audit(1707474623.078:1146): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3126 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:23.266069 kernel: audit: type=1327 audit(1707474623.078:1146): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166386330393531363135323034346435643133323339306238653436 Feb 9 10:30:23.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166386330393531363135323034346435643133323339306238653436 Feb 9 10:30:23.359030 kernel: audit: type=1400 audit(1707474623.078:1147): avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.078000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.422392 kernel: audit: type=1400 audit(1707474623.078:1147): avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.078000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.485722 kernel: audit: type=1400 audit(1707474623.078:1147): avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.078000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.549157 kernel: audit: type=1400 audit(1707474623.078:1147): avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.078000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.613215 kernel: audit: type=1400 audit(1707474623.078:1147): avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.078000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.627314 env[1477]: time="2024-02-09T10:30:23.627291106Z" level=info msg="StartContainer for \"1f8c09516152044d5d132390b8e4631a546708607196473b36ec703b9c1c9ec8\" returns successfully" Feb 9 10:30:23.078000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.741411 kernel: audit: type=1400 audit(1707474623.078:1147): avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.741450 kernel: audit: type=1400 audit(1707474623.078:1147): avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.078000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.078000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.078000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.078000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.078000 audit: BPF prog-id=142 op=LOAD Feb 9 10:30:23.078000 audit[3320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003ca400 items=0 ppid=3126 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:23.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166386330393531363135323034346435643133323339306238653436 Feb 9 10:30:23.169000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.169000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.169000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.169000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.169000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.169000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.169000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.169000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.169000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.169000 audit: BPF prog-id=143 op=LOAD Feb 9 10:30:23.169000 audit[3320]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003ca448 items=0 ppid=3126 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:23.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166386330393531363135323034346435643133323339306238653436 Feb 9 10:30:23.358000 audit: BPF prog-id=143 op=UNLOAD Feb 9 10:30:23.358000 audit: BPF prog-id=142 op=UNLOAD Feb 9 10:30:23.358000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.358000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.358000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.358000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.358000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.358000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.358000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.358000 audit[3320]: AVC avc: denied { perfmon } for pid=3320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.358000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.358000 audit[3320]: AVC avc: denied { bpf } for pid=3320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:23.358000 audit: BPF prog-id=144 op=LOAD Feb 9 10:30:23.358000 audit[3320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ca4d8 items=0 ppid=3126 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:23.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166386330393531363135323034346435643133323339306238653436 Feb 9 10:30:24.321105 env[1477]: time="2024-02-09T10:30:24.321045211Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 10:30:24.322328 systemd[1]: cri-containerd-1f8c09516152044d5d132390b8e4631a546708607196473b36ec703b9c1c9ec8.scope: Deactivated successfully. Feb 9 10:30:24.336000 audit: BPF prog-id=144 op=UNLOAD Feb 9 10:30:24.356661 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1f8c09516152044d5d132390b8e4631a546708607196473b36ec703b9c1c9ec8-rootfs.mount: Deactivated successfully. Feb 9 10:30:24.421788 kubelet[2567]: I0209 10:30:24.421706 2567 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 10:30:24.444478 kubelet[2567]: I0209 10:30:24.444458 2567 topology_manager.go:215] "Topology Admit Handler" podUID="8b59bdd9-a462-4d83-aca6-3cef1fd58c5f" podNamespace="calico-system" podName="calico-kube-controllers-7bf886ccf-xc4cm" Feb 9 10:30:24.445427 kubelet[2567]: I0209 10:30:24.445412 2567 topology_manager.go:215] "Topology Admit Handler" podUID="c7848516-42cb-4d0b-a613-4255f9428103" podNamespace="kube-system" podName="coredns-5dd5756b68-n448j" Feb 9 10:30:24.445667 kubelet[2567]: I0209 10:30:24.445659 2567 topology_manager.go:215] "Topology Admit Handler" podUID="82361235-1b05-45af-a533-456da0162fc6" podNamespace="kube-system" podName="coredns-5dd5756b68-r7qwv" Feb 9 10:30:24.447663 systemd[1]: Created slice kubepods-besteffort-pod8b59bdd9_a462_4d83_aca6_3cef1fd58c5f.slice. Feb 9 10:30:24.449703 systemd[1]: Created slice kubepods-burstable-podc7848516_42cb_4d0b_a613_4255f9428103.slice. Feb 9 10:30:24.451871 systemd[1]: Created slice kubepods-burstable-pod82361235_1b05_45af_a533_456da0162fc6.slice. Feb 9 10:30:24.526884 kubelet[2567]: I0209 10:30:24.526820 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gvds2\" (UniqueName: \"kubernetes.io/projected/82361235-1b05-45af-a533-456da0162fc6-kube-api-access-gvds2\") pod \"coredns-5dd5756b68-r7qwv\" (UID: \"82361235-1b05-45af-a533-456da0162fc6\") " pod="kube-system/coredns-5dd5756b68-r7qwv" Feb 9 10:30:24.527452 kubelet[2567]: I0209 10:30:24.526958 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8b59bdd9-a462-4d83-aca6-3cef1fd58c5f-tigera-ca-bundle\") pod \"calico-kube-controllers-7bf886ccf-xc4cm\" (UID: \"8b59bdd9-a462-4d83-aca6-3cef1fd58c5f\") " pod="calico-system/calico-kube-controllers-7bf886ccf-xc4cm" Feb 9 10:30:24.527452 kubelet[2567]: I0209 10:30:24.527077 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c7848516-42cb-4d0b-a613-4255f9428103-config-volume\") pod \"coredns-5dd5756b68-n448j\" (UID: \"c7848516-42cb-4d0b-a613-4255f9428103\") " pod="kube-system/coredns-5dd5756b68-n448j" Feb 9 10:30:24.527452 kubelet[2567]: I0209 10:30:24.527217 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8qhw7\" (UniqueName: \"kubernetes.io/projected/8b59bdd9-a462-4d83-aca6-3cef1fd58c5f-kube-api-access-8qhw7\") pod \"calico-kube-controllers-7bf886ccf-xc4cm\" (UID: \"8b59bdd9-a462-4d83-aca6-3cef1fd58c5f\") " pod="calico-system/calico-kube-controllers-7bf886ccf-xc4cm" Feb 9 10:30:24.527452 kubelet[2567]: I0209 10:30:24.527330 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/82361235-1b05-45af-a533-456da0162fc6-config-volume\") pod \"coredns-5dd5756b68-r7qwv\" (UID: \"82361235-1b05-45af-a533-456da0162fc6\") " pod="kube-system/coredns-5dd5756b68-r7qwv" Feb 9 10:30:24.527950 kubelet[2567]: I0209 10:30:24.527485 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cvdwz\" (UniqueName: \"kubernetes.io/projected/c7848516-42cb-4d0b-a613-4255f9428103-kube-api-access-cvdwz\") pod \"coredns-5dd5756b68-n448j\" (UID: \"c7848516-42cb-4d0b-a613-4255f9428103\") " pod="kube-system/coredns-5dd5756b68-n448j" Feb 9 10:30:24.750104 env[1477]: time="2024-02-09T10:30:24.749962541Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bf886ccf-xc4cm,Uid:8b59bdd9-a462-4d83-aca6-3cef1fd58c5f,Namespace:calico-system,Attempt:0,}" Feb 9 10:30:24.752067 env[1477]: time="2024-02-09T10:30:24.751938419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-n448j,Uid:c7848516-42cb-4d0b-a613-4255f9428103,Namespace:kube-system,Attempt:0,}" Feb 9 10:30:24.754162 env[1477]: time="2024-02-09T10:30:24.754076763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-r7qwv,Uid:82361235-1b05-45af-a533-456da0162fc6,Namespace:kube-system,Attempt:0,}" Feb 9 10:30:24.953140 systemd[1]: Created slice kubepods-besteffort-pod126ee306_c62d_4960_a4cb_21b7a8caba1f.slice. Feb 9 10:30:24.957694 env[1477]: time="2024-02-09T10:30:24.957576627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tcmq8,Uid:126ee306-c62d-4960-a4cb-21b7a8caba1f,Namespace:calico-system,Attempt:0,}" Feb 9 10:30:25.047907 env[1477]: time="2024-02-09T10:30:25.047624645Z" level=info msg="shim disconnected" id=1f8c09516152044d5d132390b8e4631a546708607196473b36ec703b9c1c9ec8 Feb 9 10:30:25.047907 env[1477]: time="2024-02-09T10:30:25.047717277Z" level=warning msg="cleaning up after shim disconnected" id=1f8c09516152044d5d132390b8e4631a546708607196473b36ec703b9c1c9ec8 namespace=k8s.io Feb 9 10:30:25.047907 env[1477]: time="2024-02-09T10:30:25.047744347Z" level=info msg="cleaning up dead shim" Feb 9 10:30:25.068260 env[1477]: time="2024-02-09T10:30:25.068231753Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:30:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3378 runtime=io.containerd.runc.v2\n" Feb 9 10:30:25.085703 env[1477]: time="2024-02-09T10:30:25.085637143Z" level=error msg="Failed to destroy network for sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.085918 env[1477]: time="2024-02-09T10:30:25.085868600Z" level=error msg="Failed to destroy network for sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.085959 env[1477]: time="2024-02-09T10:30:25.085943593Z" level=error msg="encountered an error cleaning up failed sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.085989 env[1477]: time="2024-02-09T10:30:25.085976862Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tcmq8,Uid:126ee306-c62d-4960-a4cb-21b7a8caba1f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.086027 env[1477]: time="2024-02-09T10:30:25.085998681Z" level=error msg="Failed to destroy network for sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.086053 env[1477]: time="2024-02-09T10:30:25.086020623Z" level=error msg="encountered an error cleaning up failed sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.086079 env[1477]: time="2024-02-09T10:30:25.086058160Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-n448j,Uid:c7848516-42cb-4d0b-a613-4255f9428103,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.086166 kubelet[2567]: E0209 10:30:25.086154 2567 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.086205 kubelet[2567]: E0209 10:30:25.086198 2567 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-n448j" Feb 9 10:30:25.086233 kubelet[2567]: E0209 10:30:25.086217 2567 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-n448j" Feb 9 10:30:25.086233 kubelet[2567]: E0209 10:30:25.086154 2567 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.086278 env[1477]: time="2024-02-09T10:30:25.086174318Z" level=error msg="encountered an error cleaning up failed sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.086278 env[1477]: time="2024-02-09T10:30:25.086217008Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bf886ccf-xc4cm,Uid:8b59bdd9-a462-4d83-aca6-3cef1fd58c5f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.086353 kubelet[2567]: E0209 10:30:25.086253 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-n448j_kube-system(c7848516-42cb-4d0b-a613-4255f9428103)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-n448j_kube-system(c7848516-42cb-4d0b-a613-4255f9428103)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-n448j" podUID="c7848516-42cb-4d0b-a613-4255f9428103" Feb 9 10:30:25.086353 kubelet[2567]: E0209 10:30:25.086257 2567 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tcmq8" Feb 9 10:30:25.086353 kubelet[2567]: E0209 10:30:25.086277 2567 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tcmq8" Feb 9 10:30:25.086443 kubelet[2567]: E0209 10:30:25.086290 2567 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.086443 kubelet[2567]: E0209 10:30:25.086310 2567 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bf886ccf-xc4cm" Feb 9 10:30:25.086443 kubelet[2567]: E0209 10:30:25.086317 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-tcmq8_calico-system(126ee306-c62d-4960-a4cb-21b7a8caba1f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-tcmq8_calico-system(126ee306-c62d-4960-a4cb-21b7a8caba1f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:25.086520 kubelet[2567]: E0209 10:30:25.086324 2567 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bf886ccf-xc4cm" Feb 9 10:30:25.086520 kubelet[2567]: E0209 10:30:25.086371 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7bf886ccf-xc4cm_calico-system(8b59bdd9-a462-4d83-aca6-3cef1fd58c5f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7bf886ccf-xc4cm_calico-system(8b59bdd9-a462-4d83-aca6-3cef1fd58c5f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bf886ccf-xc4cm" podUID="8b59bdd9-a462-4d83-aca6-3cef1fd58c5f" Feb 9 10:30:25.094907 env[1477]: time="2024-02-09T10:30:25.094839449Z" level=error msg="Failed to destroy network for sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.095080 env[1477]: time="2024-02-09T10:30:25.095034466Z" level=error msg="encountered an error cleaning up failed sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.095080 env[1477]: time="2024-02-09T10:30:25.095066164Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-r7qwv,Uid:82361235-1b05-45af-a533-456da0162fc6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.095219 kubelet[2567]: E0209 10:30:25.095208 2567 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.095259 kubelet[2567]: E0209 10:30:25.095238 2567 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-r7qwv" Feb 9 10:30:25.095259 kubelet[2567]: E0209 10:30:25.095253 2567 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-r7qwv" Feb 9 10:30:25.095304 kubelet[2567]: E0209 10:30:25.095286 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-r7qwv_kube-system(82361235-1b05-45af-a533-456da0162fc6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-r7qwv_kube-system(82361235-1b05-45af-a533-456da0162fc6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-r7qwv" podUID="82361235-1b05-45af-a533-456da0162fc6" Feb 9 10:30:25.136889 kubelet[2567]: I0209 10:30:25.136864 2567 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:30:25.137399 env[1477]: time="2024-02-09T10:30:25.137370011Z" level=info msg="StopPodSandbox for \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\"" Feb 9 10:30:25.139254 kubelet[2567]: I0209 10:30:25.139235 2567 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:30:25.139351 env[1477]: time="2024-02-09T10:30:25.139315267Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 10:30:25.139642 env[1477]: time="2024-02-09T10:30:25.139616738Z" level=info msg="StopPodSandbox for \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\"" Feb 9 10:30:25.140090 kubelet[2567]: I0209 10:30:25.140070 2567 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:30:25.140527 env[1477]: time="2024-02-09T10:30:25.140493293Z" level=info msg="StopPodSandbox for \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\"" Feb 9 10:30:25.140938 kubelet[2567]: I0209 10:30:25.140921 2567 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:30:25.141336 env[1477]: time="2024-02-09T10:30:25.141308795Z" level=info msg="StopPodSandbox for \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\"" Feb 9 10:30:25.161750 env[1477]: time="2024-02-09T10:30:25.161668666Z" level=error msg="StopPodSandbox for \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\" failed" error="failed to destroy network for sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.162005 kubelet[2567]: E0209 10:30:25.161983 2567 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:30:25.162089 kubelet[2567]: E0209 10:30:25.162078 2567 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e"} Feb 9 10:30:25.162158 kubelet[2567]: E0209 10:30:25.162147 2567 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c7848516-42cb-4d0b-a613-4255f9428103\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:30:25.162249 kubelet[2567]: E0209 10:30:25.162203 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c7848516-42cb-4d0b-a613-4255f9428103\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-n448j" podUID="c7848516-42cb-4d0b-a613-4255f9428103" Feb 9 10:30:25.164855 env[1477]: time="2024-02-09T10:30:25.164785372Z" level=error msg="StopPodSandbox for \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\" failed" error="failed to destroy network for sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.165004 kubelet[2567]: E0209 10:30:25.164950 2567 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:30:25.165004 kubelet[2567]: E0209 10:30:25.164987 2567 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28"} Feb 9 10:30:25.165150 kubelet[2567]: E0209 10:30:25.165030 2567 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"126ee306-c62d-4960-a4cb-21b7a8caba1f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:30:25.165150 kubelet[2567]: E0209 10:30:25.165077 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"126ee306-c62d-4960-a4cb-21b7a8caba1f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:25.170606 env[1477]: time="2024-02-09T10:30:25.170533218Z" level=error msg="StopPodSandbox for \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\" failed" error="failed to destroy network for sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.170744 kubelet[2567]: E0209 10:30:25.170724 2567 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:30:25.170842 kubelet[2567]: E0209 10:30:25.170768 2567 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3"} Feb 9 10:30:25.170842 kubelet[2567]: E0209 10:30:25.170833 2567 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8b59bdd9-a462-4d83-aca6-3cef1fd58c5f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:30:25.170997 kubelet[2567]: E0209 10:30:25.170882 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8b59bdd9-a462-4d83-aca6-3cef1fd58c5f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bf886ccf-xc4cm" podUID="8b59bdd9-a462-4d83-aca6-3cef1fd58c5f" Feb 9 10:30:25.171872 env[1477]: time="2024-02-09T10:30:25.171811123Z" level=error msg="StopPodSandbox for \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\" failed" error="failed to destroy network for sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:25.171967 kubelet[2567]: E0209 10:30:25.171951 2567 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:30:25.172019 kubelet[2567]: E0209 10:30:25.171977 2567 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001"} Feb 9 10:30:25.172019 kubelet[2567]: E0209 10:30:25.172011 2567 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"82361235-1b05-45af-a533-456da0162fc6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:30:25.172115 kubelet[2567]: E0209 10:30:25.172036 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"82361235-1b05-45af-a533-456da0162fc6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-r7qwv" podUID="82361235-1b05-45af-a533-456da0162fc6" Feb 9 10:30:25.363855 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3-shm.mount: Deactivated successfully. Feb 9 10:30:35.940322 env[1477]: time="2024-02-09T10:30:35.940209935Z" level=info msg="StopPodSandbox for \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\"" Feb 9 10:30:35.940322 env[1477]: time="2024-02-09T10:30:35.940234978Z" level=info msg="StopPodSandbox for \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\"" Feb 9 10:30:35.979534 env[1477]: time="2024-02-09T10:30:35.979470466Z" level=error msg="StopPodSandbox for \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\" failed" error="failed to destroy network for sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:35.979748 kubelet[2567]: E0209 10:30:35.979727 2567 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:30:35.980118 kubelet[2567]: E0209 10:30:35.979773 2567 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e"} Feb 9 10:30:35.980118 kubelet[2567]: E0209 10:30:35.979820 2567 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c7848516-42cb-4d0b-a613-4255f9428103\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:30:35.980118 kubelet[2567]: E0209 10:30:35.979855 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c7848516-42cb-4d0b-a613-4255f9428103\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-n448j" podUID="c7848516-42cb-4d0b-a613-4255f9428103" Feb 9 10:30:35.980374 kubelet[2567]: E0209 10:30:35.980269 2567 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:30:35.980374 kubelet[2567]: E0209 10:30:35.980299 2567 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001"} Feb 9 10:30:35.980374 kubelet[2567]: E0209 10:30:35.980348 2567 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"82361235-1b05-45af-a533-456da0162fc6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:30:35.980552 env[1477]: time="2024-02-09T10:30:35.980057273Z" level=error msg="StopPodSandbox for \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\" failed" error="failed to destroy network for sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:35.980612 kubelet[2567]: E0209 10:30:35.980386 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"82361235-1b05-45af-a533-456da0162fc6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-r7qwv" podUID="82361235-1b05-45af-a533-456da0162fc6" Feb 9 10:30:37.940373 env[1477]: time="2024-02-09T10:30:37.940258225Z" level=info msg="StopPodSandbox for \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\"" Feb 9 10:30:37.995873 env[1477]: time="2024-02-09T10:30:37.995754431Z" level=error msg="StopPodSandbox for \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\" failed" error="failed to destroy network for sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:37.996119 kubelet[2567]: E0209 10:30:37.996066 2567 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:30:37.996503 kubelet[2567]: E0209 10:30:37.996124 2567 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28"} Feb 9 10:30:37.996503 kubelet[2567]: E0209 10:30:37.996182 2567 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"126ee306-c62d-4960-a4cb-21b7a8caba1f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:30:37.996503 kubelet[2567]: E0209 10:30:37.996226 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"126ee306-c62d-4960-a4cb-21b7a8caba1f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tcmq8" podUID="126ee306-c62d-4960-a4cb-21b7a8caba1f" Feb 9 10:30:38.941449 env[1477]: time="2024-02-09T10:30:38.941311953Z" level=info msg="StopPodSandbox for \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\"" Feb 9 10:30:38.987708 env[1477]: time="2024-02-09T10:30:38.987618737Z" level=error msg="StopPodSandbox for \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\" failed" error="failed to destroy network for sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:30:38.987956 kubelet[2567]: E0209 10:30:38.987902 2567 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:30:38.987956 kubelet[2567]: E0209 10:30:38.987955 2567 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3"} Feb 9 10:30:38.988170 kubelet[2567]: E0209 10:30:38.988008 2567 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8b59bdd9-a462-4d83-aca6-3cef1fd58c5f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:30:38.988170 kubelet[2567]: E0209 10:30:38.988047 2567 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8b59bdd9-a462-4d83-aca6-3cef1fd58c5f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bf886ccf-xc4cm" podUID="8b59bdd9-a462-4d83-aca6-3cef1fd58c5f" Feb 9 10:30:42.197123 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount627018867.mount: Deactivated successfully. Feb 9 10:30:42.219212 env[1477]: time="2024-02-09T10:30:42.219162997Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:42.219775 env[1477]: time="2024-02-09T10:30:42.219729757Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:42.220253 env[1477]: time="2024-02-09T10:30:42.220215018Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:42.220909 env[1477]: time="2024-02-09T10:30:42.220870293Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:42.221172 env[1477]: time="2024-02-09T10:30:42.221130747Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 10:30:42.225006 env[1477]: time="2024-02-09T10:30:42.224960767Z" level=info msg="CreateContainer within sandbox \"2bd51b21e82de0269ccd06ae64cd37b36f247c27cbd55e0b8303b4f68c7ae90f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 10:30:42.230011 env[1477]: time="2024-02-09T10:30:42.229966480Z" level=info msg="CreateContainer within sandbox \"2bd51b21e82de0269ccd06ae64cd37b36f247c27cbd55e0b8303b4f68c7ae90f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5e78f182297b361002bb1c1849929f7d349bc9322b84b3b930c887d85c4b96ea\"" Feb 9 10:30:42.230258 env[1477]: time="2024-02-09T10:30:42.230246982Z" level=info msg="StartContainer for \"5e78f182297b361002bb1c1849929f7d349bc9322b84b3b930c887d85c4b96ea\"" Feb 9 10:30:42.250554 systemd[1]: Started cri-containerd-5e78f182297b361002bb1c1849929f7d349bc9322b84b3b930c887d85c4b96ea.scope. Feb 9 10:30:42.258000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.287032 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 10:30:42.287098 kernel: audit: type=1400 audit(1707474642.258:1153): avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.258000 audit[3847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3126 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:42.448198 kernel: audit: type=1300 audit(1707474642.258:1153): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3126 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:42.448232 kernel: audit: type=1327 audit(1707474642.258:1153): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373866313832323937623336313030326262316331383439393239 Feb 9 10:30:42.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373866313832323937623336313030326262316331383439393239 Feb 9 10:30:42.541380 kernel: audit: type=1400 audit(1707474642.258:1154): avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.258000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.604824 kernel: audit: type=1400 audit(1707474642.258:1154): avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.258000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.668399 kernel: audit: type=1400 audit(1707474642.258:1154): avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.258000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.732035 kernel: audit: type=1400 audit(1707474642.258:1154): avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.258000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.795995 kernel: audit: type=1400 audit(1707474642.258:1154): avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.258000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.814721 env[1477]: time="2024-02-09T10:30:42.814691585Z" level=info msg="StartContainer for \"5e78f182297b361002bb1c1849929f7d349bc9322b84b3b930c887d85c4b96ea\" returns successfully" Feb 9 10:30:42.860048 kernel: audit: type=1400 audit(1707474642.258:1154): avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.258000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.924077 kernel: audit: type=1400 audit(1707474642.258:1154): avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.258000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.258000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.258000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.258000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.258000 audit: BPF prog-id=145 op=LOAD Feb 9 10:30:42.258000 audit[3847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d7be0 items=0 ppid=3126 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:42.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373866313832323937623336313030326262316331383439393239 Feb 9 10:30:42.350000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.350000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.350000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.350000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.350000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.350000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.350000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.350000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.350000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.350000 audit: BPF prog-id=146 op=LOAD Feb 9 10:30:42.350000 audit[3847]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d7c28 items=0 ppid=3126 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:42.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373866313832323937623336313030326262316331383439393239 Feb 9 10:30:42.603000 audit: BPF prog-id=146 op=UNLOAD Feb 9 10:30:42.603000 audit: BPF prog-id=145 op=UNLOAD Feb 9 10:30:42.603000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.603000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.603000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.603000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.603000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.603000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.603000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.603000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.603000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.603000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:42.603000 audit: BPF prog-id=147 op=LOAD Feb 9 10:30:42.603000 audit[3847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d7cb8 items=0 ppid=3126 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:42.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373866313832323937623336313030326262316331383439393239 Feb 9 10:30:43.071798 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 10:30:43.071834 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 10:30:43.203885 kubelet[2567]: I0209 10:30:43.203868 2567 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-nrqdd" podStartSLOduration=2.281387983 podCreationTimestamp="2024-02-09 10:29:34 +0000 UTC" firstStartedPulling="2024-02-09 10:29:35.298800806 +0000 UTC m=+18.415713627" lastFinishedPulling="2024-02-09 10:30:42.221255623 +0000 UTC m=+85.338168445" observedRunningTime="2024-02-09 10:30:43.203621616 +0000 UTC m=+86.320534451" watchObservedRunningTime="2024-02-09 10:30:43.203842801 +0000 UTC m=+86.320755621" Feb 9 10:30:44.208000 audit[3997]: AVC avc: denied { write } for pid=3997 comm="tee" name="fd" dev="proc" ino=31629 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:30:44.208000 audit[3997]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5e9f5965 a2=241 a3=1b6 items=1 ppid=3957 pid=3997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.208000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 10:30:44.208000 audit: PATH item=0 name="/dev/fd/63" inode=31626 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:30:44.208000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:30:44.208000 audit[4001]: AVC avc: denied { write } for pid=4001 comm="tee" name="fd" dev="proc" ino=42130 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:30:44.208000 audit[4001]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdca56f977 a2=241 a3=1b6 items=1 ppid=3958 pid=4001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.208000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 10:30:44.208000 audit: PATH item=0 name="/dev/fd/63" inode=41204 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:30:44.208000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:30:44.208000 audit[4003]: AVC avc: denied { write } for pid=4003 comm="tee" name="fd" dev="proc" ino=41207 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:30:44.208000 audit[4003]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe609a4966 a2=241 a3=1b6 items=1 ppid=3959 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.208000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 10:30:44.208000 audit: PATH item=0 name="/dev/fd/63" inode=32452 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:30:44.208000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:30:44.208000 audit[4004]: AVC avc: denied { write } for pid=4004 comm="tee" name="fd" dev="proc" ino=32455 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:30:44.208000 audit[4004]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe60ed6976 a2=241 a3=1b6 items=1 ppid=3962 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.208000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 10:30:44.208000 audit: PATH item=0 name="/dev/fd/63" inode=35702 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:30:44.208000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:30:44.208000 audit[3996]: AVC avc: denied { write } for pid=3996 comm="tee" name="fd" dev="proc" ino=9188 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:30:44.208000 audit[3996]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcddbe975 a2=241 a3=1b6 items=1 ppid=3960 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.208000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 10:30:44.208000 audit: PATH item=0 name="/dev/fd/63" inode=42127 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:30:44.208000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:30:44.209000 audit[4008]: AVC avc: denied { write } for pid=4008 comm="tee" name="fd" dev="proc" ino=15360 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:30:44.209000 audit[4008]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe705d0975 a2=241 a3=1b6 items=1 ppid=3964 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.209000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 10:30:44.209000 audit: PATH item=0 name="/dev/fd/63" inode=35703 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:30:44.209000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:30:44.209000 audit[4031]: AVC avc: denied { write } for pid=4031 comm="tee" name="fd" dev="proc" ino=38397 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:30:44.209000 audit[4031]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff68b03975 a2=241 a3=1b6 items=1 ppid=3963 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.209000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 10:30:44.209000 audit: PATH item=0 name="/dev/fd/63" inode=31631 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:30:44.209000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit: BPF prog-id=148 op=LOAD Feb 9 10:30:44.301000 audit[4159]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0b8adb00 a2=70 a3=7fc926607000 items=0 ppid=3972 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.301000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:30:44.301000 audit: BPF prog-id=148 op=UNLOAD Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit: BPF prog-id=149 op=LOAD Feb 9 10:30:44.301000 audit[4159]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0b8adb00 a2=70 a3=6e items=0 ppid=3972 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.301000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:30:44.301000 audit: BPF prog-id=149 op=UNLOAD Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff0b8adab0 a2=70 a3=7fff0b8adb00 items=0 ppid=3972 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.301000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit: BPF prog-id=150 op=LOAD Feb 9 10:30:44.301000 audit[4159]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff0b8ada90 a2=70 a3=7fff0b8adb00 items=0 ppid=3972 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.301000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:30:44.301000 audit: BPF prog-id=150 op=UNLOAD Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0b8adb70 a2=70 a3=0 items=0 ppid=3972 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.301000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0b8adb60 a2=70 a3=0 items=0 ppid=3972 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.301000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:30:44.301000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.301000 audit[4159]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff0b8adba0 a2=70 a3=0 items=0 ppid=3972 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.301000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:30:44.302000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.302000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.302000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.302000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.302000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.302000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.302000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.302000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.302000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.302000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.302000 audit: BPF prog-id=151 op=LOAD Feb 9 10:30:44.302000 audit[4159]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff0b8adac0 a2=70 a3=ffffffff items=0 ppid=3972 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.302000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:30:44.303000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.303000 audit[4163]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4ad8b590 a2=70 a3=fff80800 items=0 ppid=3972 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.303000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 10:30:44.303000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:44.303000 audit[4163]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4ad8b460 a2=70 a3=3 items=0 ppid=3972 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.303000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 10:30:44.318000 audit: BPF prog-id=151 op=UNLOAD Feb 9 10:30:44.342000 audit[4218]: NETFILTER_CFG table=mangle:95 family=2 entries=19 op=nft_register_chain pid=4218 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:30:44.342000 audit[4218]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff77768ea0 a2=0 a3=7fff77768e8c items=0 ppid=3972 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.342000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:30:44.343000 audit[4217]: NETFILTER_CFG table=raw:96 family=2 entries=19 op=nft_register_chain pid=4217 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:30:44.343000 audit[4217]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc03e323c0 a2=0 a3=55ab72aff000 items=0 ppid=3972 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.343000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:30:44.344000 audit[4220]: NETFILTER_CFG table=nat:97 family=2 entries=16 op=nft_register_chain pid=4220 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:30:44.344000 audit[4220]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd31832a20 a2=0 a3=55ca9b61e000 items=0 ppid=3972 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.344000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:30:44.345000 audit[4221]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=4221 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:30:44.345000 audit[4221]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffc04149ca0 a2=0 a3=556ea10f5000 items=0 ppid=3972 pid=4221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:44.345000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:30:45.293163 systemd-networkd[1329]: vxlan.calico: Link UP Feb 9 10:30:45.293175 systemd-networkd[1329]: vxlan.calico: Gained carrier Feb 9 10:30:46.634655 systemd-networkd[1329]: vxlan.calico: Gained IPv6LL Feb 9 10:30:46.940968 env[1477]: time="2024-02-09T10:30:46.940748216Z" level=info msg="StopPodSandbox for \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\"" Feb 9 10:30:47.043143 env[1477]: 2024-02-09 10:30:47.014 [INFO][4247] k8s.go 578: Cleaning up netns ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:30:47.043143 env[1477]: 2024-02-09 10:30:47.014 [INFO][4247] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" iface="eth0" netns="/var/run/netns/cni-c0ab456e-1ef7-45ca-6fe8-de99f33e12b9" Feb 9 10:30:47.043143 env[1477]: 2024-02-09 10:30:47.014 [INFO][4247] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" iface="eth0" netns="/var/run/netns/cni-c0ab456e-1ef7-45ca-6fe8-de99f33e12b9" Feb 9 10:30:47.043143 env[1477]: 2024-02-09 10:30:47.014 [INFO][4247] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" iface="eth0" netns="/var/run/netns/cni-c0ab456e-1ef7-45ca-6fe8-de99f33e12b9" Feb 9 10:30:47.043143 env[1477]: 2024-02-09 10:30:47.014 [INFO][4247] k8s.go 585: Releasing IP address(es) ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:30:47.043143 env[1477]: 2024-02-09 10:30:47.014 [INFO][4247] utils.go 188: Calico CNI releasing IP address ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:30:47.043143 env[1477]: 2024-02-09 10:30:47.032 [INFO][4264] ipam_plugin.go 415: Releasing address using handleID ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" HandleID="k8s-pod-network.3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:30:47.043143 env[1477]: 2024-02-09 10:30:47.032 [INFO][4264] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:30:47.043143 env[1477]: 2024-02-09 10:30:47.032 [INFO][4264] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:30:47.043143 env[1477]: 2024-02-09 10:30:47.039 [WARNING][4264] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" HandleID="k8s-pod-network.3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:30:47.043143 env[1477]: 2024-02-09 10:30:47.039 [INFO][4264] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" HandleID="k8s-pod-network.3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:30:47.043143 env[1477]: 2024-02-09 10:30:47.041 [INFO][4264] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:30:47.043143 env[1477]: 2024-02-09 10:30:47.042 [INFO][4247] k8s.go 591: Teardown processing complete. ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:30:47.043678 env[1477]: time="2024-02-09T10:30:47.043228973Z" level=info msg="TearDown network for sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\" successfully" Feb 9 10:30:47.043678 env[1477]: time="2024-02-09T10:30:47.043266161Z" level=info msg="StopPodSandbox for \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\" returns successfully" Feb 9 10:30:47.043958 env[1477]: time="2024-02-09T10:30:47.043897880Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-n448j,Uid:c7848516-42cb-4d0b-a613-4255f9428103,Namespace:kube-system,Attempt:1,}" Feb 9 10:30:47.046321 systemd[1]: run-netns-cni\x2dc0ab456e\x2d1ef7\x2d45ca\x2d6fe8\x2dde99f33e12b9.mount: Deactivated successfully. Feb 9 10:30:47.139746 systemd-networkd[1329]: cali88f8e0b5ed6: Link UP Feb 9 10:30:47.196257 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:30:47.196299 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali88f8e0b5ed6: link becomes ready Feb 9 10:30:47.196276 systemd-networkd[1329]: cali88f8e0b5ed6: Gained carrier Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.079 [INFO][4280] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0 coredns-5dd5756b68- kube-system c7848516-42cb-4d0b-a613-4255f9428103 769 0 2024-02-09 10:29:30 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-970bb49438 coredns-5dd5756b68-n448j eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali88f8e0b5ed6 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" Namespace="kube-system" Pod="coredns-5dd5756b68-n448j" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-" Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.079 [INFO][4280] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" Namespace="kube-system" Pod="coredns-5dd5756b68-n448j" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.102 [INFO][4302] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" HandleID="k8s-pod-network.a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.112 [INFO][4302] ipam_plugin.go 268: Auto assigning IP ContainerID="a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" HandleID="k8s-pod-network.a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000835500), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-970bb49438", "pod":"coredns-5dd5756b68-n448j", "timestamp":"2024-02-09 10:30:47.102577973 +0000 UTC"}, Hostname:"ci-3510.3.2-a-970bb49438", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.112 [INFO][4302] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.112 [INFO][4302] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.112 [INFO][4302] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-970bb49438' Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.114 [INFO][4302] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.118 [INFO][4302] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.122 [INFO][4302] ipam.go 489: Trying affinity for 192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.123 [INFO][4302] ipam.go 155: Attempting to load block cidr=192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.126 [INFO][4302] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.126 [INFO][4302] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.64/26 handle="k8s-pod-network.a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.127 [INFO][4302] ipam.go 1682: Creating new handle: k8s-pod-network.a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564 Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.131 [INFO][4302] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.64/26 handle="k8s-pod-network.a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.135 [INFO][4302] ipam.go 1216: Successfully claimed IPs: [192.168.121.65/26] block=192.168.121.64/26 handle="k8s-pod-network.a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.135 [INFO][4302] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.65/26] handle="k8s-pod-network.a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.135 [INFO][4302] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:30:47.201754 env[1477]: 2024-02-09 10:30:47.135 [INFO][4302] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.65/26] IPv6=[] ContainerID="a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" HandleID="k8s-pod-network.a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:30:47.202174 env[1477]: 2024-02-09 10:30:47.138 [INFO][4280] k8s.go 385: Populated endpoint ContainerID="a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" Namespace="kube-system" Pod="coredns-5dd5756b68-n448j" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c7848516-42cb-4d0b-a613-4255f9428103", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"", Pod:"coredns-5dd5756b68-n448j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali88f8e0b5ed6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:30:47.202174 env[1477]: 2024-02-09 10:30:47.138 [INFO][4280] k8s.go 386: Calico CNI using IPs: [192.168.121.65/32] ContainerID="a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" Namespace="kube-system" Pod="coredns-5dd5756b68-n448j" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:30:47.202174 env[1477]: 2024-02-09 10:30:47.138 [INFO][4280] dataplane_linux.go 68: Setting the host side veth name to cali88f8e0b5ed6 ContainerID="a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" Namespace="kube-system" Pod="coredns-5dd5756b68-n448j" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:30:47.202174 env[1477]: 2024-02-09 10:30:47.196 [INFO][4280] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" Namespace="kube-system" Pod="coredns-5dd5756b68-n448j" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:30:47.202174 env[1477]: 2024-02-09 10:30:47.196 [INFO][4280] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" Namespace="kube-system" Pod="coredns-5dd5756b68-n448j" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c7848516-42cb-4d0b-a613-4255f9428103", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564", Pod:"coredns-5dd5756b68-n448j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali88f8e0b5ed6", MAC:"ae:67:ed:94:5d:9d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:30:47.202174 env[1477]: 2024-02-09 10:30:47.200 [INFO][4280] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564" Namespace="kube-system" Pod="coredns-5dd5756b68-n448j" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:30:47.207668 env[1477]: time="2024-02-09T10:30:47.207597688Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:30:47.207668 env[1477]: time="2024-02-09T10:30:47.207622322Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:30:47.207668 env[1477]: time="2024-02-09T10:30:47.207633838Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:30:47.207790 env[1477]: time="2024-02-09T10:30:47.207699340Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564 pid=4343 runtime=io.containerd.runc.v2 Feb 9 10:30:47.207000 audit[4351]: NETFILTER_CFG table=filter:99 family=2 entries=36 op=nft_register_chain pid=4351 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:30:47.207000 audit[4351]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fffe6db1a50 a2=0 a3=7fffe6db1a3c items=0 ppid=3972 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:47.207000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:30:47.226511 systemd[1]: Started cri-containerd-a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564.scope. Feb 9 10:30:47.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.229000 audit: BPF prog-id=152 op=LOAD Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4343 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:47.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130336464653164623031326333653765613138656362313032653962 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4343 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:47.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130336464653164623031326333653765613138656362313032653962 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit: BPF prog-id=153 op=LOAD Feb 9 10:30:47.230000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000304d70 items=0 ppid=4343 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:47.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130336464653164623031326333653765613138656362313032653962 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit: BPF prog-id=154 op=LOAD Feb 9 10:30:47.230000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000304db8 items=0 ppid=4343 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:47.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130336464653164623031326333653765613138656362313032653962 Feb 9 10:30:47.230000 audit: BPF prog-id=154 op=UNLOAD Feb 9 10:30:47.230000 audit: BPF prog-id=153 op=UNLOAD Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.230000 audit: BPF prog-id=155 op=LOAD Feb 9 10:30:47.230000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003051c8 items=0 ppid=4343 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:47.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130336464653164623031326333653765613138656362313032653962 Feb 9 10:30:47.258971 env[1477]: time="2024-02-09T10:30:47.258946237Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-n448j,Uid:c7848516-42cb-4d0b-a613-4255f9428103,Namespace:kube-system,Attempt:1,} returns sandbox id \"a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564\"" Feb 9 10:30:47.260209 env[1477]: time="2024-02-09T10:30:47.260197046Z" level=info msg="CreateContainer within sandbox \"a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 10:30:47.264454 env[1477]: time="2024-02-09T10:30:47.264439681Z" level=info msg="CreateContainer within sandbox \"a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0f900e4c444386271025314745129bf449fe1c75041c2f1ffe3361bfa8b6f48e\"" Feb 9 10:30:47.264658 env[1477]: time="2024-02-09T10:30:47.264647161Z" level=info msg="StartContainer for \"0f900e4c444386271025314745129bf449fe1c75041c2f1ffe3361bfa8b6f48e\"" Feb 9 10:30:47.285976 systemd[1]: Started cri-containerd-0f900e4c444386271025314745129bf449fe1c75041c2f1ffe3361bfa8b6f48e.scope. Feb 9 10:30:47.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.321506 kernel: kauditd_printk_skb: 211 callbacks suppressed Feb 9 10:30:47.321590 kernel: audit: type=1400 audit(1707474647.293:1203): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.446590 kernel: audit: type=1400 audit(1707474647.293:1204): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.446622 kernel: audit: type=1400 audit(1707474647.293:1205): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.509212 kernel: audit: type=1400 audit(1707474647.293:1206): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.572278 kernel: audit: type=1400 audit(1707474647.293:1207): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.635206 kernel: audit: type=1400 audit(1707474647.293:1208): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.698253 kernel: audit: type=1400 audit(1707474647.293:1209): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.761220 kernel: audit: type=1400 audit(1707474647.293:1210): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.824241 kernel: audit: type=1400 audit(1707474647.293:1211): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.886811 kernel: audit: type=1400 audit(1707474647.382:1212): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.382000 audit: BPF prog-id=156 op=LOAD Feb 9 10:30:47.382000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.382000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4343 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:47.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066393030653463343434333836323731303235333134373435313239 Feb 9 10:30:47.382000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.382000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4343 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:47.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066393030653463343434333836323731303235333134373435313239 Feb 9 10:30:47.383000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.383000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.383000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.383000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.383000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.383000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.383000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.383000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.383000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.383000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.383000 audit: BPF prog-id=157 op=LOAD Feb 9 10:30:47.383000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003b0120 items=0 ppid=4343 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:47.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066393030653463343434333836323731303235333134373435313239 Feb 9 10:30:47.507000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.507000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.507000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.507000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.507000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.507000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.507000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.507000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.507000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.507000 audit: BPF prog-id=158 op=LOAD Feb 9 10:30:47.507000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003b0168 items=0 ppid=4343 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:47.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066393030653463343434333836323731303235333134373435313239 Feb 9 10:30:47.633000 audit: BPF prog-id=158 op=UNLOAD Feb 9 10:30:47.633000 audit: BPF prog-id=157 op=UNLOAD Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c000197c30 a2=78 a3=c0003b0578 items=0 ppid=4343 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:47.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066393030653463343434333836323731303235333134373435313239 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:47.633000 audit: BPF prog-id=159 op=LOAD Feb 9 10:30:47.633000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b0578 items=0 ppid=4343 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:47.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066393030653463343434333836323731303235333134373435313239 Feb 9 10:30:47.980745 env[1477]: time="2024-02-09T10:30:47.980689711Z" level=info msg="StartContainer for \"0f900e4c444386271025314745129bf449fe1c75041c2f1ffe3361bfa8b6f48e\" returns successfully" Feb 9 10:30:48.257963 kubelet[2567]: I0209 10:30:48.257892 2567 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-n448j" podStartSLOduration=78.257750381 podCreationTimestamp="2024-02-09 10:29:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:30:48.233748164 +0000 UTC m=+91.350661054" watchObservedRunningTime="2024-02-09 10:30:48.257750381 +0000 UTC m=+91.374663259" Feb 9 10:30:48.258000 audit[4424]: NETFILTER_CFG table=filter:100 family=2 entries=14 op=nft_register_rule pid=4424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:48.258000 audit[4424]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffcf32c9340 a2=0 a3=7ffcf32c932c items=0 ppid=2840 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:48.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:48.260000 audit[4424]: NETFILTER_CFG table=nat:101 family=2 entries=14 op=nft_register_rule pid=4424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:48.260000 audit[4424]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffcf32c9340 a2=0 a3=31030 items=0 ppid=2840 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:48.260000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:48.279000 audit[4426]: NETFILTER_CFG table=filter:102 family=2 entries=11 op=nft_register_rule pid=4426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:48.279000 audit[4426]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdb2d6b150 a2=0 a3=7ffdb2d6b13c items=0 ppid=2840 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:48.279000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:48.289000 audit[4426]: NETFILTER_CFG table=nat:103 family=2 entries=35 op=nft_register_chain pid=4426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:48.289000 audit[4426]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffdb2d6b150 a2=0 a3=7ffdb2d6b13c items=0 ppid=2840 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:48.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:49.066613 systemd-networkd[1329]: cali88f8e0b5ed6: Gained IPv6LL Feb 9 10:30:50.941154 env[1477]: time="2024-02-09T10:30:50.941032446Z" level=info msg="StopPodSandbox for \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\"" Feb 9 10:30:50.993097 env[1477]: 2024-02-09 10:30:50.974 [INFO][4450] k8s.go 578: Cleaning up netns ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:30:50.993097 env[1477]: 2024-02-09 10:30:50.974 [INFO][4450] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" iface="eth0" netns="/var/run/netns/cni-88a15b41-ab16-89e1-9556-064c8dc03915" Feb 9 10:30:50.993097 env[1477]: 2024-02-09 10:30:50.975 [INFO][4450] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" iface="eth0" netns="/var/run/netns/cni-88a15b41-ab16-89e1-9556-064c8dc03915" Feb 9 10:30:50.993097 env[1477]: 2024-02-09 10:30:50.975 [INFO][4450] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" iface="eth0" netns="/var/run/netns/cni-88a15b41-ab16-89e1-9556-064c8dc03915" Feb 9 10:30:50.993097 env[1477]: 2024-02-09 10:30:50.975 [INFO][4450] k8s.go 585: Releasing IP address(es) ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:30:50.993097 env[1477]: 2024-02-09 10:30:50.975 [INFO][4450] utils.go 188: Calico CNI releasing IP address ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:30:50.993097 env[1477]: 2024-02-09 10:30:50.986 [INFO][4465] ipam_plugin.go 415: Releasing address using handleID ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" HandleID="k8s-pod-network.fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Workload="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:30:50.993097 env[1477]: 2024-02-09 10:30:50.986 [INFO][4465] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:30:50.993097 env[1477]: 2024-02-09 10:30:50.986 [INFO][4465] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:30:50.993097 env[1477]: 2024-02-09 10:30:50.990 [WARNING][4465] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" HandleID="k8s-pod-network.fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Workload="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:30:50.993097 env[1477]: 2024-02-09 10:30:50.990 [INFO][4465] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" HandleID="k8s-pod-network.fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Workload="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:30:50.993097 env[1477]: 2024-02-09 10:30:50.991 [INFO][4465] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:30:50.993097 env[1477]: 2024-02-09 10:30:50.992 [INFO][4450] k8s.go 591: Teardown processing complete. ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:30:50.993443 env[1477]: time="2024-02-09T10:30:50.993134444Z" level=info msg="TearDown network for sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\" successfully" Feb 9 10:30:50.993443 env[1477]: time="2024-02-09T10:30:50.993156344Z" level=info msg="StopPodSandbox for \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\" returns successfully" Feb 9 10:30:50.993601 env[1477]: time="2024-02-09T10:30:50.993555381Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tcmq8,Uid:126ee306-c62d-4960-a4cb-21b7a8caba1f,Namespace:calico-system,Attempt:1,}" Feb 9 10:30:50.995430 systemd[1]: run-netns-cni\x2d88a15b41\x2dab16\x2d89e1\x2d9556\x2d064c8dc03915.mount: Deactivated successfully. Feb 9 10:30:51.058196 systemd-networkd[1329]: cali4a22dd0c80c: Link UP Feb 9 10:30:51.113567 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:30:51.113616 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4a22dd0c80c: link becomes ready Feb 9 10:30:51.113654 systemd-networkd[1329]: cali4a22dd0c80c: Gained carrier Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.015 [INFO][4478] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0 csi-node-driver- calico-system 126ee306-c62d-4960-a4cb-21b7a8caba1f 792 0 2024-02-09 10:29:34 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-970bb49438 csi-node-driver-tcmq8 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali4a22dd0c80c [] []}} ContainerID="2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" Namespace="calico-system" Pod="csi-node-driver-tcmq8" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-" Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.015 [INFO][4478] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" Namespace="calico-system" Pod="csi-node-driver-tcmq8" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.030 [INFO][4502] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" HandleID="k8s-pod-network.2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" Workload="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.037 [INFO][4502] ipam_plugin.go 268: Auto assigning IP ContainerID="2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" HandleID="k8s-pod-network.2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" Workload="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b47c0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-970bb49438", "pod":"csi-node-driver-tcmq8", "timestamp":"2024-02-09 10:30:51.030329397 +0000 UTC"}, Hostname:"ci-3510.3.2-a-970bb49438", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.037 [INFO][4502] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.037 [INFO][4502] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.037 [INFO][4502] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-970bb49438' Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.038 [INFO][4502] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.041 [INFO][4502] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.045 [INFO][4502] ipam.go 489: Trying affinity for 192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.046 [INFO][4502] ipam.go 155: Attempting to load block cidr=192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.048 [INFO][4502] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.048 [INFO][4502] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.64/26 handle="k8s-pod-network.2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.050 [INFO][4502] ipam.go 1682: Creating new handle: k8s-pod-network.2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.053 [INFO][4502] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.64/26 handle="k8s-pod-network.2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.056 [INFO][4502] ipam.go 1216: Successfully claimed IPs: [192.168.121.66/26] block=192.168.121.64/26 handle="k8s-pod-network.2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.056 [INFO][4502] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.66/26] handle="k8s-pod-network.2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.056 [INFO][4502] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:30:51.119229 env[1477]: 2024-02-09 10:30:51.056 [INFO][4502] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.66/26] IPv6=[] ContainerID="2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" HandleID="k8s-pod-network.2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" Workload="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:30:51.119710 env[1477]: 2024-02-09 10:30:51.057 [INFO][4478] k8s.go 385: Populated endpoint ContainerID="2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" Namespace="calico-system" Pod="csi-node-driver-tcmq8" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"126ee306-c62d-4960-a4cb-21b7a8caba1f", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"", Pod:"csi-node-driver-tcmq8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4a22dd0c80c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:30:51.119710 env[1477]: 2024-02-09 10:30:51.057 [INFO][4478] k8s.go 386: Calico CNI using IPs: [192.168.121.66/32] ContainerID="2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" Namespace="calico-system" Pod="csi-node-driver-tcmq8" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:30:51.119710 env[1477]: 2024-02-09 10:30:51.057 [INFO][4478] dataplane_linux.go 68: Setting the host side veth name to cali4a22dd0c80c ContainerID="2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" Namespace="calico-system" Pod="csi-node-driver-tcmq8" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:30:51.119710 env[1477]: 2024-02-09 10:30:51.113 [INFO][4478] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" Namespace="calico-system" Pod="csi-node-driver-tcmq8" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:30:51.119710 env[1477]: 2024-02-09 10:30:51.113 [INFO][4478] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" Namespace="calico-system" Pod="csi-node-driver-tcmq8" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"126ee306-c62d-4960-a4cb-21b7a8caba1f", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df", Pod:"csi-node-driver-tcmq8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4a22dd0c80c", MAC:"fe:77:e8:e1:51:32", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:30:51.119710 env[1477]: 2024-02-09 10:30:51.118 [INFO][4478] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df" Namespace="calico-system" Pod="csi-node-driver-tcmq8" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:30:51.124454 env[1477]: time="2024-02-09T10:30:51.124381208Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:30:51.124454 env[1477]: time="2024-02-09T10:30:51.124403505Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:30:51.124454 env[1477]: time="2024-02-09T10:30:51.124410164Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:30:51.124577 env[1477]: time="2024-02-09T10:30:51.124485832Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df pid=4542 runtime=io.containerd.runc.v2 Feb 9 10:30:51.123000 audit[4544]: NETFILTER_CFG table=filter:104 family=2 entries=40 op=nft_register_chain pid=4544 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:30:51.123000 audit[4544]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffdebb18130 a2=0 a3=7ffdebb1811c items=0 ppid=3972 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:51.123000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:30:51.143224 systemd[1]: Started cri-containerd-2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df.scope. Feb 9 10:30:51.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit: BPF prog-id=160 op=LOAD Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4542 pid=4553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:51.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265653465323238326136346532613261323730366639333033343331 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4542 pid=4553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:51.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265653465323238326136346532613261323730366639333033343331 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit: BPF prog-id=161 op=LOAD Feb 9 10:30:51.146000 audit[4553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001ddd70 items=0 ppid=4542 pid=4553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:51.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265653465323238326136346532613261323730366639333033343331 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit: BPF prog-id=162 op=LOAD Feb 9 10:30:51.146000 audit[4553]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001dddb8 items=0 ppid=4542 pid=4553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:51.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265653465323238326136346532613261323730366639333033343331 Feb 9 10:30:51.146000 audit: BPF prog-id=162 op=UNLOAD Feb 9 10:30:51.146000 audit: BPF prog-id=161 op=UNLOAD Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:51.146000 audit: BPF prog-id=163 op=LOAD Feb 9 10:30:51.146000 audit[4553]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003121c8 items=0 ppid=4542 pid=4553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:51.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265653465323238326136346532613261323730366639333033343331 Feb 9 10:30:51.165681 env[1477]: time="2024-02-09T10:30:51.165624327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tcmq8,Uid:126ee306-c62d-4960-a4cb-21b7a8caba1f,Namespace:calico-system,Attempt:1,} returns sandbox id \"2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df\"" Feb 9 10:30:51.166462 env[1477]: time="2024-02-09T10:30:51.166448196Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 10:30:51.940714 env[1477]: time="2024-02-09T10:30:51.940587782Z" level=info msg="StopPodSandbox for \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\"" Feb 9 10:30:51.940714 env[1477]: time="2024-02-09T10:30:51.940588223Z" level=info msg="StopPodSandbox for \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\"" Feb 9 10:30:51.996166 env[1477]: 2024-02-09 10:30:51.976 [INFO][4609] k8s.go 578: Cleaning up netns ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:30:51.996166 env[1477]: 2024-02-09 10:30:51.977 [INFO][4609] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" iface="eth0" netns="/var/run/netns/cni-41735a50-b65c-3a12-a3a6-5f7b6cebfd51" Feb 9 10:30:51.996166 env[1477]: 2024-02-09 10:30:51.977 [INFO][4609] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" iface="eth0" netns="/var/run/netns/cni-41735a50-b65c-3a12-a3a6-5f7b6cebfd51" Feb 9 10:30:51.996166 env[1477]: 2024-02-09 10:30:51.977 [INFO][4609] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" iface="eth0" netns="/var/run/netns/cni-41735a50-b65c-3a12-a3a6-5f7b6cebfd51" Feb 9 10:30:51.996166 env[1477]: 2024-02-09 10:30:51.977 [INFO][4609] k8s.go 585: Releasing IP address(es) ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:30:51.996166 env[1477]: 2024-02-09 10:30:51.977 [INFO][4609] utils.go 188: Calico CNI releasing IP address ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:30:51.996166 env[1477]: 2024-02-09 10:30:51.989 [INFO][4642] ipam_plugin.go 415: Releasing address using handleID ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" HandleID="k8s-pod-network.8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:30:51.996166 env[1477]: 2024-02-09 10:30:51.989 [INFO][4642] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:30:51.996166 env[1477]: 2024-02-09 10:30:51.989 [INFO][4642] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:30:51.996166 env[1477]: 2024-02-09 10:30:51.993 [WARNING][4642] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" HandleID="k8s-pod-network.8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:30:51.996166 env[1477]: 2024-02-09 10:30:51.993 [INFO][4642] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" HandleID="k8s-pod-network.8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:30:51.996166 env[1477]: 2024-02-09 10:30:51.994 [INFO][4642] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:30:51.996166 env[1477]: 2024-02-09 10:30:51.995 [INFO][4609] k8s.go 591: Teardown processing complete. ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:30:51.996791 env[1477]: time="2024-02-09T10:30:51.996258058Z" level=info msg="TearDown network for sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\" successfully" Feb 9 10:30:51.996791 env[1477]: time="2024-02-09T10:30:51.996278546Z" level=info msg="StopPodSandbox for \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\" returns successfully" Feb 9 10:30:51.996791 env[1477]: time="2024-02-09T10:30:51.996765068Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bf886ccf-xc4cm,Uid:8b59bdd9-a462-4d83-aca6-3cef1fd58c5f,Namespace:calico-system,Attempt:1,}" Feb 9 10:30:51.998301 systemd[1]: run-netns-cni\x2d41735a50\x2db65c\x2d3a12\x2da3a6\x2d5f7b6cebfd51.mount: Deactivated successfully. Feb 9 10:30:52.001911 env[1477]: 2024-02-09 10:30:51.978 [INFO][4608] k8s.go 578: Cleaning up netns ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:30:52.001911 env[1477]: 2024-02-09 10:30:51.978 [INFO][4608] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" iface="eth0" netns="/var/run/netns/cni-87d1b9a2-f09f-e642-8312-dde722287b8e" Feb 9 10:30:52.001911 env[1477]: 2024-02-09 10:30:51.978 [INFO][4608] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" iface="eth0" netns="/var/run/netns/cni-87d1b9a2-f09f-e642-8312-dde722287b8e" Feb 9 10:30:52.001911 env[1477]: 2024-02-09 10:30:51.978 [INFO][4608] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" iface="eth0" netns="/var/run/netns/cni-87d1b9a2-f09f-e642-8312-dde722287b8e" Feb 9 10:30:52.001911 env[1477]: 2024-02-09 10:30:51.978 [INFO][4608] k8s.go 585: Releasing IP address(es) ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:30:52.001911 env[1477]: 2024-02-09 10:30:51.978 [INFO][4608] utils.go 188: Calico CNI releasing IP address ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:30:52.001911 env[1477]: 2024-02-09 10:30:51.989 [INFO][4647] ipam_plugin.go 415: Releasing address using handleID ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" HandleID="k8s-pod-network.5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:30:52.001911 env[1477]: 2024-02-09 10:30:51.989 [INFO][4647] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:30:52.001911 env[1477]: 2024-02-09 10:30:51.994 [INFO][4647] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:30:52.001911 env[1477]: 2024-02-09 10:30:51.999 [WARNING][4647] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" HandleID="k8s-pod-network.5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:30:52.001911 env[1477]: 2024-02-09 10:30:51.999 [INFO][4647] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" HandleID="k8s-pod-network.5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:30:52.001911 env[1477]: 2024-02-09 10:30:52.000 [INFO][4647] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:30:52.001911 env[1477]: 2024-02-09 10:30:52.001 [INFO][4608] k8s.go 591: Teardown processing complete. ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:30:52.002217 env[1477]: time="2024-02-09T10:30:52.001978865Z" level=info msg="TearDown network for sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\" successfully" Feb 9 10:30:52.002217 env[1477]: time="2024-02-09T10:30:52.002012325Z" level=info msg="StopPodSandbox for \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\" returns successfully" Feb 9 10:30:52.002414 env[1477]: time="2024-02-09T10:30:52.002395143Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-r7qwv,Uid:82361235-1b05-45af-a533-456da0162fc6,Namespace:kube-system,Attempt:1,}" Feb 9 10:30:52.005493 systemd[1]: run-netns-cni\x2d87d1b9a2\x2df09f\x2de642\x2d8312\x2ddde722287b8e.mount: Deactivated successfully. Feb 9 10:30:52.055724 systemd-networkd[1329]: calia90cda8ca64: Link UP Feb 9 10:30:52.083606 systemd-networkd[1329]: calia90cda8ca64: Gained carrier Feb 9 10:30:52.084347 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia90cda8ca64: link becomes ready Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.017 [INFO][4673] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0 calico-kube-controllers-7bf886ccf- calico-system 8b59bdd9-a462-4d83-aca6-3cef1fd58c5f 799 0 2024-02-09 10:29:35 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7bf886ccf projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-970bb49438 calico-kube-controllers-7bf886ccf-xc4cm eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calia90cda8ca64 [] []}} ContainerID="e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" Namespace="calico-system" Pod="calico-kube-controllers-7bf886ccf-xc4cm" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-" Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.017 [INFO][4673] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" Namespace="calico-system" Pod="calico-kube-controllers-7bf886ccf-xc4cm" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.030 [INFO][4696] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" HandleID="k8s-pod-network.e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.037 [INFO][4696] ipam_plugin.go 268: Auto assigning IP ContainerID="e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" HandleID="k8s-pod-network.e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050d70), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-970bb49438", "pod":"calico-kube-controllers-7bf886ccf-xc4cm", "timestamp":"2024-02-09 10:30:52.030542099 +0000 UTC"}, Hostname:"ci-3510.3.2-a-970bb49438", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.037 [INFO][4696] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.037 [INFO][4696] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.037 [INFO][4696] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-970bb49438' Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.038 [INFO][4696] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.041 [INFO][4696] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.044 [INFO][4696] ipam.go 489: Trying affinity for 192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.045 [INFO][4696] ipam.go 155: Attempting to load block cidr=192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.047 [INFO][4696] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.047 [INFO][4696] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.64/26 handle="k8s-pod-network.e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.048 [INFO][4696] ipam.go 1682: Creating new handle: k8s-pod-network.e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.050 [INFO][4696] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.64/26 handle="k8s-pod-network.e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.054 [INFO][4696] ipam.go 1216: Successfully claimed IPs: [192.168.121.67/26] block=192.168.121.64/26 handle="k8s-pod-network.e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.054 [INFO][4696] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.67/26] handle="k8s-pod-network.e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.054 [INFO][4696] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:30:52.088224 env[1477]: 2024-02-09 10:30:52.054 [INFO][4696] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.67/26] IPv6=[] ContainerID="e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" HandleID="k8s-pod-network.e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:30:52.088726 env[1477]: 2024-02-09 10:30:52.054 [INFO][4673] k8s.go 385: Populated endpoint ContainerID="e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" Namespace="calico-system" Pod="calico-kube-controllers-7bf886ccf-xc4cm" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0", GenerateName:"calico-kube-controllers-7bf886ccf-", Namespace:"calico-system", SelfLink:"", UID:"8b59bdd9-a462-4d83-aca6-3cef1fd58c5f", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bf886ccf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"", Pod:"calico-kube-controllers-7bf886ccf-xc4cm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.121.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia90cda8ca64", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:30:52.088726 env[1477]: 2024-02-09 10:30:52.054 [INFO][4673] k8s.go 386: Calico CNI using IPs: [192.168.121.67/32] ContainerID="e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" Namespace="calico-system" Pod="calico-kube-controllers-7bf886ccf-xc4cm" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:30:52.088726 env[1477]: 2024-02-09 10:30:52.054 [INFO][4673] dataplane_linux.go 68: Setting the host side veth name to calia90cda8ca64 ContainerID="e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" Namespace="calico-system" Pod="calico-kube-controllers-7bf886ccf-xc4cm" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:30:52.088726 env[1477]: 2024-02-09 10:30:52.083 [INFO][4673] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" Namespace="calico-system" Pod="calico-kube-controllers-7bf886ccf-xc4cm" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:30:52.088726 env[1477]: 2024-02-09 10:30:52.083 [INFO][4673] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" Namespace="calico-system" Pod="calico-kube-controllers-7bf886ccf-xc4cm" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0", GenerateName:"calico-kube-controllers-7bf886ccf-", Namespace:"calico-system", SelfLink:"", UID:"8b59bdd9-a462-4d83-aca6-3cef1fd58c5f", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bf886ccf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c", Pod:"calico-kube-controllers-7bf886ccf-xc4cm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.121.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia90cda8ca64", MAC:"22:69:ba:5f:8a:33", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:30:52.088726 env[1477]: 2024-02-09 10:30:52.087 [INFO][4673] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c" Namespace="calico-system" Pod="calico-kube-controllers-7bf886ccf-xc4cm" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:30:52.094189 env[1477]: time="2024-02-09T10:30:52.094157673Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:30:52.094189 env[1477]: time="2024-02-09T10:30:52.094179229Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:30:52.094189 env[1477]: time="2024-02-09T10:30:52.094186164Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:30:52.094319 env[1477]: time="2024-02-09T10:30:52.094256600Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c pid=4775 runtime=io.containerd.runc.v2 Feb 9 10:30:52.092000 audit[4774]: NETFILTER_CFG table=filter:105 family=2 entries=38 op=nft_register_chain pid=4774 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:30:52.092000 audit[4774]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7ffc796dd4d0 a2=0 a3=7ffc796dd4bc items=0 ppid=3972 pid=4774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.092000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:30:52.101848 systemd-networkd[1329]: calib780f41e599: Link UP Feb 9 10:30:52.131167 systemd[1]: Started cri-containerd-e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c.scope. Feb 9 10:30:52.155208 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:30:52.155242 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib780f41e599: link becomes ready Feb 9 10:30:52.155417 systemd-networkd[1329]: calib780f41e599: Gained carrier Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.038 [INFO][4700] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0 coredns-5dd5756b68- kube-system 82361235-1b05-45af-a533-456da0162fc6 800 0 2024-02-09 10:29:30 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-970bb49438 coredns-5dd5756b68-r7qwv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib780f41e599 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" Namespace="kube-system" Pod="coredns-5dd5756b68-r7qwv" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-" Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.038 [INFO][4700] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" Namespace="kube-system" Pod="coredns-5dd5756b68-r7qwv" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.051 [INFO][4736] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" HandleID="k8s-pod-network.d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.083 [INFO][4736] ipam_plugin.go 268: Auto assigning IP ContainerID="d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" HandleID="k8s-pod-network.d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033d190), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-970bb49438", "pod":"coredns-5dd5756b68-r7qwv", "timestamp":"2024-02-09 10:30:52.051474764 +0000 UTC"}, Hostname:"ci-3510.3.2-a-970bb49438", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.084 [INFO][4736] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.084 [INFO][4736] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.084 [INFO][4736] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-970bb49438' Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.085 [INFO][4736] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.088 [INFO][4736] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.091 [INFO][4736] ipam.go 489: Trying affinity for 192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.092 [INFO][4736] ipam.go 155: Attempting to load block cidr=192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.094 [INFO][4736] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.094 [INFO][4736] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.64/26 handle="k8s-pod-network.d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.095 [INFO][4736] ipam.go 1682: Creating new handle: k8s-pod-network.d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.097 [INFO][4736] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.64/26 handle="k8s-pod-network.d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.100 [INFO][4736] ipam.go 1216: Successfully claimed IPs: [192.168.121.68/26] block=192.168.121.64/26 handle="k8s-pod-network.d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.100 [INFO][4736] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.68/26] handle="k8s-pod-network.d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" host="ci-3510.3.2-a-970bb49438" Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.100 [INFO][4736] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:30:52.161597 env[1477]: 2024-02-09 10:30:52.100 [INFO][4736] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.68/26] IPv6=[] ContainerID="d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" HandleID="k8s-pod-network.d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:30:52.162057 env[1477]: 2024-02-09 10:30:52.101 [INFO][4700] k8s.go 385: Populated endpoint ContainerID="d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" Namespace="kube-system" Pod="coredns-5dd5756b68-r7qwv" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"82361235-1b05-45af-a533-456da0162fc6", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"", Pod:"coredns-5dd5756b68-r7qwv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib780f41e599", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:30:52.162057 env[1477]: 2024-02-09 10:30:52.101 [INFO][4700] k8s.go 386: Calico CNI using IPs: [192.168.121.68/32] ContainerID="d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" Namespace="kube-system" Pod="coredns-5dd5756b68-r7qwv" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:30:52.162057 env[1477]: 2024-02-09 10:30:52.101 [INFO][4700] dataplane_linux.go 68: Setting the host side veth name to calib780f41e599 ContainerID="d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" Namespace="kube-system" Pod="coredns-5dd5756b68-r7qwv" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:30:52.162057 env[1477]: 2024-02-09 10:30:52.155 [INFO][4700] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" Namespace="kube-system" Pod="coredns-5dd5756b68-r7qwv" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:30:52.162057 env[1477]: 2024-02-09 10:30:52.155 [INFO][4700] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" Namespace="kube-system" Pod="coredns-5dd5756b68-r7qwv" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"82361235-1b05-45af-a533-456da0162fc6", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a", Pod:"coredns-5dd5756b68-r7qwv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib780f41e599", MAC:"8a:61:d2:6c:17:73", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:30:52.162057 env[1477]: 2024-02-09 10:30:52.160 [INFO][4700] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a" Namespace="kube-system" Pod="coredns-5dd5756b68-r7qwv" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:30:52.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit: BPF prog-id=164 op=LOAD Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4775 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653838626133363662656230396633623164333164663535313037 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4775 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653838626133363662656230396633623164333164663535313037 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit: BPF prog-id=165 op=LOAD Feb 9 10:30:52.162000 audit[4785]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00028a3f0 items=0 ppid=4775 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653838626133363662656230396633623164333164663535313037 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit: BPF prog-id=166 op=LOAD Feb 9 10:30:52.162000 audit[4785]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00028a438 items=0 ppid=4775 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653838626133363662656230396633623164333164663535313037 Feb 9 10:30:52.162000 audit: BPF prog-id=166 op=UNLOAD Feb 9 10:30:52.162000 audit: BPF prog-id=165 op=UNLOAD Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.162000 audit: BPF prog-id=167 op=LOAD Feb 9 10:30:52.162000 audit[4785]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00028a848 items=0 ppid=4775 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653838626133363662656230396633623164333164663535313037 Feb 9 10:30:52.166965 env[1477]: time="2024-02-09T10:30:52.166930149Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:30:52.166965 env[1477]: time="2024-02-09T10:30:52.166951659Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:30:52.166965 env[1477]: time="2024-02-09T10:30:52.166961709Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:30:52.167086 env[1477]: time="2024-02-09T10:30:52.167033887Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a pid=4821 runtime=io.containerd.runc.v2 Feb 9 10:30:52.166000 audit[4826]: NETFILTER_CFG table=filter:106 family=2 entries=38 op=nft_register_chain pid=4826 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:30:52.166000 audit[4826]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffce8cfd770 a2=0 a3=7ffce8cfd75c items=0 ppid=3972 pid=4826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.166000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:30:52.185264 systemd[1]: Started cri-containerd-d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a.scope. Feb 9 10:30:52.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.189000 audit: BPF prog-id=168 op=LOAD Feb 9 10:30:52.189000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.189000 audit[4831]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=4821 pid=4831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333137373231363432346536306130303162313535353838383231 Feb 9 10:30:52.189000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.189000 audit[4831]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=4821 pid=4831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333137373231363432346536306130303162313535353838383231 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit: BPF prog-id=169 op=LOAD Feb 9 10:30:52.190000 audit[4831]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0000a6990 items=0 ppid=4821 pid=4831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333137373231363432346536306130303162313535353838383231 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit: BPF prog-id=170 op=LOAD Feb 9 10:30:52.190000 audit[4831]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0000a69d8 items=0 ppid=4821 pid=4831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333137373231363432346536306130303162313535353838383231 Feb 9 10:30:52.190000 audit: BPF prog-id=170 op=UNLOAD Feb 9 10:30:52.190000 audit: BPF prog-id=169 op=UNLOAD Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { perfmon } for pid=4831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit[4831]: AVC avc: denied { bpf } for pid=4831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.190000 audit: BPF prog-id=171 op=LOAD Feb 9 10:30:52.190000 audit[4831]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0000a6de8 items=0 ppid=4821 pid=4831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333137373231363432346536306130303162313535353838383231 Feb 9 10:30:52.193789 env[1477]: time="2024-02-09T10:30:52.193766204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bf886ccf-xc4cm,Uid:8b59bdd9-a462-4d83-aca6-3cef1fd58c5f,Namespace:calico-system,Attempt:1,} returns sandbox id \"e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c\"" Feb 9 10:30:52.208674 env[1477]: time="2024-02-09T10:30:52.208651025Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-r7qwv,Uid:82361235-1b05-45af-a533-456da0162fc6,Namespace:kube-system,Attempt:1,} returns sandbox id \"d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a\"" Feb 9 10:30:52.209841 env[1477]: time="2024-02-09T10:30:52.209827075Z" level=info msg="CreateContainer within sandbox \"d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 10:30:52.219403 env[1477]: time="2024-02-09T10:30:52.219343814Z" level=info msg="CreateContainer within sandbox \"d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"baecd89421eebd69a4ce48b62cbe2268b10edf1901a809ab7bda2e4e930efebb\"" Feb 9 10:30:52.219609 env[1477]: time="2024-02-09T10:30:52.219595891Z" level=info msg="StartContainer for \"baecd89421eebd69a4ce48b62cbe2268b10edf1901a809ab7bda2e4e930efebb\"" Feb 9 10:30:52.227017 systemd[1]: Started cri-containerd-baecd89421eebd69a4ce48b62cbe2268b10edf1901a809ab7bda2e4e930efebb.scope. Feb 9 10:30:52.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit: BPF prog-id=172 op=LOAD Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4821 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261656364383934323165656264363961346365343862363263626532 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4821 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261656364383934323165656264363961346365343862363263626532 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit: BPF prog-id=173 op=LOAD Feb 9 10:30:52.232000 audit[4870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000388150 items=0 ppid=4821 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261656364383934323165656264363961346365343862363263626532 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit: BPF prog-id=174 op=LOAD Feb 9 10:30:52.232000 audit[4870]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000388198 items=0 ppid=4821 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261656364383934323165656264363961346365343862363263626532 Feb 9 10:30:52.232000 audit: BPF prog-id=174 op=UNLOAD Feb 9 10:30:52.232000 audit: BPF prog-id=173 op=UNLOAD Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { perfmon } for pid=4870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit[4870]: AVC avc: denied { bpf } for pid=4870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:52.232000 audit: BPF prog-id=175 op=LOAD Feb 9 10:30:52.232000 audit[4870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003885a8 items=0 ppid=4821 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:52.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261656364383934323165656264363961346365343862363263626532 Feb 9 10:30:52.252519 env[1477]: time="2024-02-09T10:30:52.252464943Z" level=info msg="StartContainer for \"baecd89421eebd69a4ce48b62cbe2268b10edf1901a809ab7bda2e4e930efebb\" returns successfully" Feb 9 10:30:53.098656 systemd-networkd[1329]: cali4a22dd0c80c: Gained IPv6LL Feb 9 10:30:53.162653 systemd-networkd[1329]: calia90cda8ca64: Gained IPv6LL Feb 9 10:30:53.248131 kubelet[2567]: I0209 10:30:53.248106 2567 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-r7qwv" podStartSLOduration=83.248076946 podCreationTimestamp="2024-02-09 10:29:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:30:53.247902745 +0000 UTC m=+96.364815569" watchObservedRunningTime="2024-02-09 10:30:53.248076946 +0000 UTC m=+96.364989764" Feb 9 10:30:53.252000 audit[4911]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=4911 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:53.279266 kernel: kauditd_printk_skb: 307 callbacks suppressed Feb 9 10:30:53.279328 kernel: audit: type=1325 audit(1707474653.252:1301): table=filter:107 family=2 entries=8 op=nft_register_rule pid=4911 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:53.252000 audit[4911]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe627015c0 a2=0 a3=7ffe627015ac items=0 ppid=2840 pid=4911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:53.427414 kernel: audit: type=1300 audit(1707474653.252:1301): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe627015c0 a2=0 a3=7ffe627015ac items=0 ppid=2840 pid=4911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:53.427453 kernel: audit: type=1327 audit(1707474653.252:1301): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:53.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:53.253000 audit[4911]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=4911 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:53.253000 audit[4911]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffe627015c0 a2=0 a3=7ffe627015ac items=0 ppid=2840 pid=4911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:53.634618 kernel: audit: type=1325 audit(1707474653.253:1302): table=nat:108 family=2 entries=44 op=nft_register_rule pid=4911 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:53.634654 kernel: audit: type=1300 audit(1707474653.253:1302): arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffe627015c0 a2=0 a3=7ffe627015ac items=0 ppid=2840 pid=4911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:53.634677 kernel: audit: type=1327 audit(1707474653.253:1302): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:53.253000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:53.489000 audit[4915]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:53.489000 audit[4915]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffed5982540 a2=0 a3=7ffed598252c items=0 ppid=2840 pid=4915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:53.842203 kernel: audit: type=1325 audit(1707474653.489:1303): table=filter:109 family=2 entries=8 op=nft_register_rule pid=4915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:53.842234 kernel: audit: type=1300 audit(1707474653.489:1303): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffed5982540 a2=0 a3=7ffed598252c items=0 ppid=2840 pid=4915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:53.842248 kernel: audit: type=1327 audit(1707474653.489:1303): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:53.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:53.897000 audit[4915]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=4915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:53.897000 audit[4915]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffed5982540 a2=0 a3=7ffed598252c items=0 ppid=2840 pid=4915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:53.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:53.958462 kernel: audit: type=1325 audit(1707474653.897:1304): table=nat:110 family=2 entries=56 op=nft_register_chain pid=4915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:53.994608 systemd-networkd[1329]: calib780f41e599: Gained IPv6LL Feb 9 10:30:55.527323 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3355936363.mount: Deactivated successfully. Feb 9 10:30:57.700054 env[1477]: time="2024-02-09T10:30:57.699993843Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:57.700646 env[1477]: time="2024-02-09T10:30:57.700605939Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:57.701281 env[1477]: time="2024-02-09T10:30:57.701241255Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:57.701940 env[1477]: time="2024-02-09T10:30:57.701927811Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:57.702241 env[1477]: time="2024-02-09T10:30:57.702227994Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 10:30:57.702815 env[1477]: time="2024-02-09T10:30:57.702802677Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 10:30:57.703531 env[1477]: time="2024-02-09T10:30:57.703516543Z" level=info msg="CreateContainer within sandbox \"2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 10:30:57.709373 env[1477]: time="2024-02-09T10:30:57.709336714Z" level=info msg="CreateContainer within sandbox \"2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3e34c5f12365309f7ec2bff7241b68cf1f6583d9d6134603b620070a4fe40e06\"" Feb 9 10:30:57.709773 env[1477]: time="2024-02-09T10:30:57.709707044Z" level=info msg="StartContainer for \"3e34c5f12365309f7ec2bff7241b68cf1f6583d9d6134603b620070a4fe40e06\"" Feb 9 10:30:57.734487 systemd[1]: Started cri-containerd-3e34c5f12365309f7ec2bff7241b68cf1f6583d9d6134603b620070a4fe40e06.scope. Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4542 pid=4933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:57.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365333463356631323336353330396637656332626666373234316236 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit: BPF prog-id=176 op=LOAD Feb 9 10:30:57.740000 audit[4933]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003dc410 items=0 ppid=4542 pid=4933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:57.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365333463356631323336353330396637656332626666373234316236 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit: BPF prog-id=177 op=LOAD Feb 9 10:30:57.740000 audit[4933]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003dc458 items=0 ppid=4542 pid=4933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:57.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365333463356631323336353330396637656332626666373234316236 Feb 9 10:30:57.740000 audit: BPF prog-id=177 op=UNLOAD Feb 9 10:30:57.740000 audit: BPF prog-id=176 op=UNLOAD Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { perfmon } for pid=4933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit[4933]: AVC avc: denied { bpf } for pid=4933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:57.740000 audit: BPF prog-id=178 op=LOAD Feb 9 10:30:57.740000 audit[4933]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003dc4e8 items=0 ppid=4542 pid=4933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:57.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365333463356631323336353330396637656332626666373234316236 Feb 9 10:30:57.761152 env[1477]: time="2024-02-09T10:30:57.761097635Z" level=info msg="StartContainer for \"3e34c5f12365309f7ec2bff7241b68cf1f6583d9d6134603b620070a4fe40e06\" returns successfully" Feb 9 10:31:07.944873 env[1477]: time="2024-02-09T10:31:07.944812766Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:31:07.945687 env[1477]: time="2024-02-09T10:31:07.945652767Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:31:07.946588 env[1477]: time="2024-02-09T10:31:07.946546982Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:31:07.947982 env[1477]: time="2024-02-09T10:31:07.947940049Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:31:07.948309 env[1477]: time="2024-02-09T10:31:07.948266237Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 10:31:07.948603 env[1477]: time="2024-02-09T10:31:07.948565091Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 10:31:07.951797 env[1477]: time="2024-02-09T10:31:07.951752295Z" level=info msg="CreateContainer within sandbox \"e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 10:31:07.955851 env[1477]: time="2024-02-09T10:31:07.955807899Z" level=info msg="CreateContainer within sandbox \"e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"c1d1a72d6ede6c1116164e795f9663e702d37d823e6febf168cecc5d33235eb0\"" Feb 9 10:31:07.956039 env[1477]: time="2024-02-09T10:31:07.956026704Z" level=info msg="StartContainer for \"c1d1a72d6ede6c1116164e795f9663e702d37d823e6febf168cecc5d33235eb0\"" Feb 9 10:31:07.988157 systemd[1]: Started cri-containerd-c1d1a72d6ede6c1116164e795f9663e702d37d823e6febf168cecc5d33235eb0.scope. Feb 9 10:31:08.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.052264 kernel: kauditd_printk_skb: 45 callbacks suppressed Feb 9 10:31:08.052363 kernel: audit: type=1400 audit(1707474668.014:1311): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.173885 kernel: audit: type=1400 audit(1707474668.014:1312): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.173961 kernel: audit: type=1400 audit(1707474668.014:1313): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.295805 kernel: audit: type=1400 audit(1707474668.014:1314): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.295845 kernel: audit: type=1400 audit(1707474668.014:1315): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.418089 kernel: audit: type=1400 audit(1707474668.014:1316): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.418123 kernel: audit: type=1400 audit(1707474668.014:1317): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.479272 kernel: audit: type=1400 audit(1707474668.014:1318): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.601323 kernel: audit: type=1400 audit(1707474668.014:1319): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.601389 kernel: audit: type=1400 audit(1707474668.111:1320): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.111000 audit: BPF prog-id=179 op=LOAD Feb 9 10:31:08.112000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.112000 audit[5008]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4775 pid=5008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:08.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643161373264366564653663313131363136346537393566393636 Feb 9 10:31:08.112000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.112000 audit[5008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4775 pid=5008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:08.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643161373264366564653663313131363136346537393566393636 Feb 9 10:31:08.112000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.112000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.112000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.112000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.112000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.112000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.112000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.112000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.112000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.112000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.112000 audit: BPF prog-id=180 op=LOAD Feb 9 10:31:08.112000 audit[5008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000285950 items=0 ppid=4775 pid=5008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:08.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643161373264366564653663313131363136346537393566393636 Feb 9 10:31:08.233000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.233000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.233000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.233000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.233000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.233000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.233000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.233000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.233000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.233000 audit: BPF prog-id=181 op=LOAD Feb 9 10:31:08.233000 audit[5008]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000285998 items=0 ppid=4775 pid=5008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:08.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643161373264366564653663313131363136346537393566393636 Feb 9 10:31:08.355000 audit: BPF prog-id=181 op=UNLOAD Feb 9 10:31:08.355000 audit: BPF prog-id=180 op=UNLOAD Feb 9 10:31:08.355000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.355000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.355000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.355000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.355000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.355000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.355000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.355000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.355000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.355000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:08.355000 audit: BPF prog-id=182 op=LOAD Feb 9 10:31:08.355000 audit[5008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000285da8 items=0 ppid=4775 pid=5008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:08.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331643161373264366564653663313131363136346537393566393636 Feb 9 10:31:08.697107 env[1477]: time="2024-02-09T10:31:08.697048746Z" level=info msg="StartContainer for \"c1d1a72d6ede6c1116164e795f9663e702d37d823e6febf168cecc5d33235eb0\" returns successfully" Feb 9 10:31:09.315512 kubelet[2567]: I0209 10:31:09.315441 2567 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7bf886ccf-xc4cm" podStartSLOduration=78.561155487 podCreationTimestamp="2024-02-09 10:29:35 +0000 UTC" firstStartedPulling="2024-02-09 10:30:52.194303591 +0000 UTC m=+95.311216409" lastFinishedPulling="2024-02-09 10:31:07.948473861 +0000 UTC m=+111.065386682" observedRunningTime="2024-02-09 10:31:09.314173438 +0000 UTC m=+112.431086336" watchObservedRunningTime="2024-02-09 10:31:09.31532576 +0000 UTC m=+112.432238641" Feb 9 10:31:12.746000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:31:12.746000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e74240 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:31:12.746000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:31:12.746000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:31:12.746000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000de66e0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:31:12.746000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:31:12.757000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:31:12.757000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c003766db0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:31:12.757000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:31:12.757000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:31:12.757000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00ed4b3c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:31:12.757000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:31:12.758000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:31:12.758000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c003766e10 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:31:12.758000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:31:12.758000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:31:12.758000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00cf4ba70 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:31:12.758000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:31:12.758000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:31:12.758000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:31:12.758000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c003766f00 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:31:12.758000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:31:12.758000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00fe58200 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:31:12.758000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:31:13.129206 env[1477]: time="2024-02-09T10:31:13.129119233Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:31:13.129796 env[1477]: time="2024-02-09T10:31:13.129757707Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:31:13.130325 env[1477]: time="2024-02-09T10:31:13.130285289Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:31:13.130936 env[1477]: time="2024-02-09T10:31:13.130895480Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:31:13.131465 env[1477]: time="2024-02-09T10:31:13.131422185Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 10:31:13.132598 env[1477]: time="2024-02-09T10:31:13.132553553Z" level=info msg="CreateContainer within sandbox \"2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 10:31:13.137374 env[1477]: time="2024-02-09T10:31:13.137309451Z" level=info msg="CreateContainer within sandbox \"2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"faeaf735f85df70cd40d794cdc005eccb4c78ef30207d1bf19f3623dd6248fec\"" Feb 9 10:31:13.137604 env[1477]: time="2024-02-09T10:31:13.137555525Z" level=info msg="StartContainer for \"faeaf735f85df70cd40d794cdc005eccb4c78ef30207d1bf19f3623dd6248fec\"" Feb 9 10:31:13.160998 systemd[1]: Started cri-containerd-faeaf735f85df70cd40d794cdc005eccb4c78ef30207d1bf19f3623dd6248fec.scope. Feb 9 10:31:13.166000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.194044 kernel: kauditd_printk_skb: 71 callbacks suppressed Feb 9 10:31:13.194108 kernel: audit: type=1400 audit(1707474673.166:1337): avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.166000 audit[5077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4542 pid=5077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:13.259345 kernel: audit: type=1300 audit(1707474673.166:1337): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4542 pid=5077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:13.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661656166373335663835646637306364343064373934636463303035 Feb 9 10:31:13.166000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.448967 kernel: audit: type=1327 audit(1707474673.166:1337): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661656166373335663835646637306364343064373934636463303035 Feb 9 10:31:13.449005 kernel: audit: type=1400 audit(1707474673.166:1338): avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.166000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.576315 kernel: audit: type=1400 audit(1707474673.166:1338): avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.576354 kernel: audit: type=1400 audit(1707474673.166:1338): avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.166000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.639993 kernel: audit: type=1400 audit(1707474673.166:1338): avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.166000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.646596 env[1477]: time="2024-02-09T10:31:13.646571383Z" level=info msg="StartContainer for \"faeaf735f85df70cd40d794cdc005eccb4c78ef30207d1bf19f3623dd6248fec\" returns successfully" Feb 9 10:31:13.704003 kernel: audit: type=1400 audit(1707474673.166:1338): avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.166000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.768081 kernel: audit: type=1400 audit(1707474673.166:1338): avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.166000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.832200 kernel: audit: type=1400 audit(1707474673.166:1338): avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.166000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.166000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.166000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.166000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.166000 audit: BPF prog-id=183 op=LOAD Feb 9 10:31:13.166000 audit[5077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003927a0 items=0 ppid=4542 pid=5077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:13.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661656166373335663835646637306364343064373934636463303035 Feb 9 10:31:13.257000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.257000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.257000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.257000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.257000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.257000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.257000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.257000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.257000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.257000 audit: BPF prog-id=184 op=LOAD Feb 9 10:31:13.257000 audit[5077]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003927e8 items=0 ppid=4542 pid=5077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:13.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661656166373335663835646637306364343064373934636463303035 Feb 9 10:31:13.447000 audit: BPF prog-id=184 op=UNLOAD Feb 9 10:31:13.447000 audit: BPF prog-id=183 op=UNLOAD Feb 9 10:31:13.447000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.447000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.447000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.447000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.447000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.447000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.447000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.447000 audit[5077]: AVC avc: denied { perfmon } for pid=5077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.447000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.447000 audit[5077]: AVC avc: denied { bpf } for pid=5077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:13.447000 audit: BPF prog-id=185 op=LOAD Feb 9 10:31:13.447000 audit[5077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000392878 items=0 ppid=4542 pid=5077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:13.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661656166373335663835646637306364343064373934636463303035 Feb 9 10:31:14.029142 kubelet[2567]: I0209 10:31:14.028891 2567 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 10:31:14.029142 kubelet[2567]: I0209 10:31:14.028967 2567 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 10:31:14.314228 kubelet[2567]: I0209 10:31:14.314154 2567 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-tcmq8" podStartSLOduration=78.34880396 podCreationTimestamp="2024-02-09 10:29:34 +0000 UTC" firstStartedPulling="2024-02-09 10:30:51.166279005 +0000 UTC m=+94.283191826" lastFinishedPulling="2024-02-09 10:31:13.131605684 +0000 UTC m=+116.248518505" observedRunningTime="2024-02-09 10:31:14.313669931 +0000 UTC m=+117.430582760" watchObservedRunningTime="2024-02-09 10:31:14.314130639 +0000 UTC m=+117.431043458" Feb 9 10:31:14.633616 kubelet[2567]: I0209 10:31:14.633514 2567 topology_manager.go:215] "Topology Admit Handler" podUID="99f42c4f-0e98-434e-b147-dede0f5b694a" podNamespace="calico-apiserver" podName="calico-apiserver-66c8cf76c5-rlk5h" Feb 9 10:31:14.633000 audit[5114]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=5114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:31:14.633000 audit[5114]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffea21b8f10 a2=0 a3=7ffea21b8efc items=0 ppid=2840 pid=5114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:14.633000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:31:14.637315 kubelet[2567]: I0209 10:31:14.637287 2567 topology_manager.go:215] "Topology Admit Handler" podUID="dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3" podNamespace="calico-apiserver" podName="calico-apiserver-66c8cf76c5-hl4j4" Feb 9 10:31:14.640951 systemd[1]: Created slice kubepods-besteffort-pod99f42c4f_0e98_434e_b147_dede0f5b694a.slice. Feb 9 10:31:14.634000 audit[5114]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=5114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:31:14.634000 audit[5114]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffea21b8f10 a2=0 a3=7ffea21b8efc items=0 ppid=2840 pid=5114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:14.634000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:31:14.645445 systemd[1]: Created slice kubepods-besteffort-poddbcd0108_ef14_45e9_aa3d_b71c9d3ef1b3.slice. Feb 9 10:31:14.647000 audit[5116]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=5116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:31:14.647000 audit[5116]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc06224fd0 a2=0 a3=7ffc06224fbc items=0 ppid=2840 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:14.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:31:14.652000 audit[5116]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:31:14.652000 audit[5116]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc06224fd0 a2=0 a3=7ffc06224fbc items=0 ppid=2840 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:14.652000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:31:14.702992 kubelet[2567]: I0209 10:31:14.702902 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/99f42c4f-0e98-434e-b147-dede0f5b694a-calico-apiserver-certs\") pod \"calico-apiserver-66c8cf76c5-rlk5h\" (UID: \"99f42c4f-0e98-434e-b147-dede0f5b694a\") " pod="calico-apiserver/calico-apiserver-66c8cf76c5-rlk5h" Feb 9 10:31:14.703241 kubelet[2567]: I0209 10:31:14.703098 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cpx47\" (UniqueName: \"kubernetes.io/projected/99f42c4f-0e98-434e-b147-dede0f5b694a-kube-api-access-cpx47\") pod \"calico-apiserver-66c8cf76c5-rlk5h\" (UID: \"99f42c4f-0e98-434e-b147-dede0f5b694a\") " pod="calico-apiserver/calico-apiserver-66c8cf76c5-rlk5h" Feb 9 10:31:14.703401 kubelet[2567]: I0209 10:31:14.703263 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-46vqx\" (UniqueName: \"kubernetes.io/projected/dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3-kube-api-access-46vqx\") pod \"calico-apiserver-66c8cf76c5-hl4j4\" (UID: \"dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3\") " pod="calico-apiserver/calico-apiserver-66c8cf76c5-hl4j4" Feb 9 10:31:14.703401 kubelet[2567]: I0209 10:31:14.703389 2567 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3-calico-apiserver-certs\") pod \"calico-apiserver-66c8cf76c5-hl4j4\" (UID: \"dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3\") " pod="calico-apiserver/calico-apiserver-66c8cf76c5-hl4j4" Feb 9 10:31:14.803968 kubelet[2567]: E0209 10:31:14.803900 2567 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 10:31:14.804310 kubelet[2567]: E0209 10:31:14.803998 2567 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 10:31:14.804310 kubelet[2567]: E0209 10:31:14.804053 2567 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3-calico-apiserver-certs podName:dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3 nodeName:}" failed. No retries permitted until 2024-02-09 10:31:15.304009471 +0000 UTC m=+118.420922350 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3-calico-apiserver-certs") pod "calico-apiserver-66c8cf76c5-hl4j4" (UID: "dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3") : secret "calico-apiserver-certs" not found Feb 9 10:31:14.804310 kubelet[2567]: E0209 10:31:14.804156 2567 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/99f42c4f-0e98-434e-b147-dede0f5b694a-calico-apiserver-certs podName:99f42c4f-0e98-434e-b147-dede0f5b694a nodeName:}" failed. No retries permitted until 2024-02-09 10:31:15.304102236 +0000 UTC m=+118.421015145 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/99f42c4f-0e98-434e-b147-dede0f5b694a-calico-apiserver-certs") pod "calico-apiserver-66c8cf76c5-rlk5h" (UID: "99f42c4f-0e98-434e-b147-dede0f5b694a") : secret "calico-apiserver-certs" not found Feb 9 10:31:15.543786 env[1477]: time="2024-02-09T10:31:15.543721110Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66c8cf76c5-rlk5h,Uid:99f42c4f-0e98-434e-b147-dede0f5b694a,Namespace:calico-apiserver,Attempt:0,}" Feb 9 10:31:15.548220 env[1477]: time="2024-02-09T10:31:15.548186914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66c8cf76c5-hl4j4,Uid:dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3,Namespace:calico-apiserver,Attempt:0,}" Feb 9 10:31:15.603646 systemd-networkd[1329]: cali805ad008ef0: Link UP Feb 9 10:31:15.660579 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:31:15.660657 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali805ad008ef0: link becomes ready Feb 9 10:31:15.660705 systemd-networkd[1329]: cali805ad008ef0: Gained carrier Feb 9 10:31:15.663666 systemd-networkd[1329]: calid091739c46f: Link UP Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.564 [INFO][5122] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-eth0 calico-apiserver-66c8cf76c5- calico-apiserver 99f42c4f-0e98-434e-b147-dede0f5b694a 925 0 2024-02-09 10:31:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:66c8cf76c5 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-970bb49438 calico-apiserver-66c8cf76c5-rlk5h eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali805ad008ef0 [] []}} ContainerID="d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-rlk5h" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-" Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.564 [INFO][5122] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-rlk5h" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-eth0" Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.579 [INFO][5169] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" HandleID="k8s-pod-network.d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-eth0" Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.586 [INFO][5169] ipam_plugin.go 268: Auto assigning IP ContainerID="d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" HandleID="k8s-pod-network.d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000315310), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-970bb49438", "pod":"calico-apiserver-66c8cf76c5-rlk5h", "timestamp":"2024-02-09 10:31:15.579082677 +0000 UTC"}, Hostname:"ci-3510.3.2-a-970bb49438", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.586 [INFO][5169] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.586 [INFO][5169] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.586 [INFO][5169] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-970bb49438' Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.587 [INFO][5169] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.590 [INFO][5169] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.592 [INFO][5169] ipam.go 489: Trying affinity for 192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.594 [INFO][5169] ipam.go 155: Attempting to load block cidr=192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.595 [INFO][5169] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.595 [INFO][5169] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.64/26 handle="k8s-pod-network.d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.597 [INFO][5169] ipam.go 1682: Creating new handle: k8s-pod-network.d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53 Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.599 [INFO][5169] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.64/26 handle="k8s-pod-network.d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.602 [INFO][5169] ipam.go 1216: Successfully claimed IPs: [192.168.121.69/26] block=192.168.121.64/26 handle="k8s-pod-network.d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.602 [INFO][5169] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.69/26] handle="k8s-pod-network.d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.602 [INFO][5169] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:31:15.666226 env[1477]: 2024-02-09 10:31:15.602 [INFO][5169] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.69/26] IPv6=[] ContainerID="d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" HandleID="k8s-pod-network.d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-eth0" Feb 9 10:31:15.666699 env[1477]: 2024-02-09 10:31:15.602 [INFO][5122] k8s.go 385: Populated endpoint ContainerID="d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-rlk5h" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-eth0", GenerateName:"calico-apiserver-66c8cf76c5-", Namespace:"calico-apiserver", SelfLink:"", UID:"99f42c4f-0e98-434e-b147-dede0f5b694a", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 31, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66c8cf76c5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"", Pod:"calico-apiserver-66c8cf76c5-rlk5h", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.121.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali805ad008ef0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:31:15.666699 env[1477]: 2024-02-09 10:31:15.602 [INFO][5122] k8s.go 386: Calico CNI using IPs: [192.168.121.69/32] ContainerID="d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-rlk5h" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-eth0" Feb 9 10:31:15.666699 env[1477]: 2024-02-09 10:31:15.602 [INFO][5122] dataplane_linux.go 68: Setting the host side veth name to cali805ad008ef0 ContainerID="d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-rlk5h" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-eth0" Feb 9 10:31:15.666699 env[1477]: 2024-02-09 10:31:15.660 [INFO][5122] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-rlk5h" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-eth0" Feb 9 10:31:15.666699 env[1477]: 2024-02-09 10:31:15.660 [INFO][5122] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-rlk5h" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-eth0", GenerateName:"calico-apiserver-66c8cf76c5-", Namespace:"calico-apiserver", SelfLink:"", UID:"99f42c4f-0e98-434e-b147-dede0f5b694a", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 31, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66c8cf76c5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53", Pod:"calico-apiserver-66c8cf76c5-rlk5h", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.121.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali805ad008ef0", MAC:"f6:ad:fe:3b:ab:81", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:31:15.666699 env[1477]: 2024-02-09 10:31:15.665 [INFO][5122] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-rlk5h" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--rlk5h-eth0" Feb 9 10:31:15.672733 env[1477]: time="2024-02-09T10:31:15.672694119Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:31:15.672733 env[1477]: time="2024-02-09T10:31:15.672722241Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:31:15.672733 env[1477]: time="2024-02-09T10:31:15.672729630Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:31:15.672891 env[1477]: time="2024-02-09T10:31:15.672820039Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53 pid=5227 runtime=io.containerd.runc.v2 Feb 9 10:31:15.674000 audit[5239]: NETFILTER_CFG table=filter:115 family=2 entries=65 op=nft_register_chain pid=5239 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:31:15.674000 audit[5239]: SYSCALL arch=c000003e syscall=46 success=yes exit=32144 a0=3 a1=7fff2187d0e0 a2=0 a3=7fff2187d0cc items=0 ppid=3972 pid=5239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:15.674000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:31:15.692074 systemd-networkd[1329]: calid091739c46f: Gained carrier Feb 9 10:31:15.692346 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid091739c46f: link becomes ready Feb 9 10:31:15.708039 systemd[1]: Started cri-containerd-d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53.scope. Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.568 [INFO][5133] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-eth0 calico-apiserver-66c8cf76c5- calico-apiserver dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3 927 0 2024-02-09 10:31:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:66c8cf76c5 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-970bb49438 calico-apiserver-66c8cf76c5-hl4j4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid091739c46f [] []}} ContainerID="2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-hl4j4" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-" Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.568 [INFO][5133] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-hl4j4" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-eth0" Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.580 [INFO][5174] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" HandleID="k8s-pod-network.2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-eth0" Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.586 [INFO][5174] ipam_plugin.go 268: Auto assigning IP ContainerID="2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" HandleID="k8s-pod-network.2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00051edc0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-970bb49438", "pod":"calico-apiserver-66c8cf76c5-hl4j4", "timestamp":"2024-02-09 10:31:15.580663956 +0000 UTC"}, Hostname:"ci-3510.3.2-a-970bb49438", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.586 [INFO][5174] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.602 [INFO][5174] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.602 [INFO][5174] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-970bb49438' Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.603 [INFO][5174] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.606 [INFO][5174] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.608 [INFO][5174] ipam.go 489: Trying affinity for 192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.609 [INFO][5174] ipam.go 155: Attempting to load block cidr=192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.632 [INFO][5174] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.121.64/26 host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.632 [INFO][5174] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.121.64/26 handle="k8s-pod-network.2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.633 [INFO][5174] ipam.go 1682: Creating new handle: k8s-pod-network.2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0 Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.636 [INFO][5174] ipam.go 1203: Writing block in order to claim IPs block=192.168.121.64/26 handle="k8s-pod-network.2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.661 [INFO][5174] ipam.go 1216: Successfully claimed IPs: [192.168.121.70/26] block=192.168.121.64/26 handle="k8s-pod-network.2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.661 [INFO][5174] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.121.70/26] handle="k8s-pod-network.2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" host="ci-3510.3.2-a-970bb49438" Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.661 [INFO][5174] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:31:15.710826 env[1477]: 2024-02-09 10:31:15.661 [INFO][5174] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.121.70/26] IPv6=[] ContainerID="2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" HandleID="k8s-pod-network.2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-eth0" Feb 9 10:31:15.711513 env[1477]: 2024-02-09 10:31:15.662 [INFO][5133] k8s.go 385: Populated endpoint ContainerID="2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-hl4j4" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-eth0", GenerateName:"calico-apiserver-66c8cf76c5-", Namespace:"calico-apiserver", SelfLink:"", UID:"dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 31, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66c8cf76c5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"", Pod:"calico-apiserver-66c8cf76c5-hl4j4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.121.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid091739c46f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:31:15.711513 env[1477]: 2024-02-09 10:31:15.662 [INFO][5133] k8s.go 386: Calico CNI using IPs: [192.168.121.70/32] ContainerID="2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-hl4j4" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-eth0" Feb 9 10:31:15.711513 env[1477]: 2024-02-09 10:31:15.663 [INFO][5133] dataplane_linux.go 68: Setting the host side veth name to calid091739c46f ContainerID="2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-hl4j4" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-eth0" Feb 9 10:31:15.711513 env[1477]: 2024-02-09 10:31:15.692 [INFO][5133] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-hl4j4" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-eth0" Feb 9 10:31:15.711513 env[1477]: 2024-02-09 10:31:15.705 [INFO][5133] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-hl4j4" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-eth0", GenerateName:"calico-apiserver-66c8cf76c5-", Namespace:"calico-apiserver", SelfLink:"", UID:"dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 31, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66c8cf76c5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0", Pod:"calico-apiserver-66c8cf76c5-hl4j4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.121.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid091739c46f", MAC:"d6:22:c3:93:01:32", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:31:15.711513 env[1477]: 2024-02-09 10:31:15.709 [INFO][5133] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0" Namespace="calico-apiserver" Pod="calico-apiserver-66c8cf76c5-hl4j4" WorkloadEndpoint="ci--3510.3.2--a--970bb49438-k8s-calico--apiserver--66c8cf76c5--hl4j4-eth0" Feb 9 10:31:15.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit: BPF prog-id=186 op=LOAD Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5227 pid=5238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:15.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430333966626361356135313066366131366536336363353531316265 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5227 pid=5238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:15.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430333966626361356135313066366131366536336363353531316265 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit: BPF prog-id=187 op=LOAD Feb 9 10:31:15.713000 audit[5238]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003dc600 items=0 ppid=5227 pid=5238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:15.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430333966626361356135313066366131366536336363353531316265 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit: BPF prog-id=188 op=LOAD Feb 9 10:31:15.713000 audit[5238]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003dc648 items=0 ppid=5227 pid=5238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:15.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430333966626361356135313066366131366536336363353531316265 Feb 9 10:31:15.713000 audit: BPF prog-id=188 op=UNLOAD Feb 9 10:31:15.713000 audit: BPF prog-id=187 op=UNLOAD Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { perfmon } for pid=5238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit[5238]: AVC avc: denied { bpf } for pid=5238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.713000 audit: BPF prog-id=189 op=LOAD Feb 9 10:31:15.713000 audit[5238]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003dca58 items=0 ppid=5227 pid=5238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:15.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430333966626361356135313066366131366536336363353531316265 Feb 9 10:31:15.716681 env[1477]: time="2024-02-09T10:31:15.716480282Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:31:15.716681 env[1477]: time="2024-02-09T10:31:15.716506864Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:31:15.716681 env[1477]: time="2024-02-09T10:31:15.716515824Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:31:15.716681 env[1477]: time="2024-02-09T10:31:15.716579329Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0 pid=5275 runtime=io.containerd.runc.v2 Feb 9 10:31:15.716000 audit[5280]: NETFILTER_CFG table=filter:116 family=2 entries=46 op=nft_register_chain pid=5280 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:31:15.716000 audit[5280]: SYSCALL arch=c000003e syscall=46 success=yes exit=23292 a0=3 a1=7ffe94afa0a0 a2=0 a3=7ffe94afa08c items=0 ppid=3972 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:15.716000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:31:15.732565 env[1477]: time="2024-02-09T10:31:15.732510317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66c8cf76c5-rlk5h,Uid:99f42c4f-0e98-434e-b147-dede0f5b694a,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"d039fbca5a510f6a16e63cc5511bee92803e694deb5f73368d681b7c7b605d53\"" Feb 9 10:31:15.733329 env[1477]: time="2024-02-09T10:31:15.733310456Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 10:31:15.733476 systemd[1]: Started cri-containerd-2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0.scope. Feb 9 10:31:15.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit: BPF prog-id=190 op=LOAD Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5275 pid=5285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:15.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303334326232303465353865323635366133616138613336313633 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5275 pid=5285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:15.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303334326232303465353865323635366133616138613336313633 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit: BPF prog-id=191 op=LOAD Feb 9 10:31:15.738000 audit[5285]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000308a90 items=0 ppid=5275 pid=5285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:15.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303334326232303465353865323635366133616138613336313633 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit: BPF prog-id=192 op=LOAD Feb 9 10:31:15.738000 audit[5285]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000308ad8 items=0 ppid=5275 pid=5285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:15.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303334326232303465353865323635366133616138613336313633 Feb 9 10:31:15.738000 audit: BPF prog-id=192 op=UNLOAD Feb 9 10:31:15.738000 audit: BPF prog-id=191 op=UNLOAD Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { perfmon } for pid=5285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit[5285]: AVC avc: denied { bpf } for pid=5285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:31:15.738000 audit: BPF prog-id=193 op=LOAD Feb 9 10:31:15.738000 audit[5285]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000308ee8 items=0 ppid=5275 pid=5285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:31:15.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303334326232303465353865323635366133616138613336313633 Feb 9 10:31:15.768897 env[1477]: time="2024-02-09T10:31:15.768853218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66c8cf76c5-hl4j4,Uid:dbcd0108-ef14-45e9-aa3d-b71c9d3ef1b3,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2a0342b204e58e2656a3aa8a36163b4736f78e2379b3c544f0e2cfacd44293c0\"" Feb 9 10:31:16.565000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:31:16.565000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014b82c0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:31:16.565000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:31:16.566000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:31:16.566000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002661840 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:31:16.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:31:16.566000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:31:16.566000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014b82e0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:31:16.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:31:16.566000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:31:16.566000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ec10a0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:31:16.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:31:16.933759 env[1477]: time="2024-02-09T10:31:16.933665234Z" level=info msg="StopPodSandbox for \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\"" Feb 9 10:31:16.976911 env[1477]: 2024-02-09 10:31:16.954 [WARNING][5328] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"126ee306-c62d-4960-a4cb-21b7a8caba1f", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df", Pod:"csi-node-driver-tcmq8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4a22dd0c80c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:31:16.976911 env[1477]: 2024-02-09 10:31:16.954 [INFO][5328] k8s.go 578: Cleaning up netns ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:31:16.976911 env[1477]: 2024-02-09 10:31:16.954 [INFO][5328] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" iface="eth0" netns="" Feb 9 10:31:16.976911 env[1477]: 2024-02-09 10:31:16.954 [INFO][5328] k8s.go 585: Releasing IP address(es) ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:31:16.976911 env[1477]: 2024-02-09 10:31:16.954 [INFO][5328] utils.go 188: Calico CNI releasing IP address ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:31:16.976911 env[1477]: 2024-02-09 10:31:16.967 [INFO][5347] ipam_plugin.go 415: Releasing address using handleID ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" HandleID="k8s-pod-network.fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Workload="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:31:16.976911 env[1477]: 2024-02-09 10:31:16.967 [INFO][5347] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:31:16.976911 env[1477]: 2024-02-09 10:31:16.967 [INFO][5347] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:31:16.976911 env[1477]: 2024-02-09 10:31:16.973 [WARNING][5347] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" HandleID="k8s-pod-network.fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Workload="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:31:16.976911 env[1477]: 2024-02-09 10:31:16.973 [INFO][5347] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" HandleID="k8s-pod-network.fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Workload="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:31:16.976911 env[1477]: 2024-02-09 10:31:16.975 [INFO][5347] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:31:16.976911 env[1477]: 2024-02-09 10:31:16.976 [INFO][5328] k8s.go 591: Teardown processing complete. ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:31:16.977388 env[1477]: time="2024-02-09T10:31:16.976909706Z" level=info msg="TearDown network for sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\" successfully" Feb 9 10:31:16.977388 env[1477]: time="2024-02-09T10:31:16.976932163Z" level=info msg="StopPodSandbox for \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\" returns successfully" Feb 9 10:31:16.977388 env[1477]: time="2024-02-09T10:31:16.977299390Z" level=info msg="RemovePodSandbox for \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\"" Feb 9 10:31:16.977388 env[1477]: time="2024-02-09T10:31:16.977323819Z" level=info msg="Forcibly stopping sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\"" Feb 9 10:31:17.030180 env[1477]: 2024-02-09 10:31:17.002 [WARNING][5377] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"126ee306-c62d-4960-a4cb-21b7a8caba1f", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"2ee4e2282a64e2a2a2706f930343199f973168dc6d1b7e3f8160db33121275df", Pod:"csi-node-driver-tcmq8", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.121.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4a22dd0c80c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:31:17.030180 env[1477]: 2024-02-09 10:31:17.002 [INFO][5377] k8s.go 578: Cleaning up netns ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:31:17.030180 env[1477]: 2024-02-09 10:31:17.002 [INFO][5377] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" iface="eth0" netns="" Feb 9 10:31:17.030180 env[1477]: 2024-02-09 10:31:17.002 [INFO][5377] k8s.go 585: Releasing IP address(es) ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:31:17.030180 env[1477]: 2024-02-09 10:31:17.002 [INFO][5377] utils.go 188: Calico CNI releasing IP address ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:31:17.030180 env[1477]: 2024-02-09 10:31:17.018 [INFO][5395] ipam_plugin.go 415: Releasing address using handleID ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" HandleID="k8s-pod-network.fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Workload="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:31:17.030180 env[1477]: 2024-02-09 10:31:17.018 [INFO][5395] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:31:17.030180 env[1477]: 2024-02-09 10:31:17.018 [INFO][5395] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:31:17.030180 env[1477]: 2024-02-09 10:31:17.026 [WARNING][5395] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" HandleID="k8s-pod-network.fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Workload="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:31:17.030180 env[1477]: 2024-02-09 10:31:17.026 [INFO][5395] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" HandleID="k8s-pod-network.fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Workload="ci--3510.3.2--a--970bb49438-k8s-csi--node--driver--tcmq8-eth0" Feb 9 10:31:17.030180 env[1477]: 2024-02-09 10:31:17.027 [INFO][5395] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:31:17.030180 env[1477]: 2024-02-09 10:31:17.029 [INFO][5377] k8s.go 591: Teardown processing complete. ContainerID="fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28" Feb 9 10:31:17.030811 env[1477]: time="2024-02-09T10:31:17.030174844Z" level=info msg="TearDown network for sandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\" successfully" Feb 9 10:31:17.032913 env[1477]: time="2024-02-09T10:31:17.032860219Z" level=info msg="RemovePodSandbox \"fcf9705c7781bce78ece317816108961925c8f7301bf91515032b15e048faa28\" returns successfully" Feb 9 10:31:17.033290 env[1477]: time="2024-02-09T10:31:17.033236399Z" level=info msg="StopPodSandbox for \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\"" Feb 9 10:31:17.035471 systemd-networkd[1329]: cali805ad008ef0: Gained IPv6LL Feb 9 10:31:17.131931 env[1477]: 2024-02-09 10:31:17.089 [WARNING][5422] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c7848516-42cb-4d0b-a613-4255f9428103", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564", Pod:"coredns-5dd5756b68-n448j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali88f8e0b5ed6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:31:17.131931 env[1477]: 2024-02-09 10:31:17.089 [INFO][5422] k8s.go 578: Cleaning up netns ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:31:17.131931 env[1477]: 2024-02-09 10:31:17.089 [INFO][5422] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" iface="eth0" netns="" Feb 9 10:31:17.131931 env[1477]: 2024-02-09 10:31:17.089 [INFO][5422] k8s.go 585: Releasing IP address(es) ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:31:17.131931 env[1477]: 2024-02-09 10:31:17.089 [INFO][5422] utils.go 188: Calico CNI releasing IP address ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:31:17.131931 env[1477]: 2024-02-09 10:31:17.120 [INFO][5439] ipam_plugin.go 415: Releasing address using handleID ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" HandleID="k8s-pod-network.3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:31:17.131931 env[1477]: 2024-02-09 10:31:17.120 [INFO][5439] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:31:17.131931 env[1477]: 2024-02-09 10:31:17.120 [INFO][5439] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:31:17.131931 env[1477]: 2024-02-09 10:31:17.128 [WARNING][5439] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" HandleID="k8s-pod-network.3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:31:17.131931 env[1477]: 2024-02-09 10:31:17.128 [INFO][5439] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" HandleID="k8s-pod-network.3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:31:17.131931 env[1477]: 2024-02-09 10:31:17.129 [INFO][5439] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:31:17.131931 env[1477]: 2024-02-09 10:31:17.130 [INFO][5422] k8s.go 591: Teardown processing complete. ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:31:17.132499 env[1477]: time="2024-02-09T10:31:17.131940987Z" level=info msg="TearDown network for sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\" successfully" Feb 9 10:31:17.132499 env[1477]: time="2024-02-09T10:31:17.131968218Z" level=info msg="StopPodSandbox for \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\" returns successfully" Feb 9 10:31:17.132499 env[1477]: time="2024-02-09T10:31:17.132336379Z" level=info msg="RemovePodSandbox for \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\"" Feb 9 10:31:17.132499 env[1477]: time="2024-02-09T10:31:17.132379713Z" level=info msg="Forcibly stopping sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\"" Feb 9 10:31:17.190075 env[1477]: 2024-02-09 10:31:17.163 [WARNING][5470] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c7848516-42cb-4d0b-a613-4255f9428103", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"a03dde1db012c3e7ea18ecb102e9ba8e63dee5405cf8d42a42919eaed6317564", Pod:"coredns-5dd5756b68-n448j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali88f8e0b5ed6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:31:17.190075 env[1477]: 2024-02-09 10:31:17.163 [INFO][5470] k8s.go 578: Cleaning up netns ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:31:17.190075 env[1477]: 2024-02-09 10:31:17.163 [INFO][5470] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" iface="eth0" netns="" Feb 9 10:31:17.190075 env[1477]: 2024-02-09 10:31:17.163 [INFO][5470] k8s.go 585: Releasing IP address(es) ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:31:17.190075 env[1477]: 2024-02-09 10:31:17.163 [INFO][5470] utils.go 188: Calico CNI releasing IP address ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:31:17.190075 env[1477]: 2024-02-09 10:31:17.179 [INFO][5485] ipam_plugin.go 415: Releasing address using handleID ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" HandleID="k8s-pod-network.3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:31:17.190075 env[1477]: 2024-02-09 10:31:17.179 [INFO][5485] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:31:17.190075 env[1477]: 2024-02-09 10:31:17.179 [INFO][5485] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:31:17.190075 env[1477]: 2024-02-09 10:31:17.186 [WARNING][5485] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" HandleID="k8s-pod-network.3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:31:17.190075 env[1477]: 2024-02-09 10:31:17.186 [INFO][5485] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" HandleID="k8s-pod-network.3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--n448j-eth0" Feb 9 10:31:17.190075 env[1477]: 2024-02-09 10:31:17.188 [INFO][5485] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:31:17.190075 env[1477]: 2024-02-09 10:31:17.189 [INFO][5470] k8s.go 591: Teardown processing complete. ContainerID="3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e" Feb 9 10:31:17.190075 env[1477]: time="2024-02-09T10:31:17.190040987Z" level=info msg="TearDown network for sandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\" successfully" Feb 9 10:31:17.192262 env[1477]: time="2024-02-09T10:31:17.192239150Z" level=info msg="RemovePodSandbox \"3bd8c6c65a8cbb36a7033a9b158c0a48049d35c41b568529bd93145ae1566a3e\" returns successfully" Feb 9 10:31:17.192654 env[1477]: time="2024-02-09T10:31:17.192602585Z" level=info msg="StopPodSandbox for \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\"" Feb 9 10:31:17.226482 systemd-networkd[1329]: calid091739c46f: Gained IPv6LL Feb 9 10:31:17.251652 env[1477]: 2024-02-09 10:31:17.222 [WARNING][5514] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0", GenerateName:"calico-kube-controllers-7bf886ccf-", Namespace:"calico-system", SelfLink:"", UID:"8b59bdd9-a462-4d83-aca6-3cef1fd58c5f", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bf886ccf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c", Pod:"calico-kube-controllers-7bf886ccf-xc4cm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.121.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia90cda8ca64", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:31:17.251652 env[1477]: 2024-02-09 10:31:17.223 [INFO][5514] k8s.go 578: Cleaning up netns ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:31:17.251652 env[1477]: 2024-02-09 10:31:17.223 [INFO][5514] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" iface="eth0" netns="" Feb 9 10:31:17.251652 env[1477]: 2024-02-09 10:31:17.223 [INFO][5514] k8s.go 585: Releasing IP address(es) ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:31:17.251652 env[1477]: 2024-02-09 10:31:17.224 [INFO][5514] utils.go 188: Calico CNI releasing IP address ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:31:17.251652 env[1477]: 2024-02-09 10:31:17.240 [INFO][5533] ipam_plugin.go 415: Releasing address using handleID ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" HandleID="k8s-pod-network.8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:31:17.251652 env[1477]: 2024-02-09 10:31:17.240 [INFO][5533] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:31:17.251652 env[1477]: 2024-02-09 10:31:17.240 [INFO][5533] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:31:17.251652 env[1477]: 2024-02-09 10:31:17.247 [WARNING][5533] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" HandleID="k8s-pod-network.8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:31:17.251652 env[1477]: 2024-02-09 10:31:17.247 [INFO][5533] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" HandleID="k8s-pod-network.8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:31:17.251652 env[1477]: 2024-02-09 10:31:17.249 [INFO][5533] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:31:17.251652 env[1477]: 2024-02-09 10:31:17.250 [INFO][5514] k8s.go 591: Teardown processing complete. ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:31:17.252199 env[1477]: time="2024-02-09T10:31:17.251645657Z" level=info msg="TearDown network for sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\" successfully" Feb 9 10:31:17.252199 env[1477]: time="2024-02-09T10:31:17.251678989Z" level=info msg="StopPodSandbox for \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\" returns successfully" Feb 9 10:31:17.252199 env[1477]: time="2024-02-09T10:31:17.252066530Z" level=info msg="RemovePodSandbox for \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\"" Feb 9 10:31:17.252199 env[1477]: time="2024-02-09T10:31:17.252095026Z" level=info msg="Forcibly stopping sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\"" Feb 9 10:31:17.311420 env[1477]: 2024-02-09 10:31:17.282 [WARNING][5562] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0", GenerateName:"calico-kube-controllers-7bf886ccf-", Namespace:"calico-system", SelfLink:"", UID:"8b59bdd9-a462-4d83-aca6-3cef1fd58c5f", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bf886ccf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"e7e88ba366beb09f3b1d31df5510756c74d2ff088c7e3b6e8534ed35e135032c", Pod:"calico-kube-controllers-7bf886ccf-xc4cm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.121.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia90cda8ca64", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:31:17.311420 env[1477]: 2024-02-09 10:31:17.283 [INFO][5562] k8s.go 578: Cleaning up netns ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:31:17.311420 env[1477]: 2024-02-09 10:31:17.283 [INFO][5562] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" iface="eth0" netns="" Feb 9 10:31:17.311420 env[1477]: 2024-02-09 10:31:17.283 [INFO][5562] k8s.go 585: Releasing IP address(es) ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:31:17.311420 env[1477]: 2024-02-09 10:31:17.283 [INFO][5562] utils.go 188: Calico CNI releasing IP address ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:31:17.311420 env[1477]: 2024-02-09 10:31:17.300 [INFO][5578] ipam_plugin.go 415: Releasing address using handleID ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" HandleID="k8s-pod-network.8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:31:17.311420 env[1477]: 2024-02-09 10:31:17.300 [INFO][5578] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:31:17.311420 env[1477]: 2024-02-09 10:31:17.300 [INFO][5578] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:31:17.311420 env[1477]: 2024-02-09 10:31:17.307 [WARNING][5578] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" HandleID="k8s-pod-network.8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:31:17.311420 env[1477]: 2024-02-09 10:31:17.307 [INFO][5578] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" HandleID="k8s-pod-network.8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Workload="ci--3510.3.2--a--970bb49438-k8s-calico--kube--controllers--7bf886ccf--xc4cm-eth0" Feb 9 10:31:17.311420 env[1477]: 2024-02-09 10:31:17.309 [INFO][5578] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:31:17.311420 env[1477]: 2024-02-09 10:31:17.310 [INFO][5562] k8s.go 591: Teardown processing complete. ContainerID="8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3" Feb 9 10:31:17.312002 env[1477]: time="2024-02-09T10:31:17.311448619Z" level=info msg="TearDown network for sandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\" successfully" Feb 9 10:31:17.313624 env[1477]: time="2024-02-09T10:31:17.313601583Z" level=info msg="RemovePodSandbox \"8cb3f3b174547375b07fa0401e89d885fde7b41a3ae0769abd8e1804a903dfe3\" returns successfully" Feb 9 10:31:17.314014 env[1477]: time="2024-02-09T10:31:17.313990966Z" level=info msg="StopPodSandbox for \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\"" Feb 9 10:31:17.383752 env[1477]: 2024-02-09 10:31:17.346 [WARNING][5608] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"82361235-1b05-45af-a533-456da0162fc6", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a", Pod:"coredns-5dd5756b68-r7qwv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib780f41e599", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:31:17.383752 env[1477]: 2024-02-09 10:31:17.346 [INFO][5608] k8s.go 578: Cleaning up netns ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:31:17.383752 env[1477]: 2024-02-09 10:31:17.346 [INFO][5608] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" iface="eth0" netns="" Feb 9 10:31:17.383752 env[1477]: 2024-02-09 10:31:17.346 [INFO][5608] k8s.go 585: Releasing IP address(es) ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:31:17.383752 env[1477]: 2024-02-09 10:31:17.346 [INFO][5608] utils.go 188: Calico CNI releasing IP address ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:31:17.383752 env[1477]: 2024-02-09 10:31:17.368 [INFO][5623] ipam_plugin.go 415: Releasing address using handleID ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" HandleID="k8s-pod-network.5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:31:17.383752 env[1477]: 2024-02-09 10:31:17.368 [INFO][5623] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:31:17.383752 env[1477]: 2024-02-09 10:31:17.368 [INFO][5623] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:31:17.383752 env[1477]: 2024-02-09 10:31:17.378 [WARNING][5623] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" HandleID="k8s-pod-network.5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:31:17.383752 env[1477]: 2024-02-09 10:31:17.378 [INFO][5623] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" HandleID="k8s-pod-network.5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:31:17.383752 env[1477]: 2024-02-09 10:31:17.380 [INFO][5623] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:31:17.383752 env[1477]: 2024-02-09 10:31:17.382 [INFO][5608] k8s.go 591: Teardown processing complete. ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:31:17.384737 env[1477]: time="2024-02-09T10:31:17.383778676Z" level=info msg="TearDown network for sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\" successfully" Feb 9 10:31:17.384737 env[1477]: time="2024-02-09T10:31:17.383819855Z" level=info msg="StopPodSandbox for \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\" returns successfully" Feb 9 10:31:17.384737 env[1477]: time="2024-02-09T10:31:17.384392696Z" level=info msg="RemovePodSandbox for \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\"" Feb 9 10:31:17.384737 env[1477]: time="2024-02-09T10:31:17.384440326Z" level=info msg="Forcibly stopping sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\"" Feb 9 10:31:17.472132 env[1477]: 2024-02-09 10:31:17.440 [WARNING][5655] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"82361235-1b05-45af-a533-456da0162fc6", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-970bb49438", ContainerID:"d63177216424e60a001b15558882175e6df8296af3c283ce46a16f45759b673a", Pod:"coredns-5dd5756b68-r7qwv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.121.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib780f41e599", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:31:17.472132 env[1477]: 2024-02-09 10:31:17.440 [INFO][5655] k8s.go 578: Cleaning up netns ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:31:17.472132 env[1477]: 2024-02-09 10:31:17.440 [INFO][5655] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" iface="eth0" netns="" Feb 9 10:31:17.472132 env[1477]: 2024-02-09 10:31:17.440 [INFO][5655] k8s.go 585: Releasing IP address(es) ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:31:17.472132 env[1477]: 2024-02-09 10:31:17.440 [INFO][5655] utils.go 188: Calico CNI releasing IP address ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:31:17.472132 env[1477]: 2024-02-09 10:31:17.460 [INFO][5672] ipam_plugin.go 415: Releasing address using handleID ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" HandleID="k8s-pod-network.5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:31:17.472132 env[1477]: 2024-02-09 10:31:17.461 [INFO][5672] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:31:17.472132 env[1477]: 2024-02-09 10:31:17.461 [INFO][5672] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:31:17.472132 env[1477]: 2024-02-09 10:31:17.468 [WARNING][5672] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" HandleID="k8s-pod-network.5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:31:17.472132 env[1477]: 2024-02-09 10:31:17.468 [INFO][5672] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" HandleID="k8s-pod-network.5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Workload="ci--3510.3.2--a--970bb49438-k8s-coredns--5dd5756b68--r7qwv-eth0" Feb 9 10:31:17.472132 env[1477]: 2024-02-09 10:31:17.469 [INFO][5672] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:31:17.472132 env[1477]: 2024-02-09 10:31:17.470 [INFO][5655] k8s.go 591: Teardown processing complete. ContainerID="5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001" Feb 9 10:31:17.472758 env[1477]: time="2024-02-09T10:31:17.472144150Z" level=info msg="TearDown network for sandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\" successfully" Feb 9 10:31:17.479438 env[1477]: time="2024-02-09T10:31:17.479380936Z" level=info msg="RemovePodSandbox \"5eade1ddc5077eaca9577328961700663455b0ceee34803db31ea5f5cdbb0001\" returns successfully" Feb 9 10:32:12.746000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:12.775863 kernel: kauditd_printk_skb: 177 callbacks suppressed Feb 9 10:32:12.776002 kernel: audit: type=1400 audit(1707474732.746:1389): avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:12.746000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001491880 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:32:12.866348 kernel: audit: type=1300 audit(1707474732.746:1389): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001491880 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:32:12.746000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:32:13.078036 kernel: audit: type=1327 audit(1707474732.746:1389): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:32:13.078088 kernel: audit: type=1400 audit(1707474732.747:1390): avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:12.747000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:13.167158 kernel: audit: type=1300 audit(1707474732.747:1390): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00267ba40 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:32:12.747000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00267ba40 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:32:13.284582 kernel: audit: type=1327 audit(1707474732.747:1390): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:32:12.747000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:32:13.375685 kernel: audit: type=1400 audit(1707474732.758:1391): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:12.758000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:13.464942 kernel: audit: type=1300 audit(1707474732.758:1391): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0049b6a50 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:32:12.758000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0049b6a50 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:32:13.561424 kernel: audit: type=1327 audit(1707474732.758:1391): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:32:12.758000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:32:13.652799 kernel: audit: type=1400 audit(1707474732.758:1392): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:12.758000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:12.758000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0069ef980 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:32:12.758000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:32:12.759000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:12.759000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c013744b10 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:32:12.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:32:12.759000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:12.759000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c013744b40 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:32:12.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:32:12.759000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:12.759000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0129e2bc0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:32:12.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:32:12.759000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:12.759000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00cfd5320 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:32:12.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:32:16.566000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:16.566000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013c3440 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:32:16.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:32:16.567000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:16.567000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013c3460 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:32:16.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:32:16.567000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:16.567000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00015ee60 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:32:16.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:32:16.567000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:32:16.567000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ec11e0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:32:16.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:33:12.748000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:12.776241 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 10:33:12.776284 kernel: audit: type=1400 audit(1707474792.748:1401): avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:12.748000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f1ea80 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:33:12.982248 kernel: audit: type=1300 audit(1707474792.748:1401): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f1ea80 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:33:12.982279 kernel: audit: type=1327 audit(1707474792.748:1401): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:33:12.748000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:33:13.072535 kernel: audit: type=1400 audit(1707474792.749:1402): avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:12.749000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:13.161908 kernel: audit: type=1300 audit(1707474792.749:1402): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bf7d10 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:33:12.749000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bf7d10 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:33:13.282191 kernel: audit: type=1327 audit(1707474792.749:1402): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:33:12.749000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:33:13.375368 kernel: audit: type=1400 audit(1707474792.759:1403): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:12.759000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:12.759000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c012aebb40 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:33:13.563866 kernel: audit: type=1300 audit(1707474792.759:1403): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c012aebb40 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:33:13.563898 kernel: audit: type=1327 audit(1707474792.759:1403): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:33:12.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:33:13.657116 kernel: audit: type=1400 audit(1707474792.759:1404): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:12.759000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:12.759000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c012ca09f0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:33:12.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:33:12.760000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:12.760000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c012ae4ae0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:33:12.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:33:12.760000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:12.760000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0125959e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:33:12.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:33:12.760000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:12.760000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012ec6660 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:33:12.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:33:12.760000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:12.760000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0130ca060 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:33:12.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:33:16.567000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:16.567000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ec1880 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:33:16.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:33:16.568000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:16.568000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f1ecc0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:33:16.568000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:33:16.568000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:16.568000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f1ece0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:33:16.568000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:33:16.568000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:33:16.568000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0014b9140 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:33:16.568000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:34:12.750000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:12.793932 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 10:34:12.794022 kernel: audit: type=1400 audit(1707474852.750:1413): avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:12.750000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:12.977419 kernel: audit: type=1400 audit(1707474852.750:1414): avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:12.977457 kernel: audit: type=1300 audit(1707474852.750:1413): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a6a2e0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:34:12.750000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a6a2e0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:34:13.096666 kernel: audit: type=1300 audit(1707474852.750:1414): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0007f7b60 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:34:12.750000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0007f7b60 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:34:12.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:34:13.309784 kernel: audit: type=1327 audit(1707474852.750:1413): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:34:13.309818 kernel: audit: type=1327 audit(1707474852.750:1414): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:34:12.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:34:13.402965 kernel: audit: type=1400 audit(1707474852.793:1415): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:12.793000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:13.494237 kernel: audit: type=1300 audit(1707474852.793:1415): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0077ef2c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:34:12.793000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0077ef2c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:34:13.594201 kernel: audit: type=1327 audit(1707474852.793:1415): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:34:12.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:34:13.688227 kernel: audit: type=1400 audit(1707474852.793:1416): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:12.793000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:12.793000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0085963a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:34:12.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:34:12.793000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:12.793000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00cd4cf60 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:34:12.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:34:12.793000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:12.793000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c01234e000 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:34:12.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:34:12.793000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:12.793000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00f958000 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:34:12.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:34:12.793000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:12.793000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c01234e030 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:34:12.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:34:16.567000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:16.567000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000de7860 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:34:16.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:34:16.569000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:16.569000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c0bb40 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:34:16.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:34:16.569000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:16.569000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027c82e0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:34:16.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:34:16.569000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:34:16.569000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f1ed00 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:34:16.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:35:01.432973 systemd[1]: Started sshd@7-147.75.49.59:22-147.75.109.163:51108.service. Feb 9 10:35:01.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.49.59:22-147.75.109.163:51108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:01.459480 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 10:35:01.459536 kernel: audit: type=1130 audit(1707474901.431:1425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.49.59:22-147.75.109.163:51108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:01.571000 audit[6230]: USER_ACCT pid=6230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:01.572488 sshd[6230]: Accepted publickey for core from 147.75.109.163 port 51108 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:35:01.573604 sshd[6230]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:35:01.576039 systemd-logind[1465]: New session 10 of user core. Feb 9 10:35:01.576488 systemd[1]: Started session-10.scope. Feb 9 10:35:01.572000 audit[6230]: CRED_ACQ pid=6230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:01.673544 sshd[6230]: pam_unix(sshd:session): session closed for user core Feb 9 10:35:01.674956 systemd[1]: sshd@7-147.75.49.59:22-147.75.109.163:51108.service: Deactivated successfully. Feb 9 10:35:01.675405 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 10:35:01.675803 systemd-logind[1465]: Session 10 logged out. Waiting for processes to exit. Feb 9 10:35:01.676308 systemd-logind[1465]: Removed session 10. Feb 9 10:35:01.754549 kernel: audit: type=1101 audit(1707474901.571:1426): pid=6230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:01.754589 kernel: audit: type=1103 audit(1707474901.572:1427): pid=6230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:01.754606 kernel: audit: type=1006 audit(1707474901.572:1428): pid=6230 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 10:35:01.572000 audit[6230]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff49bed980 a2=3 a3=0 items=0 ppid=1 pid=6230 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:01.905275 kernel: audit: type=1300 audit(1707474901.572:1428): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff49bed980 a2=3 a3=0 items=0 ppid=1 pid=6230 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:01.905309 kernel: audit: type=1327 audit(1707474901.572:1428): proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:01.572000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:01.936089 kernel: audit: type=1105 audit(1707474901.577:1429): pid=6230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:01.577000 audit[6230]: USER_START pid=6230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:02.031578 kernel: audit: type=1103 audit(1707474901.577:1430): pid=6232 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:01.577000 audit[6232]: CRED_ACQ pid=6232 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:02.120912 kernel: audit: type=1106 audit(1707474901.672:1431): pid=6230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:01.672000 audit[6230]: USER_END pid=6230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:02.216484 kernel: audit: type=1104 audit(1707474901.672:1432): pid=6230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:01.672000 audit[6230]: CRED_DISP pid=6230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:01.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.49.59:22-147.75.109.163:51108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:06.682960 systemd[1]: Started sshd@8-147.75.49.59:22-147.75.109.163:49022.service. Feb 9 10:35:06.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.49.59:22-147.75.109.163:49022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:06.709856 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:35:06.709923 kernel: audit: type=1130 audit(1707474906.681:1434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.49.59:22-147.75.109.163:49022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:06.821000 audit[6293]: USER_ACCT pid=6293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:06.822715 sshd[6293]: Accepted publickey for core from 147.75.109.163 port 49022 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:35:06.824633 sshd[6293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:35:06.827037 systemd-logind[1465]: New session 11 of user core. Feb 9 10:35:06.827588 systemd[1]: Started session-11.scope. Feb 9 10:35:06.907721 sshd[6293]: pam_unix(sshd:session): session closed for user core Feb 9 10:35:06.909093 systemd[1]: sshd@8-147.75.49.59:22-147.75.109.163:49022.service: Deactivated successfully. Feb 9 10:35:06.909564 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 10:35:06.910052 systemd-logind[1465]: Session 11 logged out. Waiting for processes to exit. Feb 9 10:35:06.910670 systemd-logind[1465]: Removed session 11. Feb 9 10:35:06.823000 audit[6293]: CRED_ACQ pid=6293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:07.007085 kernel: audit: type=1101 audit(1707474906.821:1435): pid=6293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:07.007144 kernel: audit: type=1103 audit(1707474906.823:1436): pid=6293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:07.007163 kernel: audit: type=1006 audit(1707474906.823:1437): pid=6293 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 10:35:07.065549 kernel: audit: type=1300 audit(1707474906.823:1437): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc782f6650 a2=3 a3=0 items=0 ppid=1 pid=6293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:06.823000 audit[6293]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc782f6650 a2=3 a3=0 items=0 ppid=1 pid=6293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:06.823000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:07.187933 kernel: audit: type=1327 audit(1707474906.823:1437): proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:07.187964 kernel: audit: type=1105 audit(1707474906.828:1438): pid=6293 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:06.828000 audit[6293]: USER_START pid=6293 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:07.282358 kernel: audit: type=1103 audit(1707474906.829:1439): pid=6295 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:06.829000 audit[6295]: CRED_ACQ pid=6295 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:07.371463 kernel: audit: type=1106 audit(1707474906.907:1440): pid=6293 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:06.907000 audit[6293]: USER_END pid=6293 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:07.466850 kernel: audit: type=1104 audit(1707474906.907:1441): pid=6293 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:06.907000 audit[6293]: CRED_DISP pid=6293 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:06.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.49.59:22-147.75.109.163:49022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:11.917966 systemd[1]: Started sshd@9-147.75.49.59:22-147.75.109.163:49032.service. Feb 9 10:35:11.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.49.59:22-147.75.109.163:49032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:11.945021 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:35:11.945113 kernel: audit: type=1130 audit(1707474911.916:1443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.49.59:22-147.75.109.163:49032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:12.055000 audit[6320]: USER_ACCT pid=6320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:12.057237 sshd[6320]: Accepted publickey for core from 147.75.109.163 port 49032 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:35:12.058382 sshd[6320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:35:12.060737 systemd-logind[1465]: New session 12 of user core. Feb 9 10:35:12.061199 systemd[1]: Started session-12.scope. Feb 9 10:35:12.139343 sshd[6320]: pam_unix(sshd:session): session closed for user core Feb 9 10:35:12.140773 systemd[1]: sshd@9-147.75.49.59:22-147.75.109.163:49032.service: Deactivated successfully. Feb 9 10:35:12.141210 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 10:35:12.141632 systemd-logind[1465]: Session 12 logged out. Waiting for processes to exit. Feb 9 10:35:12.142132 systemd-logind[1465]: Removed session 12. Feb 9 10:35:12.056000 audit[6320]: CRED_ACQ pid=6320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:12.238837 kernel: audit: type=1101 audit(1707474912.055:1444): pid=6320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:12.238876 kernel: audit: type=1103 audit(1707474912.056:1445): pid=6320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:12.238893 kernel: audit: type=1006 audit(1707474912.056:1446): pid=6320 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 10:35:12.297417 kernel: audit: type=1300 audit(1707474912.056:1446): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdafcbe390 a2=3 a3=0 items=0 ppid=1 pid=6320 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:12.056000 audit[6320]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdafcbe390 a2=3 a3=0 items=0 ppid=1 pid=6320 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:12.389323 kernel: audit: type=1327 audit(1707474912.056:1446): proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:12.056000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:12.419789 kernel: audit: type=1105 audit(1707474912.061:1447): pid=6320 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:12.061000 audit[6320]: USER_START pid=6320 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:12.514166 kernel: audit: type=1103 audit(1707474912.062:1448): pid=6322 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:12.062000 audit[6322]: CRED_ACQ pid=6322 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:12.603332 kernel: audit: type=1106 audit(1707474912.138:1449): pid=6320 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:12.138000 audit[6320]: USER_END pid=6320 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:12.698766 kernel: audit: type=1104 audit(1707474912.138:1450): pid=6320 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:12.138000 audit[6320]: CRED_DISP pid=6320 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:12.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.49.59:22-147.75.109.163:49032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:12.749000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:35:12.749000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001078660 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:35:12.749000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:35:12.749000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:35:12.749000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00108af80 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:35:12.749000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:35:12.793000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:35:12.793000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00ace7740 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:35:12.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:35:12.793000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:35:12.793000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c012406930 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:35:12.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:35:12.793000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:35:12.793000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00fafdd80 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:35:12.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:35:12.793000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:35:12.793000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:35:12.793000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c012406960 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:35:12.793000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00bf79da0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:35:12.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:35:12.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:35:12.793000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:35:12.793000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00695f5a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:35:12.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:35:16.567000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:35:16.567000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00108b200 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:35:16.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:35:16.568000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:35:16.568000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006d8720 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:35:16.568000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:35:16.568000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:35:16.568000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00018a0a0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:35:16.568000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:35:16.568000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:35:16.568000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0006d8760 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:35:16.568000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:35:17.149676 systemd[1]: Started sshd@10-147.75.49.59:22-147.75.109.163:44874.service. Feb 9 10:35:17.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.49.59:22-147.75.109.163:44874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:17.185982 kernel: kauditd_printk_skb: 37 callbacks suppressed Feb 9 10:35:17.186058 kernel: audit: type=1130 audit(1707474917.148:1464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.49.59:22-147.75.109.163:44874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:17.211263 sshd[6348]: Accepted publickey for core from 147.75.109.163 port 44874 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:35:17.214767 sshd[6348]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:35:17.217673 systemd-logind[1465]: New session 13 of user core. Feb 9 10:35:17.218155 systemd[1]: Started session-13.scope. Feb 9 10:35:17.209000 audit[6348]: USER_ACCT pid=6348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:17.296661 sshd[6348]: pam_unix(sshd:session): session closed for user core Feb 9 10:35:17.298102 systemd[1]: sshd@10-147.75.49.59:22-147.75.109.163:44874.service: Deactivated successfully. Feb 9 10:35:17.298556 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 10:35:17.298973 systemd-logind[1465]: Session 13 logged out. Waiting for processes to exit. Feb 9 10:35:17.299493 systemd-logind[1465]: Removed session 13. Feb 9 10:35:17.365086 kernel: audit: type=1101 audit(1707474917.209:1465): pid=6348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:17.365127 kernel: audit: type=1103 audit(1707474917.213:1466): pid=6348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:17.213000 audit[6348]: CRED_ACQ pid=6348 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:17.514150 kernel: audit: type=1006 audit(1707474917.213:1467): pid=6348 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 10:35:17.514192 kernel: audit: type=1300 audit(1707474917.213:1467): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff92b1bc70 a2=3 a3=0 items=0 ppid=1 pid=6348 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:17.213000 audit[6348]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff92b1bc70 a2=3 a3=0 items=0 ppid=1 pid=6348 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:17.213000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:17.636633 kernel: audit: type=1327 audit(1707474917.213:1467): proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:17.636664 kernel: audit: type=1105 audit(1707474917.219:1468): pid=6348 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:17.219000 audit[6348]: USER_START pid=6348 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:17.731051 kernel: audit: type=1103 audit(1707474917.219:1469): pid=6350 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:17.219000 audit[6350]: CRED_ACQ pid=6350 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:17.820230 kernel: audit: type=1106 audit(1707474917.296:1470): pid=6348 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:17.296000 audit[6348]: USER_END pid=6348 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:17.915705 kernel: audit: type=1104 audit(1707474917.296:1471): pid=6348 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:17.296000 audit[6348]: CRED_DISP pid=6348 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:17.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.49.59:22-147.75.109.163:44874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:22.300136 systemd[1]: Started sshd@11-147.75.49.59:22-147.75.109.163:44882.service. Feb 9 10:35:22.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.49.59:22-147.75.109.163:44882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:22.327219 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:35:22.327294 kernel: audit: type=1130 audit(1707474922.298:1473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.49.59:22-147.75.109.163:44882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:22.437000 audit[6375]: USER_ACCT pid=6375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:22.438755 sshd[6375]: Accepted publickey for core from 147.75.109.163 port 44882 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:35:22.439621 sshd[6375]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:35:22.442246 systemd-logind[1465]: New session 14 of user core. Feb 9 10:35:22.442795 systemd[1]: Started session-14.scope. Feb 9 10:35:22.521242 sshd[6375]: pam_unix(sshd:session): session closed for user core Feb 9 10:35:22.522547 systemd[1]: sshd@11-147.75.49.59:22-147.75.109.163:44882.service: Deactivated successfully. Feb 9 10:35:22.522970 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 10:35:22.523292 systemd-logind[1465]: Session 14 logged out. Waiting for processes to exit. Feb 9 10:35:22.523840 systemd-logind[1465]: Removed session 14. Feb 9 10:35:22.438000 audit[6375]: CRED_ACQ pid=6375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:22.620422 kernel: audit: type=1101 audit(1707474922.437:1474): pid=6375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:22.620460 kernel: audit: type=1103 audit(1707474922.438:1475): pid=6375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:22.620481 kernel: audit: type=1006 audit(1707474922.438:1476): pid=6375 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 10:35:22.678988 kernel: audit: type=1300 audit(1707474922.438:1476): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5a5afc80 a2=3 a3=0 items=0 ppid=1 pid=6375 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:22.438000 audit[6375]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5a5afc80 a2=3 a3=0 items=0 ppid=1 pid=6375 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:22.770944 kernel: audit: type=1327 audit(1707474922.438:1476): proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:22.438000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:22.801436 kernel: audit: type=1105 audit(1707474922.443:1477): pid=6375 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:22.443000 audit[6375]: USER_START pid=6375 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:22.895854 kernel: audit: type=1103 audit(1707474922.444:1478): pid=6377 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:22.444000 audit[6377]: CRED_ACQ pid=6377 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:22.520000 audit[6375]: USER_END pid=6375 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:23.080472 kernel: audit: type=1106 audit(1707474922.520:1479): pid=6375 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:23.080503 kernel: audit: type=1104 audit(1707474922.520:1480): pid=6375 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:22.520000 audit[6375]: CRED_DISP pid=6375 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:22.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.49.59:22-147.75.109.163:44882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:27.530548 systemd[1]: Started sshd@12-147.75.49.59:22-147.75.109.163:60566.service. Feb 9 10:35:27.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.49.59:22-147.75.109.163:60566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:27.557624 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:35:27.557699 kernel: audit: type=1130 audit(1707474927.529:1482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.49.59:22-147.75.109.163:60566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:27.667000 audit[6438]: USER_ACCT pid=6438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:27.669239 sshd[6438]: Accepted publickey for core from 147.75.109.163 port 60566 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:35:27.670361 sshd[6438]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:35:27.672857 systemd-logind[1465]: New session 15 of user core. Feb 9 10:35:27.673397 systemd[1]: Started session-15.scope. Feb 9 10:35:27.755220 sshd[6438]: pam_unix(sshd:session): session closed for user core Feb 9 10:35:27.756748 systemd[1]: sshd@12-147.75.49.59:22-147.75.109.163:60566.service: Deactivated successfully. Feb 9 10:35:27.757193 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 10:35:27.757527 systemd-logind[1465]: Session 15 logged out. Waiting for processes to exit. Feb 9 10:35:27.758008 systemd-logind[1465]: Removed session 15. Feb 9 10:35:27.668000 audit[6438]: CRED_ACQ pid=6438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:27.852547 kernel: audit: type=1101 audit(1707474927.667:1483): pid=6438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:27.852600 kernel: audit: type=1103 audit(1707474927.668:1484): pid=6438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:27.852617 kernel: audit: type=1006 audit(1707474927.668:1485): pid=6438 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 10:35:27.911164 kernel: audit: type=1300 audit(1707474927.668:1485): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd927abe0 a2=3 a3=0 items=0 ppid=1 pid=6438 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:27.668000 audit[6438]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd927abe0 a2=3 a3=0 items=0 ppid=1 pid=6438 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:27.668000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:28.033663 kernel: audit: type=1327 audit(1707474927.668:1485): proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:28.033696 kernel: audit: type=1105 audit(1707474927.674:1486): pid=6438 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:27.674000 audit[6438]: USER_START pid=6438 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:28.128098 kernel: audit: type=1103 audit(1707474927.674:1487): pid=6440 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:27.674000 audit[6440]: CRED_ACQ pid=6440 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:28.217356 kernel: audit: type=1106 audit(1707474927.754:1488): pid=6438 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:27.754000 audit[6438]: USER_END pid=6438 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:28.312795 kernel: audit: type=1104 audit(1707474927.754:1489): pid=6438 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:27.754000 audit[6438]: CRED_DISP pid=6438 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:27.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.49.59:22-147.75.109.163:60566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:32.761642 systemd[1]: Started sshd@13-147.75.49.59:22-147.75.109.163:60570.service. Feb 9 10:35:32.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.49.59:22-147.75.109.163:60570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:32.788596 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:35:32.788665 kernel: audit: type=1130 audit(1707474932.760:1491): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.49.59:22-147.75.109.163:60570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:32.899000 audit[6508]: USER_ACCT pid=6508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:32.901140 sshd[6508]: Accepted publickey for core from 147.75.109.163 port 60570 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:35:32.902634 sshd[6508]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:35:32.905052 systemd-logind[1465]: New session 16 of user core. Feb 9 10:35:32.905563 systemd[1]: Started session-16.scope. Feb 9 10:35:32.901000 audit[6508]: CRED_ACQ pid=6508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:32.999343 sshd[6508]: pam_unix(sshd:session): session closed for user core Feb 9 10:35:33.000690 systemd[1]: sshd@13-147.75.49.59:22-147.75.109.163:60570.service: Deactivated successfully. Feb 9 10:35:33.001135 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 10:35:33.001455 systemd-logind[1465]: Session 16 logged out. Waiting for processes to exit. Feb 9 10:35:33.001796 systemd-logind[1465]: Removed session 16. Feb 9 10:35:33.083383 kernel: audit: type=1101 audit(1707474932.899:1492): pid=6508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:33.083415 kernel: audit: type=1103 audit(1707474932.901:1493): pid=6508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:33.083438 kernel: audit: type=1006 audit(1707474932.901:1494): pid=6508 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 10:35:33.141912 kernel: audit: type=1300 audit(1707474932.901:1494): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc34ef5d70 a2=3 a3=0 items=0 ppid=1 pid=6508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:32.901000 audit[6508]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc34ef5d70 a2=3 a3=0 items=0 ppid=1 pid=6508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:33.233857 kernel: audit: type=1327 audit(1707474932.901:1494): proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:32.901000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:33.264331 kernel: audit: type=1105 audit(1707474932.906:1495): pid=6508 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:32.906000 audit[6508]: USER_START pid=6508 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:33.358740 kernel: audit: type=1103 audit(1707474932.907:1496): pid=6510 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:32.907000 audit[6510]: CRED_ACQ pid=6510 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:33.447847 kernel: audit: type=1106 audit(1707474932.998:1497): pid=6508 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:32.998000 audit[6508]: USER_END pid=6508 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:33.543241 kernel: audit: type=1104 audit(1707474932.998:1498): pid=6508 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:32.998000 audit[6508]: CRED_DISP pid=6508 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:32.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.49.59:22-147.75.109.163:60570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:38.008827 systemd[1]: Started sshd@14-147.75.49.59:22-147.75.109.163:38100.service. Feb 9 10:35:38.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.49.59:22-147.75.109.163:38100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:38.035883 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:35:38.035999 kernel: audit: type=1130 audit(1707474938.007:1500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.49.59:22-147.75.109.163:38100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:38.145000 audit[6534]: USER_ACCT pid=6534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:38.147389 sshd[6534]: Accepted publickey for core from 147.75.109.163 port 38100 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:35:38.148511 sshd[6534]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:35:38.150707 systemd-logind[1465]: New session 17 of user core. Feb 9 10:35:38.151234 systemd[1]: Started session-17.scope. Feb 9 10:35:38.233236 sshd[6534]: pam_unix(sshd:session): session closed for user core Feb 9 10:35:38.234654 systemd[1]: sshd@14-147.75.49.59:22-147.75.109.163:38100.service: Deactivated successfully. Feb 9 10:35:38.235119 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 10:35:38.235505 systemd-logind[1465]: Session 17 logged out. Waiting for processes to exit. Feb 9 10:35:38.235925 systemd-logind[1465]: Removed session 17. Feb 9 10:35:38.147000 audit[6534]: CRED_ACQ pid=6534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:38.331296 kernel: audit: type=1101 audit(1707474938.145:1501): pid=6534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:38.331340 kernel: audit: type=1103 audit(1707474938.147:1502): pid=6534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:38.331361 kernel: audit: type=1006 audit(1707474938.147:1503): pid=6534 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 10:35:38.389810 kernel: audit: type=1300 audit(1707474938.147:1503): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd5d21570 a2=3 a3=0 items=0 ppid=1 pid=6534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:38.147000 audit[6534]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd5d21570 a2=3 a3=0 items=0 ppid=1 pid=6534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:38.481694 kernel: audit: type=1327 audit(1707474938.147:1503): proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:38.147000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:38.512160 kernel: audit: type=1105 audit(1707474938.152:1504): pid=6534 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:38.152000 audit[6534]: USER_START pid=6534 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:38.606588 kernel: audit: type=1103 audit(1707474938.152:1505): pid=6536 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:38.152000 audit[6536]: CRED_ACQ pid=6536 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:38.695724 kernel: audit: type=1106 audit(1707474938.232:1506): pid=6534 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:38.232000 audit[6534]: USER_END pid=6534 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:38.791151 kernel: audit: type=1104 audit(1707474938.232:1507): pid=6534 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:38.232000 audit[6534]: CRED_DISP pid=6534 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:38.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.49.59:22-147.75.109.163:38100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:43.242731 systemd[1]: Started sshd@15-147.75.49.59:22-147.75.109.163:38102.service. Feb 9 10:35:43.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.49.59:22-147.75.109.163:38102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:43.269821 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:35:43.269897 kernel: audit: type=1130 audit(1707474943.241:1509): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.49.59:22-147.75.109.163:38102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:43.380000 audit[6561]: USER_ACCT pid=6561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:43.381593 sshd[6561]: Accepted publickey for core from 147.75.109.163 port 38102 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:35:43.383230 sshd[6561]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:35:43.385761 systemd-logind[1465]: New session 18 of user core. Feb 9 10:35:43.386176 systemd[1]: Started session-18.scope. Feb 9 10:35:43.467045 sshd[6561]: pam_unix(sshd:session): session closed for user core Feb 9 10:35:43.468432 systemd[1]: sshd@15-147.75.49.59:22-147.75.109.163:38102.service: Deactivated successfully. Feb 9 10:35:43.468855 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 10:35:43.469210 systemd-logind[1465]: Session 18 logged out. Waiting for processes to exit. Feb 9 10:35:43.469821 systemd-logind[1465]: Removed session 18. Feb 9 10:35:43.381000 audit[6561]: CRED_ACQ pid=6561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:43.564721 kernel: audit: type=1101 audit(1707474943.380:1510): pid=6561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:43.564766 kernel: audit: type=1103 audit(1707474943.381:1511): pid=6561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:43.564788 kernel: audit: type=1006 audit(1707474943.381:1512): pid=6561 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 9 10:35:43.623290 kernel: audit: type=1300 audit(1707474943.381:1512): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfd0aacd0 a2=3 a3=0 items=0 ppid=1 pid=6561 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:43.381000 audit[6561]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfd0aacd0 a2=3 a3=0 items=0 ppid=1 pid=6561 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:43.715258 kernel: audit: type=1327 audit(1707474943.381:1512): proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:43.381000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:43.745756 kernel: audit: type=1105 audit(1707474943.387:1513): pid=6561 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:43.387000 audit[6561]: USER_START pid=6561 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:43.840199 kernel: audit: type=1103 audit(1707474943.387:1514): pid=6563 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:43.387000 audit[6563]: CRED_ACQ pid=6563 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:43.929418 kernel: audit: type=1106 audit(1707474943.466:1515): pid=6561 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:43.466000 audit[6561]: USER_END pid=6561 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:43.466000 audit[6561]: CRED_DISP pid=6561 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:44.114081 kernel: audit: type=1104 audit(1707474943.466:1516): pid=6561 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:43.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.49.59:22-147.75.109.163:38102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:48.476677 systemd[1]: Started sshd@16-147.75.49.59:22-147.75.109.163:55530.service. Feb 9 10:35:48.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.49.59:22-147.75.109.163:55530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:48.503922 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:35:48.503995 kernel: audit: type=1130 audit(1707474948.475:1518): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.49.59:22-147.75.109.163:55530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:48.614000 audit[6588]: USER_ACCT pid=6588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:48.615578 sshd[6588]: Accepted publickey for core from 147.75.109.163 port 55530 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:35:48.616633 sshd[6588]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:35:48.619043 systemd-logind[1465]: New session 19 of user core. Feb 9 10:35:48.619474 systemd[1]: Started session-19.scope. Feb 9 10:35:48.698614 sshd[6588]: pam_unix(sshd:session): session closed for user core Feb 9 10:35:48.700070 systemd[1]: sshd@16-147.75.49.59:22-147.75.109.163:55530.service: Deactivated successfully. Feb 9 10:35:48.700514 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 10:35:48.700918 systemd-logind[1465]: Session 19 logged out. Waiting for processes to exit. Feb 9 10:35:48.701318 systemd-logind[1465]: Removed session 19. Feb 9 10:35:48.615000 audit[6588]: CRED_ACQ pid=6588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:48.797276 kernel: audit: type=1101 audit(1707474948.614:1519): pid=6588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:48.797312 kernel: audit: type=1103 audit(1707474948.615:1520): pid=6588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:48.797328 kernel: audit: type=1006 audit(1707474948.615:1521): pid=6588 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 9 10:35:48.855831 kernel: audit: type=1300 audit(1707474948.615:1521): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca234c6d0 a2=3 a3=0 items=0 ppid=1 pid=6588 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:48.615000 audit[6588]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca234c6d0 a2=3 a3=0 items=0 ppid=1 pid=6588 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:48.615000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:48.978418 kernel: audit: type=1327 audit(1707474948.615:1521): proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:48.978448 kernel: audit: type=1105 audit(1707474948.620:1522): pid=6588 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:48.620000 audit[6588]: USER_START pid=6588 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:49.072890 kernel: audit: type=1103 audit(1707474948.620:1523): pid=6590 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:48.620000 audit[6590]: CRED_ACQ pid=6590 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:49.162086 kernel: audit: type=1106 audit(1707474948.697:1524): pid=6588 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:48.697000 audit[6588]: USER_END pid=6588 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:49.257588 kernel: audit: type=1104 audit(1707474948.698:1525): pid=6588 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:48.698000 audit[6588]: CRED_DISP pid=6588 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:48.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.49.59:22-147.75.109.163:55530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:53.710003 systemd[1]: Started sshd@17-147.75.49.59:22-147.75.109.163:55544.service. Feb 9 10:35:53.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.49.59:22-147.75.109.163:55544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:53.737394 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:35:53.737444 kernel: audit: type=1130 audit(1707474953.709:1527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.49.59:22-147.75.109.163:55544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:53.848000 audit[6614]: USER_ACCT pid=6614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:53.849503 sshd[6614]: Accepted publickey for core from 147.75.109.163 port 55544 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:35:53.851064 sshd[6614]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:35:53.853342 systemd-logind[1465]: New session 20 of user core. Feb 9 10:35:53.853885 systemd[1]: Started session-20.scope. Feb 9 10:35:53.849000 audit[6614]: CRED_ACQ pid=6614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:54.033508 kernel: audit: type=1101 audit(1707474953.848:1528): pid=6614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:54.033546 kernel: audit: type=1103 audit(1707474953.849:1529): pid=6614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:54.033563 kernel: audit: type=1006 audit(1707474953.849:1530): pid=6614 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Feb 9 10:35:54.092104 kernel: audit: type=1300 audit(1707474953.849:1530): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd4e07b90 a2=3 a3=0 items=0 ppid=1 pid=6614 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:53.849000 audit[6614]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd4e07b90 a2=3 a3=0 items=0 ppid=1 pid=6614 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:54.184129 kernel: audit: type=1327 audit(1707474953.849:1530): proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:53.849000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:54.184385 sshd[6614]: pam_unix(sshd:session): session closed for user core Feb 9 10:35:54.185824 systemd[1]: sshd@17-147.75.49.59:22-147.75.109.163:55544.service: Deactivated successfully. Feb 9 10:35:54.186255 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 10:35:54.186676 systemd-logind[1465]: Session 20 logged out. Waiting for processes to exit. Feb 9 10:35:54.187214 systemd-logind[1465]: Removed session 20. Feb 9 10:35:54.214650 kernel: audit: type=1105 audit(1707474953.854:1531): pid=6614 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:53.854000 audit[6614]: USER_START pid=6614 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:54.309156 kernel: audit: type=1103 audit(1707474953.855:1532): pid=6616 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:53.855000 audit[6616]: CRED_ACQ pid=6616 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:54.398412 kernel: audit: type=1106 audit(1707474954.183:1533): pid=6614 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:54.183000 audit[6614]: USER_END pid=6614 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:54.493887 kernel: audit: type=1104 audit(1707474954.183:1534): pid=6614 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:54.183000 audit[6614]: CRED_DISP pid=6614 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:54.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.49.59:22-147.75.109.163:55544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:59.137510 systemd[1]: Started sshd@18-147.75.49.59:22-147.75.109.163:38432.service. Feb 9 10:35:59.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.49.59:22-147.75.109.163:38432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:59.164634 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:35:59.164734 kernel: audit: type=1130 audit(1707474959.136:1536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.49.59:22-147.75.109.163:38432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:35:59.276752 sshd[6660]: Accepted publickey for core from 147.75.109.163 port 38432 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:35:59.275000 audit[6660]: USER_ACCT pid=6660 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:59.278087 sshd[6660]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:35:59.280433 systemd-logind[1465]: New session 21 of user core. Feb 9 10:35:59.280950 systemd[1]: Started session-21.scope. Feb 9 10:35:59.359188 sshd[6660]: pam_unix(sshd:session): session closed for user core Feb 9 10:35:59.360824 systemd[1]: sshd@18-147.75.49.59:22-147.75.109.163:38432.service: Deactivated successfully. Feb 9 10:35:59.361250 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 10:35:59.361748 systemd-logind[1465]: Session 21 logged out. Waiting for processes to exit. Feb 9 10:35:59.362277 systemd-logind[1465]: Removed session 21. Feb 9 10:35:59.276000 audit[6660]: CRED_ACQ pid=6660 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:59.458596 kernel: audit: type=1101 audit(1707474959.275:1537): pid=6660 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:59.458652 kernel: audit: type=1103 audit(1707474959.276:1538): pid=6660 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:59.458670 kernel: audit: type=1006 audit(1707474959.276:1539): pid=6660 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 9 10:35:59.517174 kernel: audit: type=1300 audit(1707474959.276:1539): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf710f550 a2=3 a3=0 items=0 ppid=1 pid=6660 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:59.276000 audit[6660]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf710f550 a2=3 a3=0 items=0 ppid=1 pid=6660 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:35:59.609188 kernel: audit: type=1327 audit(1707474959.276:1539): proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:59.276000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:35:59.639699 kernel: audit: type=1105 audit(1707474959.282:1540): pid=6660 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:59.282000 audit[6660]: USER_START pid=6660 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:59.734220 kernel: audit: type=1103 audit(1707474959.283:1541): pid=6662 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:59.283000 audit[6662]: CRED_ACQ pid=6662 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:59.823418 kernel: audit: type=1106 audit(1707474959.358:1542): pid=6660 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:59.358000 audit[6660]: USER_END pid=6660 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:59.918932 kernel: audit: type=1104 audit(1707474959.358:1543): pid=6660 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:59.358000 audit[6660]: CRED_DISP pid=6660 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:35:59.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.49.59:22-147.75.109.163:38432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:04.372481 systemd[1]: Started sshd@19-147.75.49.59:22-147.75.109.163:38438.service. Feb 9 10:36:04.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.49.59:22-147.75.109.163:38438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:04.407594 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:36:04.407704 kernel: audit: type=1130 audit(1707474964.371:1545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.49.59:22-147.75.109.163:38438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:04.517279 sshd[6720]: Accepted publickey for core from 147.75.109.163 port 38438 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:36:04.515000 audit[6720]: USER_ACCT pid=6720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.519669 sshd[6720]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:36:04.522008 systemd-logind[1465]: New session 22 of user core. Feb 9 10:36:04.522624 systemd[1]: Started session-22.scope. Feb 9 10:36:04.518000 audit[6720]: CRED_ACQ pid=6720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.611165 sshd[6720]: pam_unix(sshd:session): session closed for user core Feb 9 10:36:04.613040 systemd[1]: sshd@19-147.75.49.59:22-147.75.109.163:38438.service: Deactivated successfully. Feb 9 10:36:04.613382 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 10:36:04.613748 systemd-logind[1465]: Session 22 logged out. Waiting for processes to exit. Feb 9 10:36:04.614293 systemd[1]: Started sshd@20-147.75.49.59:22-147.75.109.163:35046.service. Feb 9 10:36:04.614810 systemd-logind[1465]: Removed session 22. Feb 9 10:36:04.699405 kernel: audit: type=1101 audit(1707474964.515:1546): pid=6720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.699446 kernel: audit: type=1103 audit(1707474964.518:1547): pid=6720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.699476 kernel: audit: type=1006 audit(1707474964.518:1548): pid=6720 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 10:36:04.758025 kernel: audit: type=1300 audit(1707474964.518:1548): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf77a7400 a2=3 a3=0 items=0 ppid=1 pid=6720 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:04.518000 audit[6720]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf77a7400 a2=3 a3=0 items=0 ppid=1 pid=6720 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:04.779928 sshd[6745]: Accepted publickey for core from 147.75.109.163 port 35046 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:36:04.781509 sshd[6745]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:36:04.783850 systemd-logind[1465]: New session 23 of user core. Feb 9 10:36:04.784321 systemd[1]: Started session-23.scope. Feb 9 10:36:04.518000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:04.880588 kernel: audit: type=1327 audit(1707474964.518:1548): proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:04.880684 kernel: audit: type=1105 audit(1707474964.523:1549): pid=6720 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.523000 audit[6720]: USER_START pid=6720 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.975219 kernel: audit: type=1103 audit(1707474964.523:1550): pid=6722 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.523000 audit[6722]: CRED_ACQ pid=6722 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.980923 sshd[6745]: pam_unix(sshd:session): session closed for user core Feb 9 10:36:04.983114 systemd[1]: sshd@20-147.75.49.59:22-147.75.109.163:35046.service: Deactivated successfully. Feb 9 10:36:04.983521 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 10:36:04.983828 systemd-logind[1465]: Session 23 logged out. Waiting for processes to exit. Feb 9 10:36:04.984636 systemd[1]: Started sshd@21-147.75.49.59:22-147.75.109.163:35060.service. Feb 9 10:36:04.985235 systemd-logind[1465]: Removed session 23. Feb 9 10:36:04.610000 audit[6720]: USER_END pid=6720 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:05.160105 kernel: audit: type=1106 audit(1707474964.610:1551): pid=6720 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:05.160145 kernel: audit: type=1104 audit(1707474964.610:1552): pid=6720 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.610000 audit[6720]: CRED_DISP pid=6720 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:05.181808 sshd[6768]: Accepted publickey for core from 147.75.109.163 port 35060 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:36:05.182628 sshd[6768]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:36:05.184715 systemd-logind[1465]: New session 24 of user core. Feb 9 10:36:05.185214 systemd[1]: Started session-24.scope. Feb 9 10:36:04.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.49.59:22-147.75.109.163:38438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:04.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.49.59:22-147.75.109.163:35046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:04.778000 audit[6745]: USER_ACCT pid=6745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.779000 audit[6745]: CRED_ACQ pid=6745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.779000 audit[6745]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeee85aa0 a2=3 a3=0 items=0 ppid=1 pid=6745 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:04.779000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:04.785000 audit[6745]: USER_START pid=6745 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.785000 audit[6747]: CRED_ACQ pid=6747 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.980000 audit[6745]: USER_END pid=6745 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.980000 audit[6745]: CRED_DISP pid=6745 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:04.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.49.59:22-147.75.109.163:35046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:04.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.49.59:22-147.75.109.163:35060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:05.180000 audit[6768]: USER_ACCT pid=6768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:05.181000 audit[6768]: CRED_ACQ pid=6768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:05.181000 audit[6768]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4a6b7f50 a2=3 a3=0 items=0 ppid=1 pid=6768 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:05.181000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:05.185000 audit[6768]: USER_START pid=6768 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:05.186000 audit[6770]: CRED_ACQ pid=6770 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:05.263318 sshd[6768]: pam_unix(sshd:session): session closed for user core Feb 9 10:36:05.262000 audit[6768]: USER_END pid=6768 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:05.262000 audit[6768]: CRED_DISP pid=6768 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:05.264838 systemd[1]: sshd@21-147.75.49.59:22-147.75.109.163:35060.service: Deactivated successfully. Feb 9 10:36:05.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.49.59:22-147.75.109.163:35060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:05.265269 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 10:36:05.265706 systemd-logind[1465]: Session 24 logged out. Waiting for processes to exit. Feb 9 10:36:05.266237 systemd-logind[1465]: Removed session 24. Feb 9 10:36:10.272681 systemd[1]: Started sshd@22-147.75.49.59:22-147.75.109.163:35062.service. Feb 9 10:36:10.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.49.59:22-147.75.109.163:35062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:10.299527 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 10:36:10.299574 kernel: audit: type=1130 audit(1707474970.271:1572): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.49.59:22-147.75.109.163:35062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:10.408000 audit[6795]: USER_ACCT pid=6795 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:10.410466 sshd[6795]: Accepted publickey for core from 147.75.109.163 port 35062 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:36:10.411603 sshd[6795]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:36:10.414014 systemd-logind[1465]: New session 25 of user core. Feb 9 10:36:10.414488 systemd[1]: Started session-25.scope. Feb 9 10:36:10.493215 sshd[6795]: pam_unix(sshd:session): session closed for user core Feb 9 10:36:10.494659 systemd[1]: sshd@22-147.75.49.59:22-147.75.109.163:35062.service: Deactivated successfully. Feb 9 10:36:10.495121 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 10:36:10.495486 systemd-logind[1465]: Session 25 logged out. Waiting for processes to exit. Feb 9 10:36:10.495979 systemd-logind[1465]: Removed session 25. Feb 9 10:36:10.410000 audit[6795]: CRED_ACQ pid=6795 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:10.592402 kernel: audit: type=1101 audit(1707474970.408:1573): pid=6795 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:10.592442 kernel: audit: type=1103 audit(1707474970.410:1574): pid=6795 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:10.592459 kernel: audit: type=1006 audit(1707474970.410:1575): pid=6795 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 10:36:10.651017 kernel: audit: type=1300 audit(1707474970.410:1575): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6466e770 a2=3 a3=0 items=0 ppid=1 pid=6795 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:10.410000 audit[6795]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6466e770 a2=3 a3=0 items=0 ppid=1 pid=6795 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:10.743029 kernel: audit: type=1327 audit(1707474970.410:1575): proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:10.410000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:10.773563 kernel: audit: type=1105 audit(1707474970.415:1576): pid=6795 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:10.415000 audit[6795]: USER_START pid=6795 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:10.868005 kernel: audit: type=1103 audit(1707474970.415:1577): pid=6797 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:10.415000 audit[6797]: CRED_ACQ pid=6797 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:10.957209 kernel: audit: type=1106 audit(1707474970.492:1578): pid=6795 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:10.492000 audit[6795]: USER_END pid=6795 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:11.052659 kernel: audit: type=1104 audit(1707474970.492:1579): pid=6795 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:10.492000 audit[6795]: CRED_DISP pid=6795 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:10.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.49.59:22-147.75.109.163:35062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:12.750000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:36:12.750000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026611c0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:36:12.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:36:12.751000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:36:12.751000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f22e70 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:36:12.751000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:36:12.794000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:36:12.794000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c014daed20 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:36:12.794000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:36:12.794000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:36:12.794000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0080a4030 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:36:12.794000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:36:12.794000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:36:12.794000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00d04b7a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:36:12.794000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:36:12.794000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:36:12.794000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0060486e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:36:12.794000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:36:12.794000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:36:12.794000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0138d0d20 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:36:12.794000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:36:12.794000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:36:12.794000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0040f3360 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:36:12.794000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:36:15.505615 systemd[1]: Started sshd@23-147.75.49.59:22-147.75.109.163:38250.service. Feb 9 10:36:15.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.49.59:22-147.75.109.163:38250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:15.533021 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:36:15.533094 kernel: audit: type=1130 audit(1707474975.504:1589): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.49.59:22-147.75.109.163:38250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:15.645263 sshd[6822]: Accepted publickey for core from 147.75.109.163 port 38250 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:36:15.643000 audit[6822]: USER_ACCT pid=6822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:15.646798 sshd[6822]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:36:15.649347 systemd-logind[1465]: New session 26 of user core. Feb 9 10:36:15.649890 systemd[1]: Started session-26.scope. Feb 9 10:36:15.732593 sshd[6822]: pam_unix(sshd:session): session closed for user core Feb 9 10:36:15.734072 systemd[1]: sshd@23-147.75.49.59:22-147.75.109.163:38250.service: Deactivated successfully. Feb 9 10:36:15.734533 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 10:36:15.734969 systemd-logind[1465]: Session 26 logged out. Waiting for processes to exit. Feb 9 10:36:15.735428 systemd-logind[1465]: Removed session 26. Feb 9 10:36:15.645000 audit[6822]: CRED_ACQ pid=6822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:15.827060 kernel: audit: type=1101 audit(1707474975.643:1590): pid=6822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:15.827097 kernel: audit: type=1103 audit(1707474975.645:1591): pid=6822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:15.827114 kernel: audit: type=1006 audit(1707474975.645:1592): pid=6822 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 10:36:15.885613 kernel: audit: type=1300 audit(1707474975.645:1592): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6bd02110 a2=3 a3=0 items=0 ppid=1 pid=6822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:15.645000 audit[6822]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6bd02110 a2=3 a3=0 items=0 ppid=1 pid=6822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:15.977592 kernel: audit: type=1327 audit(1707474975.645:1592): proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:15.645000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:15.650000 audit[6822]: USER_START pid=6822 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:16.102523 kernel: audit: type=1105 audit(1707474975.650:1593): pid=6822 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:16.102559 kernel: audit: type=1103 audit(1707474975.651:1594): pid=6824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:15.651000 audit[6824]: CRED_ACQ pid=6824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:16.191759 kernel: audit: type=1106 audit(1707474975.731:1595): pid=6822 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:15.731000 audit[6822]: USER_END pid=6822 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:16.287217 kernel: audit: type=1104 audit(1707474975.732:1596): pid=6822 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:15.732000 audit[6822]: CRED_DISP pid=6822 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:15.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.49.59:22-147.75.109.163:38250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:16.568000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:36:16.568000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00128e260 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:36:16.568000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:36:16.569000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:36:16.569000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00128e2a0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:36:16.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:36:16.569000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:36:16.569000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001a9f660 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:36:16.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:36:16.569000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:36:16.569000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00132fc00 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:36:16.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:36:20.744630 systemd[1]: Started sshd@24-147.75.49.59:22-147.75.109.163:38264.service. Feb 9 10:36:20.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.49.59:22-147.75.109.163:38264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:20.783480 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:36:20.783580 kernel: audit: type=1130 audit(1707474980.743:1602): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.49.59:22-147.75.109.163:38264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:20.891000 audit[6848]: USER_ACCT pid=6848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:20.893087 sshd[6848]: Accepted publickey for core from 147.75.109.163 port 38264 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:36:20.894686 sshd[6848]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:36:20.897063 systemd-logind[1465]: New session 27 of user core. Feb 9 10:36:20.897576 systemd[1]: Started session-27.scope. Feb 9 10:36:20.976561 sshd[6848]: pam_unix(sshd:session): session closed for user core Feb 9 10:36:20.977953 systemd[1]: sshd@24-147.75.49.59:22-147.75.109.163:38264.service: Deactivated successfully. Feb 9 10:36:20.978398 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 10:36:20.978765 systemd-logind[1465]: Session 27 logged out. Waiting for processes to exit. Feb 9 10:36:20.979222 systemd-logind[1465]: Removed session 27. Feb 9 10:36:20.984421 kernel: audit: type=1101 audit(1707474980.891:1603): pid=6848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:20.984461 kernel: audit: type=1103 audit(1707474980.893:1604): pid=6848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:20.893000 audit[6848]: CRED_ACQ pid=6848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:21.075394 kernel: audit: type=1006 audit(1707474980.893:1605): pid=6848 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 10:36:20.893000 audit[6848]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe728c5660 a2=3 a3=0 items=0 ppid=1 pid=6848 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:21.225523 kernel: audit: type=1300 audit(1707474980.893:1605): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe728c5660 a2=3 a3=0 items=0 ppid=1 pid=6848 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:21.225553 kernel: audit: type=1327 audit(1707474980.893:1605): proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:20.893000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:21.256065 kernel: audit: type=1105 audit(1707474980.898:1606): pid=6848 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:20.898000 audit[6848]: USER_START pid=6848 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:21.350580 kernel: audit: type=1103 audit(1707474980.899:1607): pid=6851 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:20.899000 audit[6851]: CRED_ACQ pid=6851 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:21.439786 kernel: audit: type=1106 audit(1707474980.975:1608): pid=6848 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:20.975000 audit[6848]: USER_END pid=6848 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:21.535295 kernel: audit: type=1104 audit(1707474980.975:1609): pid=6848 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:20.975000 audit[6848]: CRED_DISP pid=6848 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:20.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.49.59:22-147.75.109.163:38264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:25.986133 systemd[1]: Started sshd@25-147.75.49.59:22-147.75.109.163:53180.service. Feb 9 10:36:25.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.49.59:22-147.75.109.163:53180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:26.013020 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:36:26.013088 kernel: audit: type=1130 audit(1707474985.984:1611): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.49.59:22-147.75.109.163:53180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:26.123000 audit[6911]: USER_ACCT pid=6911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:26.124718 sshd[6911]: Accepted publickey for core from 147.75.109.163 port 53180 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:36:26.126653 sshd[6911]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:36:26.129009 systemd-logind[1465]: New session 28 of user core. Feb 9 10:36:26.129518 systemd[1]: Started session-28.scope. Feb 9 10:36:26.125000 audit[6911]: CRED_ACQ pid=6911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:26.216350 kernel: audit: type=1101 audit(1707474986.123:1612): pid=6911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:26.216382 kernel: audit: type=1103 audit(1707474986.125:1613): pid=6911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:26.220851 sshd[6911]: pam_unix(sshd:session): session closed for user core Feb 9 10:36:26.222231 systemd[1]: sshd@25-147.75.49.59:22-147.75.109.163:53180.service: Deactivated successfully. Feb 9 10:36:26.222671 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 10:36:26.223021 systemd-logind[1465]: Session 28 logged out. Waiting for processes to exit. Feb 9 10:36:26.223511 systemd-logind[1465]: Removed session 28. Feb 9 10:36:26.365086 kernel: audit: type=1006 audit(1707474986.125:1614): pid=6911 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 10:36:26.365124 kernel: audit: type=1300 audit(1707474986.125:1614): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd6086900 a2=3 a3=0 items=0 ppid=1 pid=6911 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:26.125000 audit[6911]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd6086900 a2=3 a3=0 items=0 ppid=1 pid=6911 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:26.125000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:26.487585 kernel: audit: type=1327 audit(1707474986.125:1614): proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:26.487615 kernel: audit: type=1105 audit(1707474986.130:1615): pid=6911 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:26.130000 audit[6911]: USER_START pid=6911 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:26.582198 kernel: audit: type=1103 audit(1707474986.130:1616): pid=6913 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:26.130000 audit[6913]: CRED_ACQ pid=6913 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:26.671347 kernel: audit: type=1106 audit(1707474986.220:1617): pid=6911 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:26.220000 audit[6911]: USER_END pid=6911 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:26.220000 audit[6911]: CRED_DISP pid=6911 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:26.856032 kernel: audit: type=1104 audit(1707474986.220:1618): pid=6911 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:26.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.49.59:22-147.75.109.163:53180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:31.230167 systemd[1]: Started sshd@26-147.75.49.59:22-147.75.109.163:53186.service. Feb 9 10:36:31.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.49.59:22-147.75.109.163:53186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:31.257135 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:36:31.257219 kernel: audit: type=1130 audit(1707474991.228:1620): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.49.59:22-147.75.109.163:53186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:31.369335 sshd[6940]: Accepted publickey for core from 147.75.109.163 port 53186 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:36:31.367000 audit[6940]: USER_ACCT pid=6940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:31.370661 sshd[6940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:36:31.373033 systemd-logind[1465]: New session 29 of user core. Feb 9 10:36:31.373537 systemd[1]: Started session-29.scope. Feb 9 10:36:31.369000 audit[6940]: CRED_ACQ pid=6940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:31.551087 kernel: audit: type=1101 audit(1707474991.367:1621): pid=6940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:31.551155 kernel: audit: type=1103 audit(1707474991.369:1622): pid=6940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:31.551198 kernel: audit: type=1006 audit(1707474991.369:1623): pid=6940 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 9 10:36:31.369000 audit[6940]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1c31e400 a2=3 a3=0 items=0 ppid=1 pid=6940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:31.701648 kernel: audit: type=1300 audit(1707474991.369:1623): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1c31e400 a2=3 a3=0 items=0 ppid=1 pid=6940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:31.701746 kernel: audit: type=1327 audit(1707474991.369:1623): proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:31.369000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:31.701938 sshd[6940]: pam_unix(sshd:session): session closed for user core Feb 9 10:36:31.703367 systemd[1]: sshd@26-147.75.49.59:22-147.75.109.163:53186.service: Deactivated successfully. Feb 9 10:36:31.703796 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 10:36:31.704170 systemd-logind[1465]: Session 29 logged out. Waiting for processes to exit. Feb 9 10:36:31.704666 systemd-logind[1465]: Removed session 29. Feb 9 10:36:31.374000 audit[6940]: USER_START pid=6940 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:31.826759 kernel: audit: type=1105 audit(1707474991.374:1624): pid=6940 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:31.375000 audit[6942]: CRED_ACQ pid=6942 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:31.827426 kernel: audit: type=1103 audit(1707474991.375:1625): pid=6942 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:31.701000 audit[6940]: USER_END pid=6940 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:31.916428 kernel: audit: type=1106 audit(1707474991.701:1626): pid=6940 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:31.701000 audit[6940]: CRED_DISP pid=6940 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:32.100699 kernel: audit: type=1104 audit(1707474991.701:1627): pid=6940 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:31.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.49.59:22-147.75.109.163:53186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:36.657048 systemd[1]: Started sshd@27-147.75.49.59:22-147.75.109.163:45632.service. Feb 9 10:36:36.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.49.59:22-147.75.109.163:45632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:36.697397 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:36:36.697489 kernel: audit: type=1130 audit(1707474996.656:1629): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.49.59:22-147.75.109.163:45632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:36.806000 audit[6996]: USER_ACCT pid=6996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:36.808488 sshd[6996]: Accepted publickey for core from 147.75.109.163 port 45632 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:36:36.809667 sshd[6996]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:36:36.812004 systemd-logind[1465]: New session 30 of user core. Feb 9 10:36:36.812521 systemd[1]: Started session-30.scope. Feb 9 10:36:36.890719 sshd[6996]: pam_unix(sshd:session): session closed for user core Feb 9 10:36:36.892049 systemd[1]: sshd@27-147.75.49.59:22-147.75.109.163:45632.service: Deactivated successfully. Feb 9 10:36:36.892485 systemd[1]: session-30.scope: Deactivated successfully. Feb 9 10:36:36.892851 systemd-logind[1465]: Session 30 logged out. Waiting for processes to exit. Feb 9 10:36:36.893278 systemd-logind[1465]: Removed session 30. Feb 9 10:36:36.808000 audit[6996]: CRED_ACQ pid=6996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:36.900413 kernel: audit: type=1101 audit(1707474996.806:1630): pid=6996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:36.900440 kernel: audit: type=1103 audit(1707474996.808:1631): pid=6996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:37.049130 kernel: audit: type=1006 audit(1707474996.808:1632): pid=6996 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Feb 9 10:36:37.049169 kernel: audit: type=1300 audit(1707474996.808:1632): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef41c6340 a2=3 a3=0 items=0 ppid=1 pid=6996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:36.808000 audit[6996]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef41c6340 a2=3 a3=0 items=0 ppid=1 pid=6996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:37.141085 kernel: audit: type=1327 audit(1707474996.808:1632): proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:36.808000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:37.171566 kernel: audit: type=1105 audit(1707474996.813:1633): pid=6996 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:36.813000 audit[6996]: USER_START pid=6996 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:37.266071 kernel: audit: type=1103 audit(1707474996.814:1634): pid=6998 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:36.814000 audit[6998]: CRED_ACQ pid=6998 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:37.355382 kernel: audit: type=1106 audit(1707474996.890:1635): pid=6996 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:36.890000 audit[6996]: USER_END pid=6996 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:36.890000 audit[6996]: CRED_DISP pid=6996 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:37.540080 kernel: audit: type=1104 audit(1707474996.890:1636): pid=6996 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:36.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.49.59:22-147.75.109.163:45632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:41.900079 systemd[1]: Started sshd@28-147.75.49.59:22-147.75.109.163:45640.service. Feb 9 10:36:41.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.49.59:22-147.75.109.163:45640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:41.927035 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:36:41.927072 kernel: audit: type=1130 audit(1707475001.898:1638): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.49.59:22-147.75.109.163:45640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:42.037000 audit[7022]: USER_ACCT pid=7022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:42.038627 sshd[7022]: Accepted publickey for core from 147.75.109.163 port 45640 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:36:42.040016 sshd[7022]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:36:42.042325 systemd-logind[1465]: New session 31 of user core. Feb 9 10:36:42.042904 systemd[1]: Started session-31.scope. Feb 9 10:36:42.122129 sshd[7022]: pam_unix(sshd:session): session closed for user core Feb 9 10:36:42.123519 systemd[1]: sshd@28-147.75.49.59:22-147.75.109.163:45640.service: Deactivated successfully. Feb 9 10:36:42.123951 systemd[1]: session-31.scope: Deactivated successfully. Feb 9 10:36:42.124221 systemd-logind[1465]: Session 31 logged out. Waiting for processes to exit. Feb 9 10:36:42.124790 systemd-logind[1465]: Removed session 31. Feb 9 10:36:42.038000 audit[7022]: CRED_ACQ pid=7022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:42.220297 kernel: audit: type=1101 audit(1707475002.037:1639): pid=7022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:42.220346 kernel: audit: type=1103 audit(1707475002.038:1640): pid=7022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:42.220369 kernel: audit: type=1006 audit(1707475002.038:1641): pid=7022 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Feb 9 10:36:42.278839 kernel: audit: type=1300 audit(1707475002.038:1641): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1a451440 a2=3 a3=0 items=0 ppid=1 pid=7022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:42.038000 audit[7022]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1a451440 a2=3 a3=0 items=0 ppid=1 pid=7022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:42.370840 kernel: audit: type=1327 audit(1707475002.038:1641): proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:42.038000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:42.401334 kernel: audit: type=1105 audit(1707475002.043:1642): pid=7022 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:42.043000 audit[7022]: USER_START pid=7022 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:42.495804 kernel: audit: type=1103 audit(1707475002.044:1643): pid=7024 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:42.044000 audit[7024]: CRED_ACQ pid=7024 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:42.584996 kernel: audit: type=1106 audit(1707475002.121:1644): pid=7022 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:42.121000 audit[7022]: USER_END pid=7022 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:42.121000 audit[7022]: CRED_DISP pid=7022 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:42.769666 kernel: audit: type=1104 audit(1707475002.121:1645): pid=7022 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:42.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.49.59:22-147.75.109.163:45640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:47.131785 systemd[1]: Started sshd@29-147.75.49.59:22-147.75.109.163:57252.service. Feb 9 10:36:47.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.49.59:22-147.75.109.163:57252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:47.158813 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:36:47.158911 kernel: audit: type=1130 audit(1707475007.130:1647): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.49.59:22-147.75.109.163:57252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:47.269000 audit[7047]: USER_ACCT pid=7047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:47.271577 sshd[7047]: Accepted publickey for core from 147.75.109.163 port 57252 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:36:47.275527 sshd[7047]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:36:47.286056 systemd-logind[1465]: New session 32 of user core. Feb 9 10:36:47.288666 systemd[1]: Started session-32.scope. Feb 9 10:36:47.273000 audit[7047]: CRED_ACQ pid=7047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:47.375498 sshd[7047]: pam_unix(sshd:session): session closed for user core Feb 9 10:36:47.376983 systemd[1]: sshd@29-147.75.49.59:22-147.75.109.163:57252.service: Deactivated successfully. Feb 9 10:36:47.377430 systemd[1]: session-32.scope: Deactivated successfully. Feb 9 10:36:47.377856 systemd-logind[1465]: Session 32 logged out. Waiting for processes to exit. Feb 9 10:36:47.378309 systemd-logind[1465]: Removed session 32. Feb 9 10:36:47.452992 kernel: audit: type=1101 audit(1707475007.269:1648): pid=7047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:47.453029 kernel: audit: type=1103 audit(1707475007.273:1649): pid=7047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:47.453046 kernel: audit: type=1006 audit(1707475007.273:1650): pid=7047 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Feb 9 10:36:47.511544 kernel: audit: type=1300 audit(1707475007.273:1650): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5d427ff0 a2=3 a3=0 items=0 ppid=1 pid=7047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:47.273000 audit[7047]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5d427ff0 a2=3 a3=0 items=0 ppid=1 pid=7047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:47.603530 kernel: audit: type=1327 audit(1707475007.273:1650): proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:47.273000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:47.634005 kernel: audit: type=1105 audit(1707475007.296:1651): pid=7047 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:47.296000 audit[7047]: USER_START pid=7047 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:47.297000 audit[7049]: CRED_ACQ pid=7049 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:47.817643 kernel: audit: type=1103 audit(1707475007.297:1652): pid=7049 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:47.817678 kernel: audit: type=1106 audit(1707475007.374:1653): pid=7047 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:47.374000 audit[7047]: USER_END pid=7047 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:47.913077 kernel: audit: type=1104 audit(1707475007.374:1654): pid=7047 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:47.374000 audit[7047]: CRED_DISP pid=7047 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:47.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.49.59:22-147.75.109.163:57252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:52.385418 systemd[1]: Started sshd@30-147.75.49.59:22-147.75.109.163:57268.service. Feb 9 10:36:52.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.49.59:22-147.75.109.163:57268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:52.411759 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:36:52.411805 kernel: audit: type=1130 audit(1707475012.384:1656): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.49.59:22-147.75.109.163:57268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:52.521980 sshd[7073]: Accepted publickey for core from 147.75.109.163 port 57268 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:36:52.520000 audit[7073]: USER_ACCT pid=7073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:52.523659 sshd[7073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:36:52.526106 systemd-logind[1465]: New session 33 of user core. Feb 9 10:36:52.526661 systemd[1]: Started session-33.scope. Feb 9 10:36:52.605778 sshd[7073]: pam_unix(sshd:session): session closed for user core Feb 9 10:36:52.607037 systemd[1]: sshd@30-147.75.49.59:22-147.75.109.163:57268.service: Deactivated successfully. Feb 9 10:36:52.607483 systemd[1]: session-33.scope: Deactivated successfully. Feb 9 10:36:52.607898 systemd-logind[1465]: Session 33 logged out. Waiting for processes to exit. Feb 9 10:36:52.608760 systemd-logind[1465]: Removed session 33. Feb 9 10:36:52.522000 audit[7073]: CRED_ACQ pid=7073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:52.703832 kernel: audit: type=1101 audit(1707475012.520:1657): pid=7073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:52.703871 kernel: audit: type=1103 audit(1707475012.522:1658): pid=7073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:52.703888 kernel: audit: type=1006 audit(1707475012.522:1659): pid=7073 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 Feb 9 10:36:52.762420 kernel: audit: type=1300 audit(1707475012.522:1659): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe77f37140 a2=3 a3=0 items=0 ppid=1 pid=7073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:52.522000 audit[7073]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe77f37140 a2=3 a3=0 items=0 ppid=1 pid=7073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:52.782133 systemd[1]: Started sshd@31-147.75.49.59:22-218.92.0.28:35124.service. Feb 9 10:36:52.854354 kernel: audit: type=1327 audit(1707475012.522:1659): proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:52.522000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:52.884866 kernel: audit: type=1105 audit(1707475012.527:1660): pid=7073 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:52.527000 audit[7073]: USER_START pid=7073 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:52.979346 kernel: audit: type=1103 audit(1707475012.528:1661): pid=7075 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:52.528000 audit[7075]: CRED_ACQ pid=7075 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:52.979459 sshd[7097]: Unable to negotiate with 218.92.0.28 port 35124: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 10:36:52.979863 systemd[1]: sshd@31-147.75.49.59:22-218.92.0.28:35124.service: Deactivated successfully. Feb 9 10:36:53.068641 kernel: audit: type=1106 audit(1707475012.604:1662): pid=7073 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:52.604000 audit[7073]: USER_END pid=7073 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:53.164141 kernel: audit: type=1104 audit(1707475012.605:1663): pid=7073 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:52.605000 audit[7073]: CRED_DISP pid=7073 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:52.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.49.59:22-147.75.109.163:57268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:52.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.49.59:22-218.92.0.28:35124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:52.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.49.59:22-218.92.0.28:35124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:57.615996 systemd[1]: Started sshd@32-147.75.49.59:22-147.75.109.163:60382.service. Feb 9 10:36:57.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.49.59:22-147.75.109.163:60382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:57.642828 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 10:36:57.642909 kernel: audit: type=1130 audit(1707475017.614:1667): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.49.59:22-147.75.109.163:60382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:36:57.753000 audit[7121]: USER_ACCT pid=7121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:57.754675 sshd[7121]: Accepted publickey for core from 147.75.109.163 port 60382 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:36:57.756366 sshd[7121]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:36:57.758853 systemd-logind[1465]: New session 34 of user core. Feb 9 10:36:57.759308 systemd[1]: Started session-34.scope. Feb 9 10:36:57.838317 sshd[7121]: pam_unix(sshd:session): session closed for user core Feb 9 10:36:57.839834 systemd[1]: sshd@32-147.75.49.59:22-147.75.109.163:60382.service: Deactivated successfully. Feb 9 10:36:57.840267 systemd[1]: session-34.scope: Deactivated successfully. Feb 9 10:36:57.840650 systemd-logind[1465]: Session 34 logged out. Waiting for processes to exit. Feb 9 10:36:57.841366 systemd-logind[1465]: Removed session 34. Feb 9 10:36:57.754000 audit[7121]: CRED_ACQ pid=7121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:57.936351 kernel: audit: type=1101 audit(1707475017.753:1668): pid=7121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:57.936387 kernel: audit: type=1103 audit(1707475017.754:1669): pid=7121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:57.936408 kernel: audit: type=1006 audit(1707475017.754:1670): pid=7121 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=34 res=1 Feb 9 10:36:57.994897 kernel: audit: type=1300 audit(1707475017.754:1670): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1c0c17a0 a2=3 a3=0 items=0 ppid=1 pid=7121 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:57.754000 audit[7121]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1c0c17a0 a2=3 a3=0 items=0 ppid=1 pid=7121 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:36:58.086946 kernel: audit: type=1327 audit(1707475017.754:1670): proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:57.754000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:36:58.117414 kernel: audit: type=1105 audit(1707475017.760:1671): pid=7121 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:57.760000 audit[7121]: USER_START pid=7121 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:58.211871 kernel: audit: type=1103 audit(1707475017.760:1672): pid=7123 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:57.760000 audit[7123]: CRED_ACQ pid=7123 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:58.301002 kernel: audit: type=1106 audit(1707475017.837:1673): pid=7121 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:57.837000 audit[7121]: USER_END pid=7121 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:58.396424 kernel: audit: type=1104 audit(1707475017.837:1674): pid=7121 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:57.837000 audit[7121]: CRED_DISP pid=7121 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:36:57.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.49.59:22-147.75.109.163:60382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:02.849820 systemd[1]: Started sshd@33-147.75.49.59:22-147.75.109.163:60398.service. Feb 9 10:37:02.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.49.59:22-147.75.109.163:60398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:02.877392 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:37:02.877459 kernel: audit: type=1130 audit(1707475022.848:1676): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.49.59:22-147.75.109.163:60398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:02.987000 audit[7175]: USER_ACCT pid=7175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:02.988590 sshd[7175]: Accepted publickey for core from 147.75.109.163 port 60398 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:37:02.990805 sshd[7175]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:37:02.993202 systemd-logind[1465]: New session 35 of user core. Feb 9 10:37:02.993718 systemd[1]: Started session-35.scope. Feb 9 10:37:03.072515 sshd[7175]: pam_unix(sshd:session): session closed for user core Feb 9 10:37:03.073979 systemd[1]: sshd@33-147.75.49.59:22-147.75.109.163:60398.service: Deactivated successfully. Feb 9 10:37:03.074418 systemd[1]: session-35.scope: Deactivated successfully. Feb 9 10:37:03.074816 systemd-logind[1465]: Session 35 logged out. Waiting for processes to exit. Feb 9 10:37:03.075734 systemd-logind[1465]: Removed session 35. Feb 9 10:37:02.989000 audit[7175]: CRED_ACQ pid=7175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:03.170230 kernel: audit: type=1101 audit(1707475022.987:1677): pid=7175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:03.170265 kernel: audit: type=1103 audit(1707475022.989:1678): pid=7175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:03.170279 kernel: audit: type=1006 audit(1707475022.989:1679): pid=7175 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=35 res=1 Feb 9 10:37:02.989000 audit[7175]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1fb58360 a2=3 a3=0 items=0 ppid=1 pid=7175 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:03.320662 kernel: audit: type=1300 audit(1707475022.989:1679): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1fb58360 a2=3 a3=0 items=0 ppid=1 pid=7175 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:03.320692 kernel: audit: type=1327 audit(1707475022.989:1679): proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:02.989000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:03.351156 kernel: audit: type=1105 audit(1707475022.994:1680): pid=7175 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:02.994000 audit[7175]: USER_START pid=7175 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:03.445571 kernel: audit: type=1103 audit(1707475022.995:1681): pid=7178 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:02.995000 audit[7178]: CRED_ACQ pid=7178 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:03.534664 kernel: audit: type=1106 audit(1707475023.071:1682): pid=7175 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:03.071000 audit[7175]: USER_END pid=7175 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:03.630082 kernel: audit: type=1104 audit(1707475023.071:1683): pid=7175 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:03.071000 audit[7175]: CRED_DISP pid=7175 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:03.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.49.59:22-147.75.109.163:60398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:08.084050 systemd[1]: Started sshd@34-147.75.49.59:22-147.75.109.163:34998.service. Feb 9 10:37:08.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.49.59:22-147.75.109.163:34998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:08.111296 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:37:08.111379 kernel: audit: type=1130 audit(1707475028.083:1685): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.49.59:22-147.75.109.163:34998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:08.222000 audit[7216]: USER_ACCT pid=7216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:08.223470 sshd[7216]: Accepted publickey for core from 147.75.109.163 port 34998 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:37:08.224234 sshd[7216]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:37:08.226616 systemd-logind[1465]: New session 36 of user core. Feb 9 10:37:08.227035 systemd[1]: Started session-36.scope. Feb 9 10:37:08.307302 sshd[7216]: pam_unix(sshd:session): session closed for user core Feb 9 10:37:08.308729 systemd[1]: sshd@34-147.75.49.59:22-147.75.109.163:34998.service: Deactivated successfully. Feb 9 10:37:08.309199 systemd[1]: session-36.scope: Deactivated successfully. Feb 9 10:37:08.309557 systemd-logind[1465]: Session 36 logged out. Waiting for processes to exit. Feb 9 10:37:08.310279 systemd-logind[1465]: Removed session 36. Feb 9 10:37:08.222000 audit[7216]: CRED_ACQ pid=7216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:08.405006 kernel: audit: type=1101 audit(1707475028.222:1686): pid=7216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:08.405049 kernel: audit: type=1103 audit(1707475028.222:1687): pid=7216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:08.405074 kernel: audit: type=1006 audit(1707475028.222:1688): pid=7216 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=36 res=1 Feb 9 10:37:08.463529 kernel: audit: type=1300 audit(1707475028.222:1688): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5b2d5550 a2=3 a3=0 items=0 ppid=1 pid=7216 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:08.222000 audit[7216]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5b2d5550 a2=3 a3=0 items=0 ppid=1 pid=7216 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:08.555418 kernel: audit: type=1327 audit(1707475028.222:1688): proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:08.222000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:08.585857 kernel: audit: type=1105 audit(1707475028.228:1689): pid=7216 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:08.228000 audit[7216]: USER_START pid=7216 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:08.228000 audit[7218]: CRED_ACQ pid=7218 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:08.769357 kernel: audit: type=1103 audit(1707475028.228:1690): pid=7218 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:08.769394 kernel: audit: type=1106 audit(1707475028.306:1691): pid=7216 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:08.306000 audit[7216]: USER_END pid=7216 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:08.864714 kernel: audit: type=1104 audit(1707475028.306:1692): pid=7216 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:08.306000 audit[7216]: CRED_DISP pid=7216 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:08.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.49.59:22-147.75.109.163:34998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:12.753000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:37:12.753000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f1ffe0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:37:12.753000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:37:12.753000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:37:12.753000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0022881e0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:37:12.753000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:37:12.796000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:37:12.796000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0069ee200 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:37:12.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:37:12.796000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:37:12.796000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c009cea900 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:37:12.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:37:12.796000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:37:12.796000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c012e6a600 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:37:12.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:37:12.796000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:37:12.796000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006d28810 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:37:12.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:37:12.796000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:37:12.796000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0141e5560 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:37:12.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:37:12.796000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:37:12.796000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c013a9f3e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:37:12.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:37:13.316573 systemd[1]: Started sshd@35-147.75.49.59:22-147.75.109.163:35008.service. Feb 9 10:37:13.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.49.59:22-147.75.109.163:35008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:13.343764 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:37:13.343828 kernel: audit: type=1130 audit(1707475033.316:1702): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.49.59:22-147.75.109.163:35008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:13.455000 audit[7242]: USER_ACCT pid=7242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:13.455562 sshd[7242]: Accepted publickey for core from 147.75.109.163 port 35008 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:37:13.457101 sshd[7242]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:37:13.459559 systemd-logind[1465]: New session 37 of user core. Feb 9 10:37:13.460265 systemd[1]: Started session-37.scope. Feb 9 10:37:13.541100 sshd[7242]: pam_unix(sshd:session): session closed for user core Feb 9 10:37:13.542612 systemd[1]: sshd@35-147.75.49.59:22-147.75.109.163:35008.service: Deactivated successfully. Feb 9 10:37:13.543128 systemd[1]: session-37.scope: Deactivated successfully. Feb 9 10:37:13.543580 systemd-logind[1465]: Session 37 logged out. Waiting for processes to exit. Feb 9 10:37:13.543990 systemd-logind[1465]: Removed session 37. Feb 9 10:37:13.456000 audit[7242]: CRED_ACQ pid=7242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:13.639407 kernel: audit: type=1101 audit(1707475033.455:1703): pid=7242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:13.639464 kernel: audit: type=1103 audit(1707475033.456:1704): pid=7242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:13.639481 kernel: audit: type=1006 audit(1707475033.456:1705): pid=7242 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=37 res=1 Feb 9 10:37:13.456000 audit[7242]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd84bf61b0 a2=3 a3=0 items=0 ppid=1 pid=7242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:13.789819 kernel: audit: type=1300 audit(1707475033.456:1705): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd84bf61b0 a2=3 a3=0 items=0 ppid=1 pid=7242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:13.789850 kernel: audit: type=1327 audit(1707475033.456:1705): proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:13.456000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:13.820285 kernel: audit: type=1105 audit(1707475033.462:1706): pid=7242 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:13.462000 audit[7242]: USER_START pid=7242 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:13.914659 kernel: audit: type=1103 audit(1707475033.463:1707): pid=7244 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:13.463000 audit[7244]: CRED_ACQ pid=7244 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:13.541000 audit[7242]: USER_END pid=7242 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:14.099219 kernel: audit: type=1106 audit(1707475033.541:1708): pid=7242 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:14.099252 kernel: audit: type=1104 audit(1707475033.541:1709): pid=7242 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:13.541000 audit[7242]: CRED_DISP pid=7242 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:13.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.49.59:22-147.75.109.163:35008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:16.569000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:37:16.569000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027c8d60 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:37:16.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:37:16.571000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:37:16.571000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f8bf00 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:37:16.571000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:37:16.571000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:37:16.571000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:37:16.571000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a9fa60 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:37:16.571000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:37:16.571000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001490ee0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:37:16.571000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:37:18.552980 systemd[1]: Started sshd@36-147.75.49.59:22-147.75.109.163:47202.service. Feb 9 10:37:18.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.49.59:22-147.75.109.163:47202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:18.592996 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:37:18.593098 kernel: audit: type=1130 audit(1707475038.553:1715): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.49.59:22-147.75.109.163:47202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:18.702000 audit[7270]: USER_ACCT pid=7270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:18.702734 sshd[7270]: Accepted publickey for core from 147.75.109.163 port 47202 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:37:18.703632 sshd[7270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:37:18.706007 systemd-logind[1465]: New session 38 of user core. Feb 9 10:37:18.706486 systemd[1]: Started session-38.scope. Feb 9 10:37:18.785089 sshd[7270]: pam_unix(sshd:session): session closed for user core Feb 9 10:37:18.786359 systemd[1]: sshd@36-147.75.49.59:22-147.75.109.163:47202.service: Deactivated successfully. Feb 9 10:37:18.786800 systemd[1]: session-38.scope: Deactivated successfully. Feb 9 10:37:18.787099 systemd-logind[1465]: Session 38 logged out. Waiting for processes to exit. Feb 9 10:37:18.787515 systemd-logind[1465]: Removed session 38. Feb 9 10:37:18.703000 audit[7270]: CRED_ACQ pid=7270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:18.884416 kernel: audit: type=1101 audit(1707475038.702:1716): pid=7270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:18.884451 kernel: audit: type=1103 audit(1707475038.703:1717): pid=7270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:18.884467 kernel: audit: type=1006 audit(1707475038.703:1718): pid=7270 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=38 res=1 Feb 9 10:37:18.703000 audit[7270]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0b78d0f0 a2=3 a3=0 items=0 ppid=1 pid=7270 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:19.034888 kernel: audit: type=1300 audit(1707475038.703:1718): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0b78d0f0 a2=3 a3=0 items=0 ppid=1 pid=7270 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:19.034930 kernel: audit: type=1327 audit(1707475038.703:1718): proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:18.703000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:19.065404 kernel: audit: type=1105 audit(1707475038.708:1719): pid=7270 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:18.708000 audit[7270]: USER_START pid=7270 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:19.159838 kernel: audit: type=1103 audit(1707475038.708:1720): pid=7272 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:18.708000 audit[7272]: CRED_ACQ pid=7272 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:19.248992 kernel: audit: type=1106 audit(1707475038.785:1721): pid=7270 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:18.785000 audit[7270]: USER_END pid=7270 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:19.344424 kernel: audit: type=1104 audit(1707475038.785:1722): pid=7270 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:18.785000 audit[7270]: CRED_DISP pid=7270 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:18.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.49.59:22-147.75.109.163:47202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:23.796710 systemd[1]: Started sshd@37-147.75.49.59:22-147.75.109.163:47206.service. Feb 9 10:37:23.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.49.59:22-147.75.109.163:47206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:23.836747 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:37:23.836853 kernel: audit: type=1130 audit(1707475043.797:1724): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.49.59:22-147.75.109.163:47206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:23.946000 audit[7295]: USER_ACCT pid=7295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:23.946595 sshd[7295]: Accepted publickey for core from 147.75.109.163 port 47206 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:37:23.947710 sshd[7295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:37:23.949978 systemd-logind[1465]: New session 39 of user core. Feb 9 10:37:23.950409 systemd[1]: Started session-39.scope. Feb 9 10:37:24.029296 sshd[7295]: pam_unix(sshd:session): session closed for user core Feb 9 10:37:24.030836 systemd[1]: sshd@37-147.75.49.59:22-147.75.109.163:47206.service: Deactivated successfully. Feb 9 10:37:24.031307 systemd[1]: session-39.scope: Deactivated successfully. Feb 9 10:37:24.031678 systemd-logind[1465]: Session 39 logged out. Waiting for processes to exit. Feb 9 10:37:24.032150 systemd-logind[1465]: Removed session 39. Feb 9 10:37:23.947000 audit[7295]: CRED_ACQ pid=7295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:24.128254 kernel: audit: type=1101 audit(1707475043.946:1725): pid=7295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:24.128293 kernel: audit: type=1103 audit(1707475043.947:1726): pid=7295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:24.128311 kernel: audit: type=1006 audit(1707475043.947:1727): pid=7295 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=39 res=1 Feb 9 10:37:24.186801 kernel: audit: type=1300 audit(1707475043.947:1727): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3917e770 a2=3 a3=0 items=0 ppid=1 pid=7295 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:23.947000 audit[7295]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3917e770 a2=3 a3=0 items=0 ppid=1 pid=7295 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:24.278755 kernel: audit: type=1327 audit(1707475043.947:1727): proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:23.947000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:24.309264 kernel: audit: type=1105 audit(1707475043.952:1728): pid=7295 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:23.952000 audit[7295]: USER_START pid=7295 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:24.403760 kernel: audit: type=1103 audit(1707475043.952:1729): pid=7297 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:23.952000 audit[7297]: CRED_ACQ pid=7297 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:24.029000 audit[7295]: USER_END pid=7295 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:24.588537 kernel: audit: type=1106 audit(1707475044.029:1730): pid=7295 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:24.588574 kernel: audit: type=1104 audit(1707475044.029:1731): pid=7295 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:24.029000 audit[7295]: CRED_DISP pid=7295 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:24.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.49.59:22-147.75.109.163:47206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:29.039602 systemd[1]: Started sshd@38-147.75.49.59:22-147.75.109.163:46368.service. Feb 9 10:37:29.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.49.59:22-147.75.109.163:46368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:29.066644 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:37:29.066820 kernel: audit: type=1130 audit(1707475049.039:1733): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.49.59:22-147.75.109.163:46368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:29.178000 audit[7358]: USER_ACCT pid=7358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:29.178570 sshd[7358]: Accepted publickey for core from 147.75.109.163 port 46368 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:37:29.179662 sshd[7358]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:37:29.181984 systemd-logind[1465]: New session 40 of user core. Feb 9 10:37:29.182745 systemd[1]: Started session-40.scope. Feb 9 10:37:29.264269 sshd[7358]: pam_unix(sshd:session): session closed for user core Feb 9 10:37:29.265628 systemd[1]: sshd@38-147.75.49.59:22-147.75.109.163:46368.service: Deactivated successfully. Feb 9 10:37:29.266104 systemd[1]: session-40.scope: Deactivated successfully. Feb 9 10:37:29.266478 systemd-logind[1465]: Session 40 logged out. Waiting for processes to exit. Feb 9 10:37:29.266896 systemd-logind[1465]: Removed session 40. Feb 9 10:37:29.179000 audit[7358]: CRED_ACQ pid=7358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:29.361793 kernel: audit: type=1101 audit(1707475049.178:1734): pid=7358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:29.361833 kernel: audit: type=1103 audit(1707475049.179:1735): pid=7358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:29.361851 kernel: audit: type=1006 audit(1707475049.179:1736): pid=7358 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=40 res=1 Feb 9 10:37:29.179000 audit[7358]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd85f431c0 a2=3 a3=0 items=0 ppid=1 pid=7358 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:29.179000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:29.542971 kernel: audit: type=1300 audit(1707475049.179:1736): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd85f431c0 a2=3 a3=0 items=0 ppid=1 pid=7358 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:29.543004 kernel: audit: type=1327 audit(1707475049.179:1736): proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:29.543021 kernel: audit: type=1105 audit(1707475049.184:1737): pid=7358 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:29.184000 audit[7358]: USER_START pid=7358 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:29.185000 audit[7360]: CRED_ACQ pid=7360 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:29.726702 kernel: audit: type=1103 audit(1707475049.185:1738): pid=7360 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:29.726780 kernel: audit: type=1106 audit(1707475049.264:1739): pid=7358 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:29.264000 audit[7358]: USER_END pid=7358 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:29.264000 audit[7358]: CRED_DISP pid=7358 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:29.911571 kernel: audit: type=1104 audit(1707475049.264:1740): pid=7358 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:29.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.49.59:22-147.75.109.163:46368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:34.277595 systemd[1]: Started sshd@39-147.75.49.59:22-147.75.109.163:46376.service. Feb 9 10:37:34.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.49.59:22-147.75.109.163:46376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:34.305350 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:37:34.305592 kernel: audit: type=1130 audit(1707475054.276:1742): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.49.59:22-147.75.109.163:46376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:34.416322 sshd[7412]: Accepted publickey for core from 147.75.109.163 port 46376 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:37:34.414000 audit[7412]: USER_ACCT pid=7412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:34.418607 sshd[7412]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:37:34.421119 systemd-logind[1465]: New session 41 of user core. Feb 9 10:37:34.421942 systemd[1]: Started session-41.scope. Feb 9 10:37:34.502610 sshd[7412]: pam_unix(sshd:session): session closed for user core Feb 9 10:37:34.504030 systemd[1]: sshd@39-147.75.49.59:22-147.75.109.163:46376.service: Deactivated successfully. Feb 9 10:37:34.504535 systemd[1]: session-41.scope: Deactivated successfully. Feb 9 10:37:34.504898 systemd-logind[1465]: Session 41 logged out. Waiting for processes to exit. Feb 9 10:37:34.505290 systemd-logind[1465]: Removed session 41. Feb 9 10:37:34.417000 audit[7412]: CRED_ACQ pid=7412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:34.598817 kernel: audit: type=1101 audit(1707475054.414:1743): pid=7412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:34.598881 kernel: audit: type=1103 audit(1707475054.417:1744): pid=7412 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:34.598899 kernel: audit: type=1006 audit(1707475054.417:1745): pid=7412 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=41 res=1 Feb 9 10:37:34.417000 audit[7412]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8d693e60 a2=3 a3=0 items=0 ppid=1 pid=7412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:34.749615 kernel: audit: type=1300 audit(1707475054.417:1745): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8d693e60 a2=3 a3=0 items=0 ppid=1 pid=7412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:34.749660 kernel: audit: type=1327 audit(1707475054.417:1745): proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:34.417000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:34.422000 audit[7412]: USER_START pid=7412 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:34.874709 kernel: audit: type=1105 audit(1707475054.422:1746): pid=7412 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:34.423000 audit[7417]: CRED_ACQ pid=7417 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:34.875345 kernel: audit: type=1103 audit(1707475054.423:1747): pid=7417 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:34.501000 audit[7412]: USER_END pid=7412 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:35.059505 kernel: audit: type=1106 audit(1707475054.501:1748): pid=7412 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:35.059587 kernel: audit: type=1104 audit(1707475054.501:1749): pid=7412 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:34.501000 audit[7412]: CRED_DISP pid=7412 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:34.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.49.59:22-147.75.109.163:46376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:39.515566 systemd[1]: Started sshd@40-147.75.49.59:22-147.75.109.163:49506.service. Feb 9 10:37:39.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.49.59:22-147.75.109.163:49506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:39.543721 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:37:39.543779 kernel: audit: type=1130 audit(1707475059.514:1751): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.49.59:22-147.75.109.163:49506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:39.654000 audit[7439]: USER_ACCT pid=7439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:39.656353 sshd[7439]: Accepted publickey for core from 147.75.109.163 port 49506 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:37:39.657291 sshd[7439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:37:39.659809 systemd-logind[1465]: New session 42 of user core. Feb 9 10:37:39.660221 systemd[1]: Started session-42.scope. Feb 9 10:37:39.739473 sshd[7439]: pam_unix(sshd:session): session closed for user core Feb 9 10:37:39.740923 systemd[1]: sshd@40-147.75.49.59:22-147.75.109.163:49506.service: Deactivated successfully. Feb 9 10:37:39.741361 systemd[1]: session-42.scope: Deactivated successfully. Feb 9 10:37:39.741766 systemd-logind[1465]: Session 42 logged out. Waiting for processes to exit. Feb 9 10:37:39.742236 systemd-logind[1465]: Removed session 42. Feb 9 10:37:39.655000 audit[7439]: CRED_ACQ pid=7439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:39.838065 kernel: audit: type=1101 audit(1707475059.654:1752): pid=7439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:39.838102 kernel: audit: type=1103 audit(1707475059.655:1753): pid=7439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:39.838119 kernel: audit: type=1006 audit(1707475059.655:1754): pid=7439 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=42 res=1 Feb 9 10:37:39.896632 kernel: audit: type=1300 audit(1707475059.655:1754): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6ad70cb0 a2=3 a3=0 items=0 ppid=1 pid=7439 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:39.655000 audit[7439]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6ad70cb0 a2=3 a3=0 items=0 ppid=1 pid=7439 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:39.988654 kernel: audit: type=1327 audit(1707475059.655:1754): proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:39.655000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:40.019166 kernel: audit: type=1105 audit(1707475059.661:1755): pid=7439 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:39.661000 audit[7439]: USER_START pid=7439 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:40.113662 kernel: audit: type=1103 audit(1707475059.661:1756): pid=7441 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:39.661000 audit[7441]: CRED_ACQ pid=7441 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:40.202889 kernel: audit: type=1106 audit(1707475059.738:1757): pid=7439 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:39.738000 audit[7439]: USER_END pid=7439 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:40.298414 kernel: audit: type=1104 audit(1707475059.738:1758): pid=7439 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:39.738000 audit[7439]: CRED_DISP pid=7439 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:39.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.49.59:22-147.75.109.163:49506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:44.749017 systemd[1]: Started sshd@41-147.75.49.59:22-147.75.109.163:53670.service. Feb 9 10:37:44.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.49.59:22-147.75.109.163:53670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:44.776031 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:37:44.776082 kernel: audit: type=1130 audit(1707475064.747:1760): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.49.59:22-147.75.109.163:53670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:44.892000 audit[7465]: USER_ACCT pid=7465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:44.893785 sshd[7465]: Accepted publickey for core from 147.75.109.163 port 53670 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:37:44.894638 sshd[7465]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:37:44.896956 systemd-logind[1465]: New session 43 of user core. Feb 9 10:37:44.897639 systemd[1]: Started session-43.scope. Feb 9 10:37:44.977422 sshd[7465]: pam_unix(sshd:session): session closed for user core Feb 9 10:37:44.978846 systemd[1]: sshd@41-147.75.49.59:22-147.75.109.163:53670.service: Deactivated successfully. Feb 9 10:37:44.979314 systemd[1]: session-43.scope: Deactivated successfully. Feb 9 10:37:44.979687 systemd-logind[1465]: Session 43 logged out. Waiting for processes to exit. Feb 9 10:37:44.980123 systemd-logind[1465]: Removed session 43. Feb 9 10:37:44.893000 audit[7465]: CRED_ACQ pid=7465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:45.075597 kernel: audit: type=1101 audit(1707475064.892:1761): pid=7465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:45.075648 kernel: audit: type=1103 audit(1707475064.893:1762): pid=7465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:45.075688 kernel: audit: type=1006 audit(1707475064.893:1763): pid=7465 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=43 res=1 Feb 9 10:37:45.134197 kernel: audit: type=1300 audit(1707475064.893:1763): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0ee65320 a2=3 a3=0 items=0 ppid=1 pid=7465 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:44.893000 audit[7465]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0ee65320 a2=3 a3=0 items=0 ppid=1 pid=7465 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:45.226177 kernel: audit: type=1327 audit(1707475064.893:1763): proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:44.893000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:45.256712 kernel: audit: type=1105 audit(1707475064.898:1764): pid=7465 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:44.898000 audit[7465]: USER_START pid=7465 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:45.351206 kernel: audit: type=1103 audit(1707475064.899:1765): pid=7467 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:44.899000 audit[7467]: CRED_ACQ pid=7467 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:45.440424 kernel: audit: type=1106 audit(1707475064.976:1766): pid=7465 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:44.976000 audit[7465]: USER_END pid=7465 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:45.535882 kernel: audit: type=1104 audit(1707475064.976:1767): pid=7465 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:44.976000 audit[7465]: CRED_DISP pid=7465 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:44.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.49.59:22-147.75.109.163:53670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:49.987817 systemd[1]: Started sshd@42-147.75.49.59:22-147.75.109.163:53686.service. Feb 9 10:37:49.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.49.59:22-147.75.109.163:53686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:50.015059 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:37:50.015127 kernel: audit: type=1130 audit(1707475069.986:1769): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.49.59:22-147.75.109.163:53686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:50.124000 audit[7491]: USER_ACCT pid=7491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:50.126271 sshd[7491]: Accepted publickey for core from 147.75.109.163 port 53686 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:37:50.127890 sshd[7491]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:37:50.130175 systemd-logind[1465]: New session 44 of user core. Feb 9 10:37:50.130926 systemd[1]: Started session-44.scope. Feb 9 10:37:50.126000 audit[7491]: CRED_ACQ pid=7491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:50.310076 kernel: audit: type=1101 audit(1707475070.124:1770): pid=7491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:50.310121 kernel: audit: type=1103 audit(1707475070.126:1771): pid=7491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:50.310139 kernel: audit: type=1006 audit(1707475070.126:1772): pid=7491 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=44 res=1 Feb 9 10:37:50.368680 kernel: audit: type=1300 audit(1707475070.126:1772): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe22da59b0 a2=3 a3=0 items=0 ppid=1 pid=7491 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:50.126000 audit[7491]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe22da59b0 a2=3 a3=0 items=0 ppid=1 pid=7491 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:50.126000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:50.460927 sshd[7491]: pam_unix(sshd:session): session closed for user core Feb 9 10:37:50.462284 systemd[1]: sshd@42-147.75.49.59:22-147.75.109.163:53686.service: Deactivated successfully. Feb 9 10:37:50.462754 systemd[1]: session-44.scope: Deactivated successfully. Feb 9 10:37:50.463106 systemd-logind[1465]: Session 44 logged out. Waiting for processes to exit. Feb 9 10:37:50.463578 systemd-logind[1465]: Removed session 44. Feb 9 10:37:50.491207 kernel: audit: type=1327 audit(1707475070.126:1772): proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:50.491240 kernel: audit: type=1105 audit(1707475070.131:1773): pid=7491 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:50.131000 audit[7491]: USER_START pid=7491 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:50.585717 kernel: audit: type=1103 audit(1707475070.132:1774): pid=7493 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:50.132000 audit[7493]: CRED_ACQ pid=7493 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:50.674872 kernel: audit: type=1106 audit(1707475070.460:1775): pid=7491 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:50.460000 audit[7491]: USER_END pid=7491 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:50.770354 kernel: audit: type=1104 audit(1707475070.460:1776): pid=7491 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:50.460000 audit[7491]: CRED_DISP pid=7491 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:50.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.49.59:22-147.75.109.163:53686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:55.414519 systemd[1]: Started sshd@43-147.75.49.59:22-147.75.109.163:59092.service. Feb 9 10:37:55.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.49.59:22-147.75.109.163:59092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:55.441419 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:37:55.441465 kernel: audit: type=1130 audit(1707475075.413:1778): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.49.59:22-147.75.109.163:59092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:37:55.552000 audit[7537]: USER_ACCT pid=7537 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:55.553671 sshd[7537]: Accepted publickey for core from 147.75.109.163 port 59092 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:37:55.555452 sshd[7537]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:37:55.557597 systemd-logind[1465]: New session 45 of user core. Feb 9 10:37:55.558282 systemd[1]: Started session-45.scope. Feb 9 10:37:55.637947 sshd[7537]: pam_unix(sshd:session): session closed for user core Feb 9 10:37:55.639160 systemd[1]: sshd@43-147.75.49.59:22-147.75.109.163:59092.service: Deactivated successfully. Feb 9 10:37:55.639614 systemd[1]: session-45.scope: Deactivated successfully. Feb 9 10:37:55.639956 systemd-logind[1465]: Session 45 logged out. Waiting for processes to exit. Feb 9 10:37:55.640363 systemd-logind[1465]: Removed session 45. Feb 9 10:37:55.553000 audit[7537]: CRED_ACQ pid=7537 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:55.735314 kernel: audit: type=1101 audit(1707475075.552:1779): pid=7537 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:55.735354 kernel: audit: type=1103 audit(1707475075.553:1780): pid=7537 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:55.735370 kernel: audit: type=1006 audit(1707475075.553:1781): pid=7537 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=45 res=1 Feb 9 10:37:55.793846 kernel: audit: type=1300 audit(1707475075.553:1781): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff69b7d2b0 a2=3 a3=0 items=0 ppid=1 pid=7537 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:55.553000 audit[7537]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff69b7d2b0 a2=3 a3=0 items=0 ppid=1 pid=7537 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:37:55.885780 kernel: audit: type=1327 audit(1707475075.553:1781): proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:55.553000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:37:55.916254 kernel: audit: type=1105 audit(1707475075.559:1782): pid=7537 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:55.559000 audit[7537]: USER_START pid=7537 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:56.010691 kernel: audit: type=1103 audit(1707475075.559:1783): pid=7539 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:55.559000 audit[7539]: CRED_ACQ pid=7539 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:56.099800 kernel: audit: type=1106 audit(1707475075.637:1784): pid=7537 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:55.637000 audit[7537]: USER_END pid=7537 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:55.637000 audit[7537]: CRED_DISP pid=7537 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:56.284357 kernel: audit: type=1104 audit(1707475075.637:1785): pid=7537 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:37:55.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.49.59:22-147.75.109.163:59092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:00.647148 systemd[1]: Started sshd@44-147.75.49.59:22-147.75.109.163:59096.service. Feb 9 10:38:00.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.49.59:22-147.75.109.163:59096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:00.674212 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:38:00.674275 kernel: audit: type=1130 audit(1707475080.645:1787): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.49.59:22-147.75.109.163:59096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:00.784000 audit[7562]: USER_ACCT pid=7562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:00.785799 sshd[7562]: Accepted publickey for core from 147.75.109.163 port 59096 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:38:00.786625 sshd[7562]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:38:00.788798 systemd-logind[1465]: New session 46 of user core. Feb 9 10:38:00.789252 systemd[1]: Started session-46.scope. Feb 9 10:38:00.869176 sshd[7562]: pam_unix(sshd:session): session closed for user core Feb 9 10:38:00.870598 systemd[1]: sshd@44-147.75.49.59:22-147.75.109.163:59096.service: Deactivated successfully. Feb 9 10:38:00.871069 systemd[1]: session-46.scope: Deactivated successfully. Feb 9 10:38:00.871410 systemd-logind[1465]: Session 46 logged out. Waiting for processes to exit. Feb 9 10:38:00.871844 systemd-logind[1465]: Removed session 46. Feb 9 10:38:00.785000 audit[7562]: CRED_ACQ pid=7562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:00.967424 kernel: audit: type=1101 audit(1707475080.784:1788): pid=7562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:00.967468 kernel: audit: type=1103 audit(1707475080.785:1789): pid=7562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:00.967488 kernel: audit: type=1006 audit(1707475080.785:1790): pid=7562 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=46 res=1 Feb 9 10:38:00.785000 audit[7562]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd725d7e40 a2=3 a3=0 items=0 ppid=1 pid=7562 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:01.117844 kernel: audit: type=1300 audit(1707475080.785:1790): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd725d7e40 a2=3 a3=0 items=0 ppid=1 pid=7562 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:01.117916 kernel: audit: type=1327 audit(1707475080.785:1790): proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:00.785000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:01.148336 kernel: audit: type=1105 audit(1707475080.789:1791): pid=7562 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:00.789000 audit[7562]: USER_START pid=7562 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:01.242692 kernel: audit: type=1103 audit(1707475080.790:1792): pid=7564 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:00.790000 audit[7564]: CRED_ACQ pid=7564 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:01.331804 kernel: audit: type=1106 audit(1707475080.868:1793): pid=7562 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:00.868000 audit[7562]: USER_END pid=7562 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:01.427190 kernel: audit: type=1104 audit(1707475080.868:1794): pid=7562 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:00.868000 audit[7562]: CRED_DISP pid=7562 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:00.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.49.59:22-147.75.109.163:59096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:05.881900 systemd[1]: Started sshd@45-147.75.49.59:22-147.75.109.163:43368.service. Feb 9 10:38:05.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.49.59:22-147.75.109.163:43368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:05.909557 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:38:05.909633 kernel: audit: type=1130 audit(1707475085.881:1796): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.49.59:22-147.75.109.163:43368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:06.020625 sshd[7616]: Accepted publickey for core from 147.75.109.163 port 43368 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:38:06.019000 audit[7616]: USER_ACCT pid=7616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:06.021929 sshd[7616]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:38:06.024433 systemd-logind[1465]: New session 47 of user core. Feb 9 10:38:06.025153 systemd[1]: Started session-47.scope. Feb 9 10:38:06.104556 sshd[7616]: pam_unix(sshd:session): session closed for user core Feb 9 10:38:06.105834 systemd[1]: sshd@45-147.75.49.59:22-147.75.109.163:43368.service: Deactivated successfully. Feb 9 10:38:06.106280 systemd[1]: session-47.scope: Deactivated successfully. Feb 9 10:38:06.106647 systemd-logind[1465]: Session 47 logged out. Waiting for processes to exit. Feb 9 10:38:06.107165 systemd-logind[1465]: Removed session 47. Feb 9 10:38:06.020000 audit[7616]: CRED_ACQ pid=7616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:06.202350 kernel: audit: type=1101 audit(1707475086.019:1797): pid=7616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:06.202388 kernel: audit: type=1103 audit(1707475086.020:1798): pid=7616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:06.202408 kernel: audit: type=1006 audit(1707475086.020:1799): pid=7616 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=47 res=1 Feb 9 10:38:06.260869 kernel: audit: type=1300 audit(1707475086.020:1799): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3fab21f0 a2=3 a3=0 items=0 ppid=1 pid=7616 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:06.020000 audit[7616]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3fab21f0 a2=3 a3=0 items=0 ppid=1 pid=7616 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:06.352807 kernel: audit: type=1327 audit(1707475086.020:1799): proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:06.020000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:06.383270 kernel: audit: type=1105 audit(1707475086.026:1800): pid=7616 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:06.026000 audit[7616]: USER_START pid=7616 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:06.477819 kernel: audit: type=1103 audit(1707475086.026:1801): pid=7618 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:06.026000 audit[7618]: CRED_ACQ pid=7618 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:06.103000 audit[7616]: USER_END pid=7616 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:06.662300 kernel: audit: type=1106 audit(1707475086.103:1802): pid=7616 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:06.662365 kernel: audit: type=1104 audit(1707475086.103:1803): pid=7616 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:06.103000 audit[7616]: CRED_DISP pid=7616 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:06.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.49.59:22-147.75.109.163:43368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:11.114263 systemd[1]: Started sshd@46-147.75.49.59:22-147.75.109.163:43380.service. Feb 9 10:38:11.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.49.59:22-147.75.109.163:43380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:11.141285 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:38:11.141336 kernel: audit: type=1130 audit(1707475091.113:1805): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.49.59:22-147.75.109.163:43380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:11.251000 audit[7640]: USER_ACCT pid=7640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:11.253324 sshd[7640]: Accepted publickey for core from 147.75.109.163 port 43380 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:38:11.254646 sshd[7640]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:38:11.257046 systemd-logind[1465]: New session 48 of user core. Feb 9 10:38:11.257474 systemd[1]: Started session-48.scope. Feb 9 10:38:11.337443 sshd[7640]: pam_unix(sshd:session): session closed for user core Feb 9 10:38:11.338857 systemd[1]: sshd@46-147.75.49.59:22-147.75.109.163:43380.service: Deactivated successfully. Feb 9 10:38:11.339290 systemd[1]: session-48.scope: Deactivated successfully. Feb 9 10:38:11.339619 systemd-logind[1465]: Session 48 logged out. Waiting for processes to exit. Feb 9 10:38:11.340119 systemd-logind[1465]: Removed session 48. Feb 9 10:38:11.253000 audit[7640]: CRED_ACQ pid=7640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:11.434885 kernel: audit: type=1101 audit(1707475091.251:1806): pid=7640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:11.434920 kernel: audit: type=1103 audit(1707475091.253:1807): pid=7640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:11.434937 kernel: audit: type=1006 audit(1707475091.253:1808): pid=7640 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=48 res=1 Feb 9 10:38:11.493421 kernel: audit: type=1300 audit(1707475091.253:1808): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff73e7d730 a2=3 a3=0 items=0 ppid=1 pid=7640 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:11.253000 audit[7640]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff73e7d730 a2=3 a3=0 items=0 ppid=1 pid=7640 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:11.585331 kernel: audit: type=1327 audit(1707475091.253:1808): proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:11.253000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:11.615790 kernel: audit: type=1105 audit(1707475091.258:1809): pid=7640 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:11.258000 audit[7640]: USER_START pid=7640 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:11.710202 kernel: audit: type=1103 audit(1707475091.258:1810): pid=7642 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:11.258000 audit[7642]: CRED_ACQ pid=7642 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:11.799330 kernel: audit: type=1106 audit(1707475091.336:1811): pid=7640 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:11.336000 audit[7640]: USER_END pid=7640 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:11.894740 kernel: audit: type=1104 audit(1707475091.336:1812): pid=7640 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:11.336000 audit[7640]: CRED_DISP pid=7640 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:11.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.49.59:22-147.75.109.163:43380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:12.753000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:38:12.753000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024dd890 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:38:12.753000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:38:12.753000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:38:12.753000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0001b12e0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:38:12.753000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:38:12.796000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:38:12.796000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c012222020 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:38:12.796000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:38:12.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:38:12.796000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c005d59500 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:38:12.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:38:12.796000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:38:12.796000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0045a8d20 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:38:12.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:38:12.797000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:38:12.797000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00fa51ea0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:38:12.797000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:38:12.797000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:38:12.797000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00cf9c000 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:38:12.797000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:38:12.797000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:38:12.797000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c000b7c300 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:38:12.797000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:38:16.346106 systemd[1]: Started sshd@47-147.75.49.59:22-147.75.109.163:39330.service. Feb 9 10:38:16.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.49.59:22-147.75.109.163:39330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:16.373108 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:38:16.373166 kernel: audit: type=1130 audit(1707475096.344:1822): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.49.59:22-147.75.109.163:39330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:16.483000 audit[7666]: USER_ACCT pid=7666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:16.484646 sshd[7666]: Accepted publickey for core from 147.75.109.163 port 39330 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:38:16.485926 sshd[7666]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:38:16.488346 systemd-logind[1465]: New session 49 of user core. Feb 9 10:38:16.488858 systemd[1]: Started session-49.scope. Feb 9 10:38:16.568054 sshd[7666]: pam_unix(sshd:session): session closed for user core Feb 9 10:38:16.569394 systemd[1]: sshd@47-147.75.49.59:22-147.75.109.163:39330.service: Deactivated successfully. Feb 9 10:38:16.569825 systemd[1]: session-49.scope: Deactivated successfully. Feb 9 10:38:16.570156 systemd-logind[1465]: Session 49 logged out. Waiting for processes to exit. Feb 9 10:38:16.570659 systemd-logind[1465]: Removed session 49. Feb 9 10:38:16.484000 audit[7666]: CRED_ACQ pid=7666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:16.666282 kernel: audit: type=1101 audit(1707475096.483:1823): pid=7666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:16.666322 kernel: audit: type=1103 audit(1707475096.484:1824): pid=7666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:16.666344 kernel: audit: type=1006 audit(1707475096.484:1825): pid=7666 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=49 res=1 Feb 9 10:38:16.724837 kernel: audit: type=1300 audit(1707475096.484:1825): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4742e4c0 a2=3 a3=0 items=0 ppid=1 pid=7666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:16.484000 audit[7666]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4742e4c0 a2=3 a3=0 items=0 ppid=1 pid=7666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:16.816842 kernel: audit: type=1327 audit(1707475096.484:1825): proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:16.484000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:16.489000 audit[7666]: USER_START pid=7666 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:16.941726 kernel: audit: type=1105 audit(1707475096.489:1826): pid=7666 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:16.941782 kernel: audit: type=1103 audit(1707475096.490:1827): pid=7668 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:16.490000 audit[7668]: CRED_ACQ pid=7668 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:16.567000 audit[7666]: USER_END pid=7666 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:17.126366 kernel: audit: type=1106 audit(1707475096.567:1828): pid=7666 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:17.126420 kernel: audit: type=1104 audit(1707475096.567:1829): pid=7666 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:16.567000 audit[7666]: CRED_DISP pid=7666 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:16.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.49.59:22-147.75.109.163:39330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:16.569000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:38:16.569000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fb0ae0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:38:16.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:38:16.570000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:38:16.570000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ec1b80 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:38:16.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:38:16.570000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:38:16.570000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ec1ba0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:38:16.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:38:16.570000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:38:16.570000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ec1bc0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:38:16.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:38:21.579697 systemd[1]: Started sshd@48-147.75.49.59:22-147.75.109.163:39338.service. Feb 9 10:38:21.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.49.59:22-147.75.109.163:39338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:21.622518 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:38:21.622614 kernel: audit: type=1130 audit(1707475101.579:1835): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.49.59:22-147.75.109.163:39338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:21.733000 audit[7693]: USER_ACCT pid=7693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:21.733912 sshd[7693]: Accepted publickey for core from 147.75.109.163 port 39338 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:38:21.735642 sshd[7693]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:38:21.737981 systemd-logind[1465]: New session 50 of user core. Feb 9 10:38:21.738481 systemd[1]: Started session-50.scope. Feb 9 10:38:21.819876 sshd[7693]: pam_unix(sshd:session): session closed for user core Feb 9 10:38:21.821522 systemd[1]: sshd@48-147.75.49.59:22-147.75.109.163:39338.service: Deactivated successfully. Feb 9 10:38:21.821997 systemd[1]: session-50.scope: Deactivated successfully. Feb 9 10:38:21.822298 systemd-logind[1465]: Session 50 logged out. Waiting for processes to exit. Feb 9 10:38:21.822813 systemd-logind[1465]: Removed session 50. Feb 9 10:38:21.735000 audit[7693]: CRED_ACQ pid=7693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:21.917617 kernel: audit: type=1101 audit(1707475101.733:1836): pid=7693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:21.917653 kernel: audit: type=1103 audit(1707475101.735:1837): pid=7693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:21.917669 kernel: audit: type=1006 audit(1707475101.735:1838): pid=7693 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=50 res=1 Feb 9 10:38:21.735000 audit[7693]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff513a6d10 a2=3 a3=0 items=0 ppid=1 pid=7693 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:22.068060 kernel: audit: type=1300 audit(1707475101.735:1838): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff513a6d10 a2=3 a3=0 items=0 ppid=1 pid=7693 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:22.068096 kernel: audit: type=1327 audit(1707475101.735:1838): proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:21.735000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:21.739000 audit[7693]: USER_START pid=7693 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:22.192951 kernel: audit: type=1105 audit(1707475101.739:1839): pid=7693 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:22.192989 kernel: audit: type=1103 audit(1707475101.740:1840): pid=7695 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:21.740000 audit[7695]: CRED_ACQ pid=7695 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:22.282061 kernel: audit: type=1106 audit(1707475101.819:1841): pid=7693 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:21.819000 audit[7693]: USER_END pid=7693 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:22.377426 kernel: audit: type=1104 audit(1707475101.819:1842): pid=7693 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:21.819000 audit[7693]: CRED_DISP pid=7693 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:21.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.49.59:22-147.75.109.163:39338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:26.829272 systemd[1]: Started sshd@49-147.75.49.59:22-147.75.109.163:52326.service. Feb 9 10:38:26.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.49.59:22-147.75.109.163:52326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:26.855939 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:38:26.856007 kernel: audit: type=1130 audit(1707475106.829:1844): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.49.59:22-147.75.109.163:52326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:26.967000 audit[7757]: USER_ACCT pid=7757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:26.967639 sshd[7757]: Accepted publickey for core from 147.75.109.163 port 52326 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:38:26.969044 sshd[7757]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:38:26.971681 systemd-logind[1465]: New session 51 of user core. Feb 9 10:38:26.972156 systemd[1]: Started session-51.scope. Feb 9 10:38:27.051771 sshd[7757]: pam_unix(sshd:session): session closed for user core Feb 9 10:38:27.053078 systemd[1]: sshd@49-147.75.49.59:22-147.75.109.163:52326.service: Deactivated successfully. Feb 9 10:38:27.053522 systemd[1]: session-51.scope: Deactivated successfully. Feb 9 10:38:27.053942 systemd-logind[1465]: Session 51 logged out. Waiting for processes to exit. Feb 9 10:38:27.054496 systemd-logind[1465]: Removed session 51. Feb 9 10:38:26.968000 audit[7757]: CRED_ACQ pid=7757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:27.149223 kernel: audit: type=1101 audit(1707475106.967:1845): pid=7757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:27.149264 kernel: audit: type=1103 audit(1707475106.968:1846): pid=7757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:27.149284 kernel: audit: type=1006 audit(1707475106.968:1847): pid=7757 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=51 res=1 Feb 9 10:38:27.207738 kernel: audit: type=1300 audit(1707475106.968:1847): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc23f9a850 a2=3 a3=0 items=0 ppid=1 pid=7757 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:26.968000 audit[7757]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc23f9a850 a2=3 a3=0 items=0 ppid=1 pid=7757 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:27.299653 kernel: audit: type=1327 audit(1707475106.968:1847): proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:26.968000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:27.330144 kernel: audit: type=1105 audit(1707475106.974:1848): pid=7757 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:26.974000 audit[7757]: USER_START pid=7757 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:27.424608 kernel: audit: type=1103 audit(1707475106.974:1849): pid=7759 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:26.974000 audit[7759]: CRED_ACQ pid=7759 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:27.513781 kernel: audit: type=1106 audit(1707475107.052:1850): pid=7757 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:27.052000 audit[7757]: USER_END pid=7757 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:27.609184 kernel: audit: type=1104 audit(1707475107.052:1851): pid=7757 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:27.052000 audit[7757]: CRED_DISP pid=7757 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:27.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.49.59:22-147.75.109.163:52326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:32.062013 systemd[1]: Started sshd@50-147.75.49.59:22-147.75.109.163:52336.service. Feb 9 10:38:32.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.49.59:22-147.75.109.163:52336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:32.089076 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:38:32.089163 kernel: audit: type=1130 audit(1707475112.061:1853): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.49.59:22-147.75.109.163:52336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:32.200000 audit[7784]: USER_ACCT pid=7784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:32.200507 sshd[7784]: Accepted publickey for core from 147.75.109.163 port 52336 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:38:32.201738 sshd[7784]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:38:32.203978 systemd-logind[1465]: New session 52 of user core. Feb 9 10:38:32.204555 systemd[1]: Started session-52.scope. Feb 9 10:38:32.283392 sshd[7784]: pam_unix(sshd:session): session closed for user core Feb 9 10:38:32.284881 systemd[1]: sshd@50-147.75.49.59:22-147.75.109.163:52336.service: Deactivated successfully. Feb 9 10:38:32.285323 systemd[1]: session-52.scope: Deactivated successfully. Feb 9 10:38:32.285716 systemd-logind[1465]: Session 52 logged out. Waiting for processes to exit. Feb 9 10:38:32.286240 systemd-logind[1465]: Removed session 52. Feb 9 10:38:32.201000 audit[7784]: CRED_ACQ pid=7784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:32.382056 kernel: audit: type=1101 audit(1707475112.200:1854): pid=7784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:32.382095 kernel: audit: type=1103 audit(1707475112.201:1855): pid=7784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:32.382114 kernel: audit: type=1006 audit(1707475112.201:1856): pid=7784 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=52 res=1 Feb 9 10:38:32.201000 audit[7784]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4747d2a0 a2=3 a3=0 items=0 ppid=1 pid=7784 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:32.532611 kernel: audit: type=1300 audit(1707475112.201:1856): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4747d2a0 a2=3 a3=0 items=0 ppid=1 pid=7784 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:32.532665 kernel: audit: type=1327 audit(1707475112.201:1856): proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:32.201000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:32.563085 kernel: audit: type=1105 audit(1707475112.206:1857): pid=7784 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:32.206000 audit[7784]: USER_START pid=7784 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:32.657522 kernel: audit: type=1103 audit(1707475112.207:1858): pid=7786 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:32.207000 audit[7786]: CRED_ACQ pid=7786 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:32.746702 kernel: audit: type=1106 audit(1707475112.283:1859): pid=7784 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:32.283000 audit[7784]: USER_END pid=7784 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:32.842115 kernel: audit: type=1104 audit(1707475112.283:1860): pid=7784 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:32.283000 audit[7784]: CRED_DISP pid=7784 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:32.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.49.59:22-147.75.109.163:52336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:37.293044 systemd[1]: Started sshd@51-147.75.49.59:22-147.75.109.163:34878.service. Feb 9 10:38:37.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.49.59:22-147.75.109.163:34878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:37.320088 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:38:37.320184 kernel: audit: type=1130 audit(1707475117.292:1862): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.49.59:22-147.75.109.163:34878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:37.430000 audit[7852]: USER_ACCT pid=7852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:37.431240 sshd[7852]: Accepted publickey for core from 147.75.109.163 port 34878 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:38:37.432563 sshd[7852]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:38:37.435160 systemd-logind[1465]: New session 53 of user core. Feb 9 10:38:37.435798 systemd[1]: Started session-53.scope. Feb 9 10:38:37.432000 audit[7852]: CRED_ACQ pid=7852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:37.526060 sshd[7852]: pam_unix(sshd:session): session closed for user core Feb 9 10:38:37.527447 systemd[1]: sshd@51-147.75.49.59:22-147.75.109.163:34878.service: Deactivated successfully. Feb 9 10:38:37.527892 systemd[1]: session-53.scope: Deactivated successfully. Feb 9 10:38:37.528203 systemd-logind[1465]: Session 53 logged out. Waiting for processes to exit. Feb 9 10:38:37.528624 systemd-logind[1465]: Removed session 53. Feb 9 10:38:37.612836 kernel: audit: type=1101 audit(1707475117.430:1863): pid=7852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:37.612874 kernel: audit: type=1103 audit(1707475117.432:1864): pid=7852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:37.612891 kernel: audit: type=1006 audit(1707475117.432:1865): pid=7852 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=53 res=1 Feb 9 10:38:37.671357 kernel: audit: type=1300 audit(1707475117.432:1865): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff7acd750 a2=3 a3=0 items=0 ppid=1 pid=7852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:37.432000 audit[7852]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff7acd750 a2=3 a3=0 items=0 ppid=1 pid=7852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:37.763315 kernel: audit: type=1327 audit(1707475117.432:1865): proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:37.432000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:37.793793 kernel: audit: type=1105 audit(1707475117.437:1866): pid=7852 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:37.437000 audit[7852]: USER_START pid=7852 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:37.888189 kernel: audit: type=1103 audit(1707475117.438:1867): pid=7854 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:37.438000 audit[7854]: CRED_ACQ pid=7854 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:37.977503 kernel: audit: type=1106 audit(1707475117.526:1868): pid=7852 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:37.526000 audit[7852]: USER_END pid=7852 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:38.072899 kernel: audit: type=1104 audit(1707475117.526:1869): pid=7852 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:37.526000 audit[7852]: CRED_DISP pid=7852 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:37.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.49.59:22-147.75.109.163:34878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:42.534316 systemd[1]: Started sshd@52-147.75.49.59:22-147.75.109.163:34894.service. Feb 9 10:38:42.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.49.59:22-147.75.109.163:34894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:42.561074 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:38:42.561205 kernel: audit: type=1130 audit(1707475122.534:1871): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.49.59:22-147.75.109.163:34894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:42.671000 audit[7878]: USER_ACCT pid=7878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:42.672455 sshd[7878]: Accepted publickey for core from 147.75.109.163 port 34894 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:38:42.674637 sshd[7878]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:38:42.677282 systemd-logind[1465]: New session 54 of user core. Feb 9 10:38:42.677834 systemd[1]: Started session-54.scope. Feb 9 10:38:42.674000 audit[7878]: CRED_ACQ pid=7878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:42.769450 sshd[7878]: pam_unix(sshd:session): session closed for user core Feb 9 10:38:42.770919 systemd[1]: sshd@52-147.75.49.59:22-147.75.109.163:34894.service: Deactivated successfully. Feb 9 10:38:42.771359 systemd[1]: session-54.scope: Deactivated successfully. Feb 9 10:38:42.771748 systemd-logind[1465]: Session 54 logged out. Waiting for processes to exit. Feb 9 10:38:42.772233 systemd-logind[1465]: Removed session 54. Feb 9 10:38:42.855172 kernel: audit: type=1101 audit(1707475122.671:1872): pid=7878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:42.855214 kernel: audit: type=1103 audit(1707475122.674:1873): pid=7878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:42.855236 kernel: audit: type=1006 audit(1707475122.674:1874): pid=7878 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=54 res=1 Feb 9 10:38:42.674000 audit[7878]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff714300b0 a2=3 a3=0 items=0 ppid=1 pid=7878 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:43.005653 kernel: audit: type=1300 audit(1707475122.674:1874): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff714300b0 a2=3 a3=0 items=0 ppid=1 pid=7878 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:43.005685 kernel: audit: type=1327 audit(1707475122.674:1874): proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:42.674000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:43.036138 kernel: audit: type=1105 audit(1707475122.679:1875): pid=7878 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:42.679000 audit[7878]: USER_START pid=7878 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:43.130544 kernel: audit: type=1103 audit(1707475122.680:1876): pid=7880 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:42.680000 audit[7880]: CRED_ACQ pid=7880 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:43.219704 kernel: audit: type=1106 audit(1707475122.769:1877): pid=7878 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:42.769000 audit[7878]: USER_END pid=7878 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:43.315077 kernel: audit: type=1104 audit(1707475122.769:1878): pid=7878 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:42.769000 audit[7878]: CRED_DISP pid=7878 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:42.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.49.59:22-147.75.109.163:34894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:47.779075 systemd[1]: Started sshd@53-147.75.49.59:22-147.75.109.163:40044.service. Feb 9 10:38:47.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.49.59:22-147.75.109.163:40044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:47.805364 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:38:47.805407 kernel: audit: type=1130 audit(1707475127.778:1880): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.49.59:22-147.75.109.163:40044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:47.916000 audit[7903]: USER_ACCT pid=7903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:47.917354 sshd[7903]: Accepted publickey for core from 147.75.109.163 port 40044 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:38:47.918662 sshd[7903]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:38:47.921183 systemd-logind[1465]: New session 55 of user core. Feb 9 10:38:47.921678 systemd[1]: Started session-55.scope. Feb 9 10:38:48.001441 sshd[7903]: pam_unix(sshd:session): session closed for user core Feb 9 10:38:48.002765 systemd[1]: sshd@53-147.75.49.59:22-147.75.109.163:40044.service: Deactivated successfully. Feb 9 10:38:48.003203 systemd[1]: session-55.scope: Deactivated successfully. Feb 9 10:38:48.003568 systemd-logind[1465]: Session 55 logged out. Waiting for processes to exit. Feb 9 10:38:48.004088 systemd-logind[1465]: Removed session 55. Feb 9 10:38:47.918000 audit[7903]: CRED_ACQ pid=7903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:48.098985 kernel: audit: type=1101 audit(1707475127.916:1881): pid=7903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:48.099031 kernel: audit: type=1103 audit(1707475127.918:1882): pid=7903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:48.099050 kernel: audit: type=1006 audit(1707475127.918:1883): pid=7903 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=55 res=1 Feb 9 10:38:48.157477 kernel: audit: type=1300 audit(1707475127.918:1883): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd3971360 a2=3 a3=0 items=0 ppid=1 pid=7903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:47.918000 audit[7903]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd3971360 a2=3 a3=0 items=0 ppid=1 pid=7903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:48.249413 kernel: audit: type=1327 audit(1707475127.918:1883): proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:47.918000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:48.279834 kernel: audit: type=1105 audit(1707475127.923:1884): pid=7903 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:47.923000 audit[7903]: USER_START pid=7903 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:48.374174 kernel: audit: type=1103 audit(1707475127.924:1885): pid=7905 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:47.924000 audit[7905]: CRED_ACQ pid=7905 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:48.463258 kernel: audit: type=1106 audit(1707475128.001:1886): pid=7903 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:48.001000 audit[7903]: USER_END pid=7903 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:48.558631 kernel: audit: type=1104 audit(1707475128.001:1887): pid=7903 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:48.001000 audit[7903]: CRED_DISP pid=7903 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:48.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.49.59:22-147.75.109.163:40044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:53.012244 systemd[1]: Started sshd@54-147.75.49.59:22-147.75.109.163:40046.service. Feb 9 10:38:53.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.49.59:22-147.75.109.163:40046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:53.039586 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:38:53.039663 kernel: audit: type=1130 audit(1707475133.012:1889): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.49.59:22-147.75.109.163:40046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:53.151000 audit[7928]: USER_ACCT pid=7928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:53.151516 sshd[7928]: Accepted publickey for core from 147.75.109.163 port 40046 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:38:53.152662 sshd[7928]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:38:53.155219 systemd-logind[1465]: New session 56 of user core. Feb 9 10:38:53.155698 systemd[1]: Started session-56.scope. Feb 9 10:38:53.235677 sshd[7928]: pam_unix(sshd:session): session closed for user core Feb 9 10:38:53.237089 systemd[1]: sshd@54-147.75.49.59:22-147.75.109.163:40046.service: Deactivated successfully. Feb 9 10:38:53.237534 systemd[1]: session-56.scope: Deactivated successfully. Feb 9 10:38:53.237928 systemd-logind[1465]: Session 56 logged out. Waiting for processes to exit. Feb 9 10:38:53.238331 systemd-logind[1465]: Removed session 56. Feb 9 10:38:53.152000 audit[7928]: CRED_ACQ pid=7928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:53.332970 kernel: audit: type=1101 audit(1707475133.151:1890): pid=7928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:53.333012 kernel: audit: type=1103 audit(1707475133.152:1891): pid=7928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:53.333030 kernel: audit: type=1006 audit(1707475133.152:1892): pid=7928 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=56 res=1 Feb 9 10:38:53.391425 kernel: audit: type=1300 audit(1707475133.152:1892): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe67c49950 a2=3 a3=0 items=0 ppid=1 pid=7928 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:53.152000 audit[7928]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe67c49950 a2=3 a3=0 items=0 ppid=1 pid=7928 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:53.483318 kernel: audit: type=1327 audit(1707475133.152:1892): proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:53.152000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:53.513776 kernel: audit: type=1105 audit(1707475133.157:1893): pid=7928 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:53.157000 audit[7928]: USER_START pid=7928 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:53.608135 kernel: audit: type=1103 audit(1707475133.158:1894): pid=7930 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:53.158000 audit[7930]: CRED_ACQ pid=7930 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:53.697234 kernel: audit: type=1106 audit(1707475133.236:1895): pid=7928 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:53.236000 audit[7928]: USER_END pid=7928 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:53.792598 kernel: audit: type=1104 audit(1707475133.236:1896): pid=7928 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:53.236000 audit[7928]: CRED_DISP pid=7928 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:53.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.49.59:22-147.75.109.163:40046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:58.245944 systemd[1]: Started sshd@55-147.75.49.59:22-147.75.109.163:57058.service. Feb 9 10:38:58.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.49.59:22-147.75.109.163:57058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:58.272916 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:38:58.272998 kernel: audit: type=1130 audit(1707475138.244:1898): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.49.59:22-147.75.109.163:57058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:38:58.383000 audit[7973]: USER_ACCT pid=7973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:58.384713 sshd[7973]: Accepted publickey for core from 147.75.109.163 port 57058 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:38:58.386656 sshd[7973]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:38:58.389003 systemd-logind[1465]: New session 57 of user core. Feb 9 10:38:58.389584 systemd[1]: Started session-57.scope. Feb 9 10:38:58.469138 sshd[7973]: pam_unix(sshd:session): session closed for user core Feb 9 10:38:58.470571 systemd[1]: sshd@55-147.75.49.59:22-147.75.109.163:57058.service: Deactivated successfully. Feb 9 10:38:58.470995 systemd[1]: session-57.scope: Deactivated successfully. Feb 9 10:38:58.471281 systemd-logind[1465]: Session 57 logged out. Waiting for processes to exit. Feb 9 10:38:58.471877 systemd-logind[1465]: Removed session 57. Feb 9 10:38:58.385000 audit[7973]: CRED_ACQ pid=7973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:58.566211 kernel: audit: type=1101 audit(1707475138.383:1899): pid=7973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:58.566250 kernel: audit: type=1103 audit(1707475138.385:1900): pid=7973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:58.566267 kernel: audit: type=1006 audit(1707475138.385:1901): pid=7973 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=57 res=1 Feb 9 10:38:58.624703 kernel: audit: type=1300 audit(1707475138.385:1901): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee1ae6380 a2=3 a3=0 items=0 ppid=1 pid=7973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:58.385000 audit[7973]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee1ae6380 a2=3 a3=0 items=0 ppid=1 pid=7973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:38:58.716570 kernel: audit: type=1327 audit(1707475138.385:1901): proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:58.385000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:38:58.747071 kernel: audit: type=1105 audit(1707475138.390:1902): pid=7973 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:58.390000 audit[7973]: USER_START pid=7973 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:58.841489 kernel: audit: type=1103 audit(1707475138.391:1903): pid=7975 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:58.391000 audit[7975]: CRED_ACQ pid=7975 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:58.930663 kernel: audit: type=1106 audit(1707475138.468:1904): pid=7973 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:58.468000 audit[7973]: USER_END pid=7973 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:59.026052 kernel: audit: type=1104 audit(1707475138.468:1905): pid=7973 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:58.468000 audit[7973]: CRED_DISP pid=7973 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:38:58.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.49.59:22-147.75.109.163:57058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:03.480905 systemd[1]: Started sshd@56-147.75.49.59:22-147.75.109.163:57066.service. Feb 9 10:39:03.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.49.59:22-147.75.109.163:57066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:03.508154 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:39:03.508221 kernel: audit: type=1130 audit(1707475143.479:1907): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.49.59:22-147.75.109.163:57066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:03.617000 audit[8026]: USER_ACCT pid=8026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:03.618605 sshd[8026]: Accepted publickey for core from 147.75.109.163 port 57066 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:03.619750 sshd[8026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:03.622281 systemd-logind[1465]: New session 58 of user core. Feb 9 10:39:03.622748 systemd[1]: Started session-58.scope. Feb 9 10:39:03.702088 sshd[8026]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:03.703496 systemd[1]: sshd@56-147.75.49.59:22-147.75.109.163:57066.service: Deactivated successfully. Feb 9 10:39:03.704004 systemd[1]: session-58.scope: Deactivated successfully. Feb 9 10:39:03.704304 systemd-logind[1465]: Session 58 logged out. Waiting for processes to exit. Feb 9 10:39:03.704893 systemd-logind[1465]: Removed session 58. Feb 9 10:39:03.618000 audit[8026]: CRED_ACQ pid=8026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:03.800205 kernel: audit: type=1101 audit(1707475143.617:1908): pid=8026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:03.800245 kernel: audit: type=1103 audit(1707475143.618:1909): pid=8026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:03.800264 kernel: audit: type=1006 audit(1707475143.618:1910): pid=8026 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=58 res=1 Feb 9 10:39:03.858753 kernel: audit: type=1300 audit(1707475143.618:1910): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa8960ed0 a2=3 a3=0 items=0 ppid=1 pid=8026 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:03.618000 audit[8026]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa8960ed0 a2=3 a3=0 items=0 ppid=1 pid=8026 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:03.950734 kernel: audit: type=1327 audit(1707475143.618:1910): proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:03.618000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:03.981217 kernel: audit: type=1105 audit(1707475143.623:1911): pid=8026 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:03.623000 audit[8026]: USER_START pid=8026 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:04.075733 kernel: audit: type=1103 audit(1707475143.623:1912): pid=8028 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:03.623000 audit[8028]: CRED_ACQ pid=8028 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:04.164906 kernel: audit: type=1106 audit(1707475143.701:1913): pid=8026 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:03.701000 audit[8026]: USER_END pid=8026 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:04.260330 kernel: audit: type=1104 audit(1707475143.701:1914): pid=8026 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:03.701000 audit[8026]: CRED_DISP pid=8026 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:03.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.49.59:22-147.75.109.163:57066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:08.711258 systemd[1]: Started sshd@57-147.75.49.59:22-147.75.109.163:34742.service. Feb 9 10:39:08.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.49.59:22-147.75.109.163:34742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:08.738278 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:39:08.738311 kernel: audit: type=1130 audit(1707475148.709:1916): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.49.59:22-147.75.109.163:34742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:08.848000 audit[8058]: USER_ACCT pid=8058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:08.850310 sshd[8058]: Accepted publickey for core from 147.75.109.163 port 34742 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:08.851653 sshd[8058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:08.854273 systemd-logind[1465]: New session 59 of user core. Feb 9 10:39:08.855272 systemd[1]: Started session-59.scope. Feb 9 10:39:08.932661 sshd[8058]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:08.935890 systemd[1]: sshd@57-147.75.49.59:22-147.75.109.163:34742.service: Deactivated successfully. Feb 9 10:39:08.936663 systemd[1]: session-59.scope: Deactivated successfully. Feb 9 10:39:08.937295 systemd-logind[1465]: Session 59 logged out. Waiting for processes to exit. Feb 9 10:39:08.938664 systemd[1]: Started sshd@58-147.75.49.59:22-147.75.109.163:34754.service. Feb 9 10:39:08.939465 systemd-logind[1465]: Removed session 59. Feb 9 10:39:08.850000 audit[8058]: CRED_ACQ pid=8058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:09.031933 kernel: audit: type=1101 audit(1707475148.848:1917): pid=8058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:09.031986 kernel: audit: type=1103 audit(1707475148.850:1918): pid=8058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:09.032005 kernel: audit: type=1006 audit(1707475148.850:1919): pid=8058 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=59 res=1 Feb 9 10:39:09.090473 kernel: audit: type=1300 audit(1707475148.850:1919): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff38aa7ed0 a2=3 a3=0 items=0 ppid=1 pid=8058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:08.850000 audit[8058]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff38aa7ed0 a2=3 a3=0 items=0 ppid=1 pid=8058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:09.112465 sshd[8082]: Accepted publickey for core from 147.75.109.163 port 34754 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:09.114312 sshd[8082]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:09.117070 systemd-logind[1465]: New session 60 of user core. Feb 9 10:39:09.118123 systemd[1]: Started session-60.scope. Feb 9 10:39:08.850000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:09.212963 kernel: audit: type=1327 audit(1707475148.850:1919): proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:09.213038 kernel: audit: type=1105 audit(1707475148.855:1920): pid=8058 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:08.855000 audit[8058]: USER_START pid=8058 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:09.307427 kernel: audit: type=1103 audit(1707475148.856:1921): pid=8060 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:08.856000 audit[8060]: CRED_ACQ pid=8060 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:09.396541 kernel: audit: type=1106 audit(1707475148.932:1922): pid=8058 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:08.932000 audit[8058]: USER_END pid=8058 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:09.491948 kernel: audit: type=1104 audit(1707475148.932:1923): pid=8058 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:08.932000 audit[8058]: CRED_DISP pid=8058 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:08.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.49.59:22-147.75.109.163:34742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:08.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.49.59:22-147.75.109.163:34754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:09.111000 audit[8082]: USER_ACCT pid=8082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:09.112000 audit[8082]: CRED_ACQ pid=8082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:09.112000 audit[8082]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd91772a90 a2=3 a3=0 items=0 ppid=1 pid=8082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:09.112000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:09.119000 audit[8082]: USER_START pid=8082 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:09.120000 audit[8084]: CRED_ACQ pid=8084 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:10.277403 sshd[8082]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:10.278000 audit[8082]: USER_END pid=8082 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:10.278000 audit[8082]: CRED_DISP pid=8082 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:10.284749 systemd[1]: sshd@58-147.75.49.59:22-147.75.109.163:34754.service: Deactivated successfully. Feb 9 10:39:10.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.49.59:22-147.75.109.163:34754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:10.285112 systemd[1]: session-60.scope: Deactivated successfully. Feb 9 10:39:10.285494 systemd-logind[1465]: Session 60 logged out. Waiting for processes to exit. Feb 9 10:39:10.286026 systemd[1]: Started sshd@59-147.75.49.59:22-147.75.109.163:34770.service. Feb 9 10:39:10.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.49.59:22-147.75.109.163:34770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:10.286524 systemd-logind[1465]: Removed session 60. Feb 9 10:39:10.312000 audit[8104]: USER_ACCT pid=8104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:10.314326 sshd[8104]: Accepted publickey for core from 147.75.109.163 port 34770 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:10.313000 audit[8104]: CRED_ACQ pid=8104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:10.313000 audit[8104]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdd5ae030 a2=3 a3=0 items=0 ppid=1 pid=8104 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:10.313000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:10.315135 sshd[8104]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:10.318023 systemd-logind[1465]: New session 61 of user core. Feb 9 10:39:10.318621 systemd[1]: Started session-61.scope. Feb 9 10:39:10.319000 audit[8104]: USER_START pid=8104 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:10.320000 audit[8106]: CRED_ACQ pid=8106 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.171000 audit[8129]: NETFILTER_CFG table=filter:117 family=2 entries=22 op=nft_register_rule pid=8129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:39:11.171000 audit[8129]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffd4ac10320 a2=0 a3=7ffd4ac1030c items=0 ppid=2840 pid=8129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:11.171000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:39:11.185942 sshd[8104]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:11.185000 audit[8104]: USER_END pid=8104 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.185000 audit[8104]: CRED_DISP pid=8104 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.187855 systemd[1]: sshd@59-147.75.49.59:22-147.75.109.163:34770.service: Deactivated successfully. Feb 9 10:39:11.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.49.59:22-147.75.109.163:34770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:11.188285 systemd[1]: session-61.scope: Deactivated successfully. Feb 9 10:39:11.188694 systemd-logind[1465]: Session 61 logged out. Waiting for processes to exit. Feb 9 10:39:11.171000 audit[8129]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=8129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:39:11.171000 audit[8129]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd4ac10320 a2=0 a3=31030 items=0 ppid=2840 pid=8129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:11.171000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:39:11.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.49.59:22-147.75.109.163:34786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:11.189463 systemd[1]: Started sshd@60-147.75.49.59:22-147.75.109.163:34786.service. Feb 9 10:39:11.189932 systemd-logind[1465]: Removed session 61. Feb 9 10:39:11.192000 audit[8134]: NETFILTER_CFG table=filter:119 family=2 entries=34 op=nft_register_rule pid=8134 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:39:11.192000 audit[8134]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffd5b67b3f0 a2=0 a3=7ffd5b67b3dc items=0 ppid=2840 pid=8134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:11.192000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:39:11.195000 audit[8134]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=8134 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:39:11.195000 audit[8134]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd5b67b3f0 a2=0 a3=31030 items=0 ppid=2840 pid=8134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:11.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:39:11.217264 sshd[8132]: Accepted publickey for core from 147.75.109.163 port 34786 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:11.215000 audit[8132]: USER_ACCT pid=8132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.216000 audit[8132]: CRED_ACQ pid=8132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.216000 audit[8132]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4df0b4e0 a2=3 a3=0 items=0 ppid=1 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:11.216000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:11.218086 sshd[8132]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:11.220558 systemd-logind[1465]: New session 62 of user core. Feb 9 10:39:11.221107 systemd[1]: Started session-62.scope. Feb 9 10:39:11.221000 audit[8132]: USER_START pid=8132 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.222000 audit[8136]: CRED_ACQ pid=8136 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.436550 sshd[8132]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:11.435000 audit[8132]: USER_END pid=8132 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.435000 audit[8132]: CRED_DISP pid=8132 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.438367 systemd[1]: sshd@60-147.75.49.59:22-147.75.109.163:34786.service: Deactivated successfully. Feb 9 10:39:11.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.49.59:22-147.75.109.163:34786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:11.438744 systemd[1]: session-62.scope: Deactivated successfully. Feb 9 10:39:11.439066 systemd-logind[1465]: Session 62 logged out. Waiting for processes to exit. Feb 9 10:39:11.439880 systemd[1]: Started sshd@61-147.75.49.59:22-147.75.109.163:34798.service. Feb 9 10:39:11.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.49.59:22-147.75.109.163:34798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:11.440308 systemd-logind[1465]: Removed session 62. Feb 9 10:39:11.466000 audit[8157]: USER_ACCT pid=8157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.467654 sshd[8157]: Accepted publickey for core from 147.75.109.163 port 34798 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:11.466000 audit[8157]: CRED_ACQ pid=8157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.466000 audit[8157]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0c4b7730 a2=3 a3=0 items=0 ppid=1 pid=8157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:11.466000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:11.468326 sshd[8157]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:11.470831 systemd-logind[1465]: New session 63 of user core. Feb 9 10:39:11.471377 systemd[1]: Started session-63.scope. Feb 9 10:39:11.472000 audit[8157]: USER_START pid=8157 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.472000 audit[8159]: CRED_ACQ pid=8159 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.590209 sshd[8157]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:11.589000 audit[8157]: USER_END pid=8157 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.589000 audit[8157]: CRED_DISP pid=8157 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:11.592128 systemd[1]: sshd@61-147.75.49.59:22-147.75.109.163:34798.service: Deactivated successfully. Feb 9 10:39:11.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.49.59:22-147.75.109.163:34798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:11.592721 systemd[1]: session-63.scope: Deactivated successfully. Feb 9 10:39:11.593237 systemd-logind[1465]: Session 63 logged out. Waiting for processes to exit. Feb 9 10:39:11.594045 systemd-logind[1465]: Removed session 63. Feb 9 10:39:12.754000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:12.754000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c932e0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:39:12.754000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:39:12.754000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:12.754000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006cc660 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:39:12.754000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:39:12.798000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:12.798000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c011587520 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:39:12.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:39:12.798000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:12.798000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012e6a060 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:39:12.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:39:12.798000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:12.798000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00cfd4180 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:39:12.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:39:12.798000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:12.798000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0110faa80 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:39:12.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:39:12.798000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:12.798000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:12.798000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c008c4c840 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:39:12.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:39:12.798000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c011e3c920 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:39:12.798000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:39:16.570000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:16.592950 systemd[1]: Started sshd@62-147.75.49.59:22-147.75.109.163:53748.service. Feb 9 10:39:16.599281 kernel: kauditd_printk_skb: 81 callbacks suppressed Feb 9 10:39:16.599321 kernel: audit: type=1400 audit(1707475156.570:1973): avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:16.570000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f8aa60 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:39:16.689400 kernel: audit: type=1300 audit(1707475156.570:1973): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f8aa60 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:39:16.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:39:16.829260 sshd[8184]: Accepted publickey for core from 147.75.109.163 port 53748 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:16.830410 sshd[8184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:16.832775 systemd-logind[1465]: New session 64 of user core. Feb 9 10:39:16.833223 systemd[1]: Started session-64.scope. Feb 9 10:39:16.899815 kernel: audit: type=1327 audit(1707475156.570:1973): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:39:16.899896 kernel: audit: type=1400 audit(1707475156.570:1974): avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:16.570000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:16.911710 sshd[8184]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:16.913087 systemd[1]: sshd@62-147.75.49.59:22-147.75.109.163:53748.service: Deactivated successfully. Feb 9 10:39:16.913527 systemd[1]: session-64.scope: Deactivated successfully. Feb 9 10:39:16.913863 systemd-logind[1465]: Session 64 logged out. Waiting for processes to exit. Feb 9 10:39:16.914300 systemd-logind[1465]: Removed session 64. Feb 9 10:39:16.570000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002661b20 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:39:17.108050 kernel: audit: type=1300 audit(1707475156.570:1974): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002661b20 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:39:17.108095 kernel: audit: type=1327 audit(1707475156.570:1974): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:39:16.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:39:17.200758 kernel: audit: type=1400 audit(1707475156.570:1975): avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:16.570000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:17.290641 kernel: audit: type=1300 audit(1707475156.570:1975): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001547420 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:39:16.570000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001547420 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:39:16.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:39:17.503472 kernel: audit: type=1327 audit(1707475156.570:1975): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:39:17.503507 kernel: audit: type=1400 audit(1707475156.570:1976): avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:16.570000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:39:16.570000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c93300 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:39:16.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:39:16.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.49.59:22-147.75.109.163:53748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:16.827000 audit[8184]: USER_ACCT pid=8184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:16.828000 audit[8184]: CRED_ACQ pid=8184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:16.828000 audit[8184]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcd361410 a2=3 a3=0 items=0 ppid=1 pid=8184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:16.828000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:16.834000 audit[8184]: USER_START pid=8184 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:16.834000 audit[8186]: CRED_ACQ pid=8186 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:16.911000 audit[8184]: USER_END pid=8184 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:16.911000 audit[8184]: CRED_DISP pid=8184 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:16.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.49.59:22-147.75.109.163:53748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:21.923256 systemd[1]: Started sshd@63-147.75.49.59:22-147.75.109.163:53760.service. Feb 9 10:39:21.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.49.59:22-147.75.109.163:53760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:21.950238 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:39:21.950293 kernel: audit: type=1130 audit(1707475161.922:1986): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.49.59:22-147.75.109.163:53760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:22.059000 audit[8212]: USER_ACCT pid=8212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:22.061657 sshd[8212]: Accepted publickey for core from 147.75.109.163 port 53760 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:22.065915 sshd[8212]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:22.075816 systemd-logind[1465]: New session 65 of user core. Feb 9 10:39:22.078125 systemd[1]: Started session-65.scope. Feb 9 10:39:22.063000 audit[8212]: CRED_ACQ pid=8212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:22.161660 sshd[8212]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:22.163081 systemd[1]: sshd@63-147.75.49.59:22-147.75.109.163:53760.service: Deactivated successfully. Feb 9 10:39:22.163533 systemd[1]: session-65.scope: Deactivated successfully. Feb 9 10:39:22.163920 systemd-logind[1465]: Session 65 logged out. Waiting for processes to exit. Feb 9 10:39:22.164307 systemd-logind[1465]: Removed session 65. Feb 9 10:39:22.243745 kernel: audit: type=1101 audit(1707475162.059:1987): pid=8212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:22.243789 kernel: audit: type=1103 audit(1707475162.063:1988): pid=8212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:22.243813 kernel: audit: type=1006 audit(1707475162.063:1989): pid=8212 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=65 res=1 Feb 9 10:39:22.063000 audit[8212]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf8da31b0 a2=3 a3=0 items=0 ppid=1 pid=8212 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:22.394846 kernel: audit: type=1300 audit(1707475162.063:1989): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf8da31b0 a2=3 a3=0 items=0 ppid=1 pid=8212 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:22.394880 kernel: audit: type=1327 audit(1707475162.063:1989): proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:22.063000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:22.425655 kernel: audit: type=1105 audit(1707475162.084:1990): pid=8212 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:22.084000 audit[8212]: USER_START pid=8212 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:22.521027 kernel: audit: type=1103 audit(1707475162.085:1991): pid=8214 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:22.085000 audit[8214]: CRED_ACQ pid=8214 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:22.160000 audit[8212]: USER_END pid=8212 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:22.705970 kernel: audit: type=1106 audit(1707475162.160:1992): pid=8212 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:22.706009 kernel: audit: type=1104 audit(1707475162.161:1993): pid=8212 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:22.161000 audit[8212]: CRED_DISP pid=8212 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:22.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.49.59:22-147.75.109.163:53760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:27.171657 systemd[1]: Started sshd@64-147.75.49.59:22-147.75.109.163:47810.service. Feb 9 10:39:27.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.49.59:22-147.75.109.163:47810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:27.198895 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:39:27.198959 kernel: audit: type=1130 audit(1707475167.170:1995): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.49.59:22-147.75.109.163:47810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:27.308000 audit[8273]: USER_ACCT pid=8273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:27.309971 sshd[8273]: Accepted publickey for core from 147.75.109.163 port 47810 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:27.311331 sshd[8273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:27.313636 systemd-logind[1465]: New session 66 of user core. Feb 9 10:39:27.314106 systemd[1]: Started session-66.scope. Feb 9 10:39:27.309000 audit[8273]: CRED_ACQ pid=8273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:27.491754 kernel: audit: type=1101 audit(1707475167.308:1996): pid=8273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:27.491801 kernel: audit: type=1103 audit(1707475167.309:1997): pid=8273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:27.491817 kernel: audit: type=1006 audit(1707475167.309:1998): pid=8273 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=66 res=1 Feb 9 10:39:27.309000 audit[8273]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea1836c10 a2=3 a3=0 items=0 ppid=1 pid=8273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:27.641856 kernel: audit: type=1300 audit(1707475167.309:1998): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea1836c10 a2=3 a3=0 items=0 ppid=1 pid=8273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:27.641943 kernel: audit: type=1327 audit(1707475167.309:1998): proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:27.309000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:27.642120 sshd[8273]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:27.643474 systemd[1]: sshd@64-147.75.49.59:22-147.75.109.163:47810.service: Deactivated successfully. Feb 9 10:39:27.643898 systemd[1]: session-66.scope: Deactivated successfully. Feb 9 10:39:27.644243 systemd-logind[1465]: Session 66 logged out. Waiting for processes to exit. Feb 9 10:39:27.644720 systemd-logind[1465]: Removed session 66. Feb 9 10:39:27.314000 audit[8273]: USER_START pid=8273 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:27.766960 kernel: audit: type=1105 audit(1707475167.314:1999): pid=8273 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:27.767005 kernel: audit: type=1103 audit(1707475167.315:2000): pid=8275 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:27.315000 audit[8275]: CRED_ACQ pid=8275 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:27.856042 kernel: audit: type=1106 audit(1707475167.641:2001): pid=8273 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:27.641000 audit[8273]: USER_END pid=8273 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:27.641000 audit[8273]: CRED_DISP pid=8273 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:28.040626 kernel: audit: type=1104 audit(1707475167.641:2002): pid=8273 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:27.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.49.59:22-147.75.109.163:47810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:32.587538 systemd[1]: Started sshd@65-147.75.49.59:22-147.75.109.163:47824.service. Feb 9 10:39:32.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.49.59:22-147.75.109.163:47824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:32.613975 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:39:32.614013 kernel: audit: type=1130 audit(1707475172.586:2004): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.49.59:22-147.75.109.163:47824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:32.722000 audit[8327]: USER_ACCT pid=8327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:32.724455 sshd[8327]: Accepted publickey for core from 147.75.109.163 port 47824 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:32.726174 sshd[8327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:32.728889 systemd-logind[1465]: New session 67 of user core. Feb 9 10:39:32.729485 systemd[1]: Started session-67.scope. Feb 9 10:39:32.809303 sshd[8327]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:32.810877 systemd[1]: sshd@65-147.75.49.59:22-147.75.109.163:47824.service: Deactivated successfully. Feb 9 10:39:32.811301 systemd[1]: session-67.scope: Deactivated successfully. Feb 9 10:39:32.811758 systemd-logind[1465]: Session 67 logged out. Waiting for processes to exit. Feb 9 10:39:32.812241 systemd-logind[1465]: Removed session 67. Feb 9 10:39:32.724000 audit[8327]: CRED_ACQ pid=8327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:32.907860 kernel: audit: type=1101 audit(1707475172.722:2005): pid=8327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:32.907900 kernel: audit: type=1103 audit(1707475172.724:2006): pid=8327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:32.907915 kernel: audit: type=1006 audit(1707475172.724:2007): pid=8327 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=67 res=1 Feb 9 10:39:32.724000 audit[8327]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc20e66520 a2=3 a3=0 items=0 ppid=1 pid=8327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:33.058197 kernel: audit: type=1300 audit(1707475172.724:2007): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc20e66520 a2=3 a3=0 items=0 ppid=1 pid=8327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:33.058232 kernel: audit: type=1327 audit(1707475172.724:2007): proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:32.724000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:33.088738 kernel: audit: type=1105 audit(1707475172.730:2008): pid=8327 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:32.730000 audit[8327]: USER_START pid=8327 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:33.183118 kernel: audit: type=1103 audit(1707475172.731:2009): pid=8329 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:32.731000 audit[8329]: CRED_ACQ pid=8329 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:33.272181 kernel: audit: type=1106 audit(1707475172.808:2010): pid=8327 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:32.808000 audit[8327]: USER_END pid=8327 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:33.367512 kernel: audit: type=1104 audit(1707475172.808:2011): pid=8327 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:32.808000 audit[8327]: CRED_DISP pid=8327 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:32.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.49.59:22-147.75.109.163:47824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:37.820769 systemd[1]: Started sshd@66-147.75.49.59:22-147.75.109.163:39536.service. Feb 9 10:39:37.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.49.59:22-147.75.109.163:39536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:37.847733 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:39:37.847775 kernel: audit: type=1130 audit(1707475177.819:2013): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.49.59:22-147.75.109.163:39536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:37.958000 audit[8354]: USER_ACCT pid=8354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:37.959511 sshd[8354]: Accepted publickey for core from 147.75.109.163 port 39536 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:37.960580 sshd[8354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:37.962864 systemd-logind[1465]: New session 68 of user core. Feb 9 10:39:37.963341 systemd[1]: Started session-68.scope. Feb 9 10:39:38.042093 sshd[8354]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:38.043461 systemd[1]: sshd@66-147.75.49.59:22-147.75.109.163:39536.service: Deactivated successfully. Feb 9 10:39:38.043894 systemd[1]: session-68.scope: Deactivated successfully. Feb 9 10:39:38.044204 systemd-logind[1465]: Session 68 logged out. Waiting for processes to exit. Feb 9 10:39:38.044635 systemd-logind[1465]: Removed session 68. Feb 9 10:39:37.959000 audit[8354]: CRED_ACQ pid=8354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:38.140955 kernel: audit: type=1101 audit(1707475177.958:2014): pid=8354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:38.140991 kernel: audit: type=1103 audit(1707475177.959:2015): pid=8354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:38.141009 kernel: audit: type=1006 audit(1707475177.959:2016): pid=8354 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=68 res=1 Feb 9 10:39:38.199430 kernel: audit: type=1300 audit(1707475177.959:2016): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd9a18de0 a2=3 a3=0 items=0 ppid=1 pid=8354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:37.959000 audit[8354]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd9a18de0 a2=3 a3=0 items=0 ppid=1 pid=8354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:38.291424 kernel: audit: type=1327 audit(1707475177.959:2016): proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:37.959000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:38.321890 kernel: audit: type=1105 audit(1707475177.964:2017): pid=8354 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:37.964000 audit[8354]: USER_START pid=8354 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:38.416242 kernel: audit: type=1103 audit(1707475177.964:2018): pid=8356 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:37.964000 audit[8356]: CRED_ACQ pid=8356 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:38.505318 kernel: audit: type=1106 audit(1707475178.041:2019): pid=8354 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:38.041000 audit[8354]: USER_END pid=8354 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:38.041000 audit[8354]: CRED_DISP pid=8354 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:38.689948 kernel: audit: type=1104 audit(1707475178.041:2020): pid=8354 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:38.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.49.59:22-147.75.109.163:39536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:43.051023 systemd[1]: Started sshd@67-147.75.49.59:22-147.75.109.163:39550.service. Feb 9 10:39:43.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.49.59:22-147.75.109.163:39550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:43.078011 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:39:43.078082 kernel: audit: type=1130 audit(1707475183.049:2022): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.49.59:22-147.75.109.163:39550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:43.188000 audit[8380]: USER_ACCT pid=8380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:43.190003 sshd[8380]: Accepted publickey for core from 147.75.109.163 port 39550 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:43.192733 sshd[8380]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:43.198385 systemd-logind[1465]: New session 69 of user core. Feb 9 10:39:43.199469 systemd[1]: Started session-69.scope. Feb 9 10:39:43.280652 sshd[8380]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:43.190000 audit[8380]: CRED_ACQ pid=8380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:43.282029 systemd[1]: sshd@67-147.75.49.59:22-147.75.109.163:39550.service: Deactivated successfully. Feb 9 10:39:43.282475 systemd[1]: session-69.scope: Deactivated successfully. Feb 9 10:39:43.282856 systemd-logind[1465]: Session 69 logged out. Waiting for processes to exit. Feb 9 10:39:43.283273 systemd-logind[1465]: Removed session 69. Feb 9 10:39:43.371405 kernel: audit: type=1101 audit(1707475183.188:2023): pid=8380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:43.371441 kernel: audit: type=1103 audit(1707475183.190:2024): pid=8380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:43.371458 kernel: audit: type=1006 audit(1707475183.190:2025): pid=8380 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=69 res=1 Feb 9 10:39:43.429966 kernel: audit: type=1300 audit(1707475183.190:2025): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffb26ad30 a2=3 a3=0 items=0 ppid=1 pid=8380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:43.190000 audit[8380]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffb26ad30 a2=3 a3=0 items=0 ppid=1 pid=8380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:43.521854 kernel: audit: type=1327 audit(1707475183.190:2025): proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:43.190000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:43.552343 kernel: audit: type=1105 audit(1707475183.203:2026): pid=8380 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:43.203000 audit[8380]: USER_START pid=8380 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:43.204000 audit[8382]: CRED_ACQ pid=8382 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:43.736111 kernel: audit: type=1103 audit(1707475183.204:2027): pid=8382 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:43.736149 kernel: audit: type=1106 audit(1707475183.279:2028): pid=8380 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:43.279000 audit[8380]: USER_END pid=8380 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:43.280000 audit[8380]: CRED_DISP pid=8380 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:43.920845 kernel: audit: type=1104 audit(1707475183.280:2029): pid=8380 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:43.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.49.59:22-147.75.109.163:39550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:48.290570 systemd[1]: Started sshd@68-147.75.49.59:22-147.75.109.163:52010.service. Feb 9 10:39:48.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.49.59:22-147.75.109.163:52010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:48.317683 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:39:48.317756 kernel: audit: type=1130 audit(1707475188.289:2031): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.49.59:22-147.75.109.163:52010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:48.427000 audit[8405]: USER_ACCT pid=8405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:48.429229 sshd[8405]: Accepted publickey for core from 147.75.109.163 port 52010 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:48.430632 sshd[8405]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:48.433058 systemd-logind[1465]: New session 70 of user core. Feb 9 10:39:48.433581 systemd[1]: Started session-70.scope. Feb 9 10:39:48.511223 sshd[8405]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:48.512751 systemd[1]: sshd@68-147.75.49.59:22-147.75.109.163:52010.service: Deactivated successfully. Feb 9 10:39:48.513174 systemd[1]: session-70.scope: Deactivated successfully. Feb 9 10:39:48.513557 systemd-logind[1465]: Session 70 logged out. Waiting for processes to exit. Feb 9 10:39:48.514034 systemd-logind[1465]: Removed session 70. Feb 9 10:39:48.429000 audit[8405]: CRED_ACQ pid=8405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:48.610827 kernel: audit: type=1101 audit(1707475188.427:2032): pid=8405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:48.610885 kernel: audit: type=1103 audit(1707475188.429:2033): pid=8405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:48.610908 kernel: audit: type=1006 audit(1707475188.429:2034): pid=8405 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=70 res=1 Feb 9 10:39:48.761421 kernel: audit: type=1300 audit(1707475188.429:2034): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2d16adf0 a2=3 a3=0 items=0 ppid=1 pid=8405 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:48.761452 kernel: audit: type=1327 audit(1707475188.429:2034): proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:48.429000 audit[8405]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2d16adf0 a2=3 a3=0 items=0 ppid=1 pid=8405 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:48.429000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:48.791915 kernel: audit: type=1105 audit(1707475188.434:2035): pid=8405 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:48.434000 audit[8405]: USER_START pid=8405 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:48.886411 kernel: audit: type=1103 audit(1707475188.435:2036): pid=8407 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:48.435000 audit[8407]: CRED_ACQ pid=8407 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:48.510000 audit[8405]: USER_END pid=8405 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:49.071123 kernel: audit: type=1106 audit(1707475188.510:2037): pid=8405 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:49.071159 kernel: audit: type=1104 audit(1707475188.510:2038): pid=8405 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:48.510000 audit[8405]: CRED_DISP pid=8405 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:48.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.49.59:22-147.75.109.163:52010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:53.524663 systemd[1]: Started sshd@69-147.75.49.59:22-147.75.109.163:52014.service. Feb 9 10:39:53.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.49.59:22-147.75.109.163:52014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:53.552796 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:39:53.552878 kernel: audit: type=1130 audit(1707475193.524:2040): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.49.59:22-147.75.109.163:52014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:53.687000 audit[8433]: USER_ACCT pid=8433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:53.688638 sshd[8433]: Accepted publickey for core from 147.75.109.163 port 52014 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:53.691097 sshd[8433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:53.696732 systemd-logind[1465]: New session 71 of user core. Feb 9 10:39:53.698806 systemd[1]: Started session-71.scope. Feb 9 10:39:53.689000 audit[8433]: CRED_ACQ pid=8433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:53.781449 sshd[8433]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:53.782791 systemd[1]: sshd@69-147.75.49.59:22-147.75.109.163:52014.service: Deactivated successfully. Feb 9 10:39:53.783228 systemd[1]: session-71.scope: Deactivated successfully. Feb 9 10:39:53.783628 systemd-logind[1465]: Session 71 logged out. Waiting for processes to exit. Feb 9 10:39:53.784103 systemd-logind[1465]: Removed session 71. Feb 9 10:39:53.870415 kernel: audit: type=1101 audit(1707475193.687:2041): pid=8433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:53.870449 kernel: audit: type=1103 audit(1707475193.689:2042): pid=8433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:53.870468 kernel: audit: type=1006 audit(1707475193.689:2043): pid=8433 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=71 res=1 Feb 9 10:39:53.928969 kernel: audit: type=1300 audit(1707475193.689:2043): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8e062f00 a2=3 a3=0 items=0 ppid=1 pid=8433 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:53.689000 audit[8433]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8e062f00 a2=3 a3=0 items=0 ppid=1 pid=8433 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:54.021003 kernel: audit: type=1327 audit(1707475193.689:2043): proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:53.689000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:54.051527 kernel: audit: type=1105 audit(1707475193.704:2044): pid=8433 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:53.704000 audit[8433]: USER_START pid=8433 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:54.146082 kernel: audit: type=1103 audit(1707475193.705:2045): pid=8435 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:53.705000 audit[8435]: CRED_ACQ pid=8435 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:54.235328 kernel: audit: type=1106 audit(1707475193.780:2046): pid=8433 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:53.780000 audit[8433]: USER_END pid=8433 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:54.330860 kernel: audit: type=1104 audit(1707475193.780:2047): pid=8433 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:53.780000 audit[8433]: CRED_DISP pid=8433 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:53.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.49.59:22-147.75.109.163:52014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:58.791264 systemd[1]: Started sshd@70-147.75.49.59:22-147.75.109.163:43688.service. Feb 9 10:39:58.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.49.59:22-147.75.109.163:43688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:58.818501 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:39:58.818613 kernel: audit: type=1130 audit(1707475198.790:2049): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.49.59:22-147.75.109.163:43688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:39:58.929000 audit[8475]: USER_ACCT pid=8475 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:58.930191 sshd[8475]: Accepted publickey for core from 147.75.109.163 port 43688 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:39:58.931034 sshd[8475]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:39:58.933266 systemd-logind[1465]: New session 72 of user core. Feb 9 10:39:58.933843 systemd[1]: Started session-72.scope. Feb 9 10:39:59.011687 sshd[8475]: pam_unix(sshd:session): session closed for user core Feb 9 10:39:59.013098 systemd[1]: sshd@70-147.75.49.59:22-147.75.109.163:43688.service: Deactivated successfully. Feb 9 10:39:59.013581 systemd[1]: session-72.scope: Deactivated successfully. Feb 9 10:39:59.013954 systemd-logind[1465]: Session 72 logged out. Waiting for processes to exit. Feb 9 10:39:59.014358 systemd-logind[1465]: Removed session 72. Feb 9 10:39:58.929000 audit[8475]: CRED_ACQ pid=8475 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:59.112017 kernel: audit: type=1101 audit(1707475198.929:2050): pid=8475 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:59.112053 kernel: audit: type=1103 audit(1707475198.929:2051): pid=8475 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:59.112069 kernel: audit: type=1006 audit(1707475198.929:2052): pid=8475 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=72 res=1 Feb 9 10:39:59.170656 kernel: audit: type=1300 audit(1707475198.929:2052): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea895c610 a2=3 a3=0 items=0 ppid=1 pid=8475 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:58.929000 audit[8475]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea895c610 a2=3 a3=0 items=0 ppid=1 pid=8475 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:39:59.262694 kernel: audit: type=1327 audit(1707475198.929:2052): proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:58.929000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:39:59.293216 kernel: audit: type=1105 audit(1707475198.934:2053): pid=8475 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:58.934000 audit[8475]: USER_START pid=8475 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:59.387915 kernel: audit: type=1103 audit(1707475198.935:2054): pid=8477 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:58.935000 audit[8477]: CRED_ACQ pid=8477 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:59.477152 kernel: audit: type=1106 audit(1707475199.011:2055): pid=8475 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:59.011000 audit[8475]: USER_END pid=8475 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:59.572841 kernel: audit: type=1104 audit(1707475199.011:2056): pid=8475 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:59.011000 audit[8475]: CRED_DISP pid=8475 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:39:59.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.49.59:22-147.75.109.163:43688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:04.025153 systemd[1]: Started sshd@71-147.75.49.59:22-147.75.109.163:43692.service. Feb 9 10:40:04.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.49.59:22-147.75.109.163:43692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:04.053082 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:40:04.053132 kernel: audit: type=1130 audit(1707475204.024:2058): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.49.59:22-147.75.109.163:43692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:04.165000 audit[8530]: USER_ACCT pid=8530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:04.166227 sshd[8530]: Accepted publickey for core from 147.75.109.163 port 43692 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:40:04.167402 sshd[8530]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:40:04.169512 systemd-logind[1465]: New session 73 of user core. Feb 9 10:40:04.170275 systemd[1]: Started session-73.scope. Feb 9 10:40:04.248449 sshd[8530]: pam_unix(sshd:session): session closed for user core Feb 9 10:40:04.249791 systemd[1]: sshd@71-147.75.49.59:22-147.75.109.163:43692.service: Deactivated successfully. Feb 9 10:40:04.250234 systemd[1]: session-73.scope: Deactivated successfully. Feb 9 10:40:04.250587 systemd-logind[1465]: Session 73 logged out. Waiting for processes to exit. Feb 9 10:40:04.251082 systemd-logind[1465]: Removed session 73. Feb 9 10:40:04.165000 audit[8530]: CRED_ACQ pid=8530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:04.347959 kernel: audit: type=1101 audit(1707475204.165:2059): pid=8530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:04.348008 kernel: audit: type=1103 audit(1707475204.165:2060): pid=8530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:04.348046 kernel: audit: type=1006 audit(1707475204.165:2061): pid=8530 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=73 res=1 Feb 9 10:40:04.406528 kernel: audit: type=1300 audit(1707475204.165:2061): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7dd758e0 a2=3 a3=0 items=0 ppid=1 pid=8530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:04.165000 audit[8530]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7dd758e0 a2=3 a3=0 items=0 ppid=1 pid=8530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:04.498489 kernel: audit: type=1327 audit(1707475204.165:2061): proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:04.165000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:04.528996 kernel: audit: type=1105 audit(1707475204.171:2062): pid=8530 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:04.171000 audit[8530]: USER_START pid=8530 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:04.623571 kernel: audit: type=1103 audit(1707475204.171:2063): pid=8532 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:04.171000 audit[8532]: CRED_ACQ pid=8532 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:04.247000 audit[8530]: USER_END pid=8530 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:04.808250 kernel: audit: type=1106 audit(1707475204.247:2064): pid=8530 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:04.808286 kernel: audit: type=1104 audit(1707475204.247:2065): pid=8530 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:04.247000 audit[8530]: CRED_DISP pid=8530 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:04.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.49.59:22-147.75.109.163:43692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:09.258160 systemd[1]: Started sshd@72-147.75.49.59:22-147.75.109.163:46938.service. Feb 9 10:40:09.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.49.59:22-147.75.109.163:46938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:09.284953 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:40:09.285037 kernel: audit: type=1130 audit(1707475209.256:2067): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.49.59:22-147.75.109.163:46938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:09.401000 audit[8558]: USER_ACCT pid=8558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:09.402504 sshd[8558]: Accepted publickey for core from 147.75.109.163 port 46938 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:40:09.403704 sshd[8558]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:40:09.406620 systemd-logind[1465]: New session 74 of user core. Feb 9 10:40:09.407096 systemd[1]: Started session-74.scope. Feb 9 10:40:09.486390 sshd[8558]: pam_unix(sshd:session): session closed for user core Feb 9 10:40:09.487865 systemd[1]: sshd@72-147.75.49.59:22-147.75.109.163:46938.service: Deactivated successfully. Feb 9 10:40:09.488363 systemd[1]: session-74.scope: Deactivated successfully. Feb 9 10:40:09.488743 systemd-logind[1465]: Session 74 logged out. Waiting for processes to exit. Feb 9 10:40:09.489127 systemd-logind[1465]: Removed session 74. Feb 9 10:40:09.403000 audit[8558]: CRED_ACQ pid=8558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:09.584195 kernel: audit: type=1101 audit(1707475209.401:2068): pid=8558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:09.584242 kernel: audit: type=1103 audit(1707475209.403:2069): pid=8558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:09.584260 kernel: audit: type=1006 audit(1707475209.403:2070): pid=8558 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=74 res=1 Feb 9 10:40:09.403000 audit[8558]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf0980fc0 a2=3 a3=0 items=0 ppid=1 pid=8558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:09.734737 kernel: audit: type=1300 audit(1707475209.403:2070): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf0980fc0 a2=3 a3=0 items=0 ppid=1 pid=8558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:09.734773 kernel: audit: type=1327 audit(1707475209.403:2070): proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:09.403000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:09.765235 kernel: audit: type=1105 audit(1707475209.408:2071): pid=8558 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:09.408000 audit[8558]: USER_START pid=8558 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:09.859708 kernel: audit: type=1103 audit(1707475209.408:2072): pid=8560 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:09.408000 audit[8560]: CRED_ACQ pid=8560 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:09.486000 audit[8558]: USER_END pid=8558 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:10.044276 kernel: audit: type=1106 audit(1707475209.486:2073): pid=8558 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:10.044319 kernel: audit: type=1104 audit(1707475209.486:2074): pid=8558 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:09.486000 audit[8558]: CRED_DISP pid=8558 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:09.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.49.59:22-147.75.109.163:46938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:12.756000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:40:12.756000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006cd890 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:40:12.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:40:12.756000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:40:12.756000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00018ad20 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:40:12.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:40:12.800000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:40:12.800000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00d2b6a20 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:40:12.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:40:12.800000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:40:12.800000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012ae5470 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:40:12.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:40:12.800000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:40:12.800000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:40:12.800000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00d2b6ab0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:40:12.800000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01314d600 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:40:12.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:40:12.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:40:12.800000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:40:12.800000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00794a300 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:40:12.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:40:12.800000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:40:12.800000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c011ba9900 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:40:12.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:40:14.496553 systemd[1]: Started sshd@73-147.75.49.59:22-147.75.109.163:35728.service. Feb 9 10:40:14.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.49.59:22-147.75.109.163:35728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:14.523760 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:40:14.523833 kernel: audit: type=1130 audit(1707475214.496:2084): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.49.59:22-147.75.109.163:35728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:14.635000 audit[8599]: USER_ACCT pid=8599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:14.635873 sshd[8599]: Accepted publickey for core from 147.75.109.163 port 35728 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:40:14.637303 sshd[8599]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:40:14.639950 systemd-logind[1465]: New session 75 of user core. Feb 9 10:40:14.641107 systemd[1]: Started session-75.scope. Feb 9 10:40:14.636000 audit[8599]: CRED_ACQ pid=8599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:14.732400 sshd[8599]: pam_unix(sshd:session): session closed for user core Feb 9 10:40:14.734019 systemd[1]: sshd@73-147.75.49.59:22-147.75.109.163:35728.service: Deactivated successfully. Feb 9 10:40:14.734696 systemd[1]: session-75.scope: Deactivated successfully. Feb 9 10:40:14.735141 systemd-logind[1465]: Session 75 logged out. Waiting for processes to exit. Feb 9 10:40:14.735627 systemd-logind[1465]: Removed session 75. Feb 9 10:40:14.817475 kernel: audit: type=1101 audit(1707475214.635:2085): pid=8599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:14.817521 kernel: audit: type=1103 audit(1707475214.636:2086): pid=8599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:14.817541 kernel: audit: type=1006 audit(1707475214.636:2087): pid=8599 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=75 res=1 Feb 9 10:40:14.876038 kernel: audit: type=1300 audit(1707475214.636:2087): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9b8c55b0 a2=3 a3=0 items=0 ppid=1 pid=8599 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:14.636000 audit[8599]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9b8c55b0 a2=3 a3=0 items=0 ppid=1 pid=8599 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:14.967999 kernel: audit: type=1327 audit(1707475214.636:2087): proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:14.636000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:14.998480 kernel: audit: type=1105 audit(1707475214.643:2088): pid=8599 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:14.643000 audit[8599]: USER_START pid=8599 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:15.092959 kernel: audit: type=1103 audit(1707475214.643:2089): pid=8601 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:14.643000 audit[8601]: CRED_ACQ pid=8601 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:15.182114 kernel: audit: type=1106 audit(1707475214.732:2090): pid=8599 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:14.732000 audit[8599]: USER_END pid=8599 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:15.277528 kernel: audit: type=1104 audit(1707475214.732:2091): pid=8599 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:14.732000 audit[8599]: CRED_DISP pid=8599 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:14.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.49.59:22-147.75.109.163:35728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:16.572000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:40:16.572000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000db0900 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:40:16.572000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:40:16.572000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:40:16.572000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001077020 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:40:16.572000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:40:16.572000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:40:16.572000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000de7b00 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:40:16.572000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:40:16.572000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:40:16.572000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c93320 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:40:16.572000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:40:19.743702 systemd[1]: Started sshd@74-147.75.49.59:22-147.75.109.163:35732.service. Feb 9 10:40:19.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.49.59:22-147.75.109.163:35732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:19.782060 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:40:19.782146 kernel: audit: type=1130 audit(1707475219.743:2097): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.49.59:22-147.75.109.163:35732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:19.893000 audit[8626]: USER_ACCT pid=8626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:19.893738 sshd[8626]: Accepted publickey for core from 147.75.109.163 port 35732 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:40:19.896026 sshd[8626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:40:19.898645 systemd-logind[1465]: New session 76 of user core. Feb 9 10:40:19.899745 systemd[1]: Started session-76.scope. Feb 9 10:40:19.978790 sshd[8626]: pam_unix(sshd:session): session closed for user core Feb 9 10:40:19.980426 systemd[1]: sshd@74-147.75.49.59:22-147.75.109.163:35732.service: Deactivated successfully. Feb 9 10:40:19.981185 systemd[1]: session-76.scope: Deactivated successfully. Feb 9 10:40:19.981776 systemd-logind[1465]: Session 76 logged out. Waiting for processes to exit. Feb 9 10:40:19.982267 systemd-logind[1465]: Removed session 76. Feb 9 10:40:19.895000 audit[8626]: CRED_ACQ pid=8626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:20.075531 kernel: audit: type=1101 audit(1707475219.893:2098): pid=8626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:20.075569 kernel: audit: type=1103 audit(1707475219.895:2099): pid=8626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:20.075587 kernel: audit: type=1006 audit(1707475219.895:2100): pid=8626 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=76 res=1 Feb 9 10:40:20.134106 kernel: audit: type=1300 audit(1707475219.895:2100): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4e564cc0 a2=3 a3=0 items=0 ppid=1 pid=8626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:19.895000 audit[8626]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4e564cc0 a2=3 a3=0 items=0 ppid=1 pid=8626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:20.226127 kernel: audit: type=1327 audit(1707475219.895:2100): proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:19.895000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:20.256624 kernel: audit: type=1105 audit(1707475219.901:2101): pid=8626 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:19.901000 audit[8626]: USER_START pid=8626 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:20.351178 kernel: audit: type=1103 audit(1707475219.902:2102): pid=8628 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:19.902000 audit[8628]: CRED_ACQ pid=8628 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:20.440417 kernel: audit: type=1106 audit(1707475219.979:2103): pid=8626 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:19.979000 audit[8626]: USER_END pid=8626 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:20.535921 kernel: audit: type=1104 audit(1707475219.979:2104): pid=8626 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:19.979000 audit[8626]: CRED_DISP pid=8626 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:19.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.49.59:22-147.75.109.163:35732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:24.988448 systemd[1]: Started sshd@75-147.75.49.59:22-147.75.109.163:58900.service. Feb 9 10:40:24.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.49.59:22-147.75.109.163:58900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:25.015462 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:40:25.015556 kernel: audit: type=1130 audit(1707475224.988:2106): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.49.59:22-147.75.109.163:58900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:25.124000 audit[8689]: USER_ACCT pid=8689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:25.125443 sshd[8689]: Accepted publickey for core from 147.75.109.163 port 58900 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:40:25.127077 sshd[8689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:40:25.129376 systemd-logind[1465]: New session 77 of user core. Feb 9 10:40:25.130098 systemd[1]: Started session-77.scope. Feb 9 10:40:25.207400 sshd[8689]: pam_unix(sshd:session): session closed for user core Feb 9 10:40:25.208758 systemd[1]: sshd@75-147.75.49.59:22-147.75.109.163:58900.service: Deactivated successfully. Feb 9 10:40:25.209206 systemd[1]: session-77.scope: Deactivated successfully. Feb 9 10:40:25.209620 systemd-logind[1465]: Session 77 logged out. Waiting for processes to exit. Feb 9 10:40:25.210152 systemd-logind[1465]: Removed session 77. Feb 9 10:40:25.126000 audit[8689]: CRED_ACQ pid=8689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:25.307263 kernel: audit: type=1101 audit(1707475225.124:2107): pid=8689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:25.307294 kernel: audit: type=1103 audit(1707475225.126:2108): pid=8689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:25.307316 kernel: audit: type=1006 audit(1707475225.126:2109): pid=8689 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=77 res=1 Feb 9 10:40:25.365883 kernel: audit: type=1300 audit(1707475225.126:2109): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd018f4b0 a2=3 a3=0 items=0 ppid=1 pid=8689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:25.126000 audit[8689]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd018f4b0 a2=3 a3=0 items=0 ppid=1 pid=8689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:25.457870 kernel: audit: type=1327 audit(1707475225.126:2109): proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:25.126000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:25.488425 kernel: audit: type=1105 audit(1707475225.131:2110): pid=8689 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:25.131000 audit[8689]: USER_START pid=8689 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:25.582930 kernel: audit: type=1103 audit(1707475225.132:2111): pid=8691 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:25.132000 audit[8691]: CRED_ACQ pid=8691 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:25.672175 kernel: audit: type=1106 audit(1707475225.207:2112): pid=8689 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:25.207000 audit[8689]: USER_END pid=8689 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:25.767671 kernel: audit: type=1104 audit(1707475225.207:2113): pid=8689 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:25.207000 audit[8689]: CRED_DISP pid=8689 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:25.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.49.59:22-147.75.109.163:58900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:27.986822 update_engine[1467]: I0209 10:40:27.986702 1467 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 10:40:27.986822 update_engine[1467]: I0209 10:40:27.986788 1467 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 10:40:27.989272 update_engine[1467]: I0209 10:40:27.989192 1467 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 10:40:27.990210 update_engine[1467]: I0209 10:40:27.990130 1467 omaha_request_params.cc:62] Current group set to lts Feb 9 10:40:27.990537 update_engine[1467]: I0209 10:40:27.990455 1467 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 10:40:27.990537 update_engine[1467]: I0209 10:40:27.990475 1467 update_attempter.cc:643] Scheduling an action processor start. Feb 9 10:40:27.990537 update_engine[1467]: I0209 10:40:27.990507 1467 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 10:40:27.990873 update_engine[1467]: I0209 10:40:27.990571 1467 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 10:40:27.990873 update_engine[1467]: I0209 10:40:27.990725 1467 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 10:40:27.990873 update_engine[1467]: I0209 10:40:27.990741 1467 omaha_request_action.cc:271] Request: Feb 9 10:40:27.990873 update_engine[1467]: Feb 9 10:40:27.990873 update_engine[1467]: Feb 9 10:40:27.990873 update_engine[1467]: Feb 9 10:40:27.990873 update_engine[1467]: Feb 9 10:40:27.990873 update_engine[1467]: Feb 9 10:40:27.990873 update_engine[1467]: Feb 9 10:40:27.990873 update_engine[1467]: Feb 9 10:40:27.990873 update_engine[1467]: Feb 9 10:40:27.990873 update_engine[1467]: I0209 10:40:27.990751 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:40:27.992045 locksmithd[1511]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 10:40:27.993868 update_engine[1467]: I0209 10:40:27.993788 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:40:27.994080 update_engine[1467]: E0209 10:40:27.994004 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:40:27.994202 update_engine[1467]: I0209 10:40:27.994159 1467 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 10:40:30.217048 systemd[1]: Started sshd@76-147.75.49.59:22-147.75.109.163:58914.service. Feb 9 10:40:30.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.49.59:22-147.75.109.163:58914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:30.244155 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:40:30.244211 kernel: audit: type=1130 audit(1707475230.216:2115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.49.59:22-147.75.109.163:58914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:30.356000 audit[8714]: USER_ACCT pid=8714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:30.356497 sshd[8714]: Accepted publickey for core from 147.75.109.163 port 58914 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:40:30.357648 sshd[8714]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:40:30.360070 systemd-logind[1465]: New session 78 of user core. Feb 9 10:40:30.360523 systemd[1]: Started session-78.scope. Feb 9 10:40:30.437803 sshd[8714]: pam_unix(sshd:session): session closed for user core Feb 9 10:40:30.439189 systemd[1]: sshd@76-147.75.49.59:22-147.75.109.163:58914.service: Deactivated successfully. Feb 9 10:40:30.439617 systemd[1]: session-78.scope: Deactivated successfully. Feb 9 10:40:30.439956 systemd-logind[1465]: Session 78 logged out. Waiting for processes to exit. Feb 9 10:40:30.440324 systemd-logind[1465]: Removed session 78. Feb 9 10:40:30.357000 audit[8714]: CRED_ACQ pid=8714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:30.538213 kernel: audit: type=1101 audit(1707475230.356:2116): pid=8714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:30.538254 kernel: audit: type=1103 audit(1707475230.357:2117): pid=8714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:30.538271 kernel: audit: type=1006 audit(1707475230.357:2118): pid=8714 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=78 res=1 Feb 9 10:40:30.596754 kernel: audit: type=1300 audit(1707475230.357:2118): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1c40e170 a2=3 a3=0 items=0 ppid=1 pid=8714 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:30.357000 audit[8714]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1c40e170 a2=3 a3=0 items=0 ppid=1 pid=8714 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:30.688750 kernel: audit: type=1327 audit(1707475230.357:2118): proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:30.357000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:30.719270 kernel: audit: type=1105 audit(1707475230.362:2119): pid=8714 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:30.362000 audit[8714]: USER_START pid=8714 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:30.813737 kernel: audit: type=1103 audit(1707475230.362:2120): pid=8716 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:30.362000 audit[8716]: CRED_ACQ pid=8716 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:30.902911 kernel: audit: type=1106 audit(1707475230.438:2121): pid=8714 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:30.438000 audit[8714]: USER_END pid=8714 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:30.438000 audit[8714]: CRED_DISP pid=8714 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:31.087776 kernel: audit: type=1104 audit(1707475230.438:2122): pid=8714 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:30.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.49.59:22-147.75.109.163:58914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:35.447963 systemd[1]: Started sshd@77-147.75.49.59:22-147.75.109.163:38510.service. Feb 9 10:40:35.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.49.59:22-147.75.109.163:38510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:35.474947 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:40:35.475043 kernel: audit: type=1130 audit(1707475235.447:2124): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.49.59:22-147.75.109.163:38510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:35.587000 audit[8766]: USER_ACCT pid=8766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:35.587542 sshd[8766]: Accepted publickey for core from 147.75.109.163 port 38510 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:40:35.590725 sshd[8766]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:40:35.592978 systemd-logind[1465]: New session 79 of user core. Feb 9 10:40:35.593724 systemd[1]: Started session-79.scope. Feb 9 10:40:35.590000 audit[8766]: CRED_ACQ pid=8766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:35.681311 sshd[8766]: pam_unix(sshd:session): session closed for user core Feb 9 10:40:35.682767 systemd[1]: sshd@77-147.75.49.59:22-147.75.109.163:38510.service: Deactivated successfully. Feb 9 10:40:35.683245 systemd[1]: session-79.scope: Deactivated successfully. Feb 9 10:40:35.683624 systemd-logind[1465]: Session 79 logged out. Waiting for processes to exit. Feb 9 10:40:35.684100 systemd-logind[1465]: Removed session 79. Feb 9 10:40:35.769265 kernel: audit: type=1101 audit(1707475235.587:2125): pid=8766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:35.769331 kernel: audit: type=1103 audit(1707475235.590:2126): pid=8766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:35.769355 kernel: audit: type=1006 audit(1707475235.590:2127): pid=8766 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=79 res=1 Feb 9 10:40:35.590000 audit[8766]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd79e64340 a2=3 a3=0 items=0 ppid=1 pid=8766 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:35.919850 kernel: audit: type=1300 audit(1707475235.590:2127): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd79e64340 a2=3 a3=0 items=0 ppid=1 pid=8766 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:35.919892 kernel: audit: type=1327 audit(1707475235.590:2127): proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:35.590000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:35.595000 audit[8766]: USER_START pid=8766 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:36.044841 kernel: audit: type=1105 audit(1707475235.595:2128): pid=8766 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:36.044877 kernel: audit: type=1103 audit(1707475235.596:2129): pid=8768 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:35.596000 audit[8768]: CRED_ACQ pid=8768 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:36.134117 kernel: audit: type=1106 audit(1707475235.681:2130): pid=8766 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:35.681000 audit[8766]: USER_END pid=8766 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:36.229581 kernel: audit: type=1104 audit(1707475235.681:2131): pid=8766 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:35.681000 audit[8766]: CRED_DISP pid=8766 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:35.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.49.59:22-147.75.109.163:38510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:37.986631 update_engine[1467]: I0209 10:40:37.986438 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:40:37.987455 update_engine[1467]: I0209 10:40:37.986850 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:40:37.987455 update_engine[1467]: E0209 10:40:37.987042 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:40:37.987455 update_engine[1467]: I0209 10:40:37.987211 1467 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 10:40:40.691161 systemd[1]: Started sshd@78-147.75.49.59:22-147.75.109.163:38518.service. Feb 9 10:40:40.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.49.59:22-147.75.109.163:38518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:40.718008 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:40:40.718078 kernel: audit: type=1130 audit(1707475240.690:2133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.49.59:22-147.75.109.163:38518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:40.829000 audit[8790]: USER_ACCT pid=8790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:40.829708 sshd[8790]: Accepted publickey for core from 147.75.109.163 port 38518 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:40:40.831632 sshd[8790]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:40:40.833961 systemd-logind[1465]: New session 80 of user core. Feb 9 10:40:40.834798 systemd[1]: Started session-80.scope. Feb 9 10:40:40.914695 sshd[8790]: pam_unix(sshd:session): session closed for user core Feb 9 10:40:40.916020 systemd[1]: sshd@78-147.75.49.59:22-147.75.109.163:38518.service: Deactivated successfully. Feb 9 10:40:40.916509 systemd[1]: session-80.scope: Deactivated successfully. Feb 9 10:40:40.916964 systemd-logind[1465]: Session 80 logged out. Waiting for processes to exit. Feb 9 10:40:40.917441 systemd-logind[1465]: Removed session 80. Feb 9 10:40:40.831000 audit[8790]: CRED_ACQ pid=8790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:40.923429 kernel: audit: type=1101 audit(1707475240.829:2134): pid=8790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:40.923477 kernel: audit: type=1103 audit(1707475240.831:2135): pid=8790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:41.072004 kernel: audit: type=1006 audit(1707475240.831:2136): pid=8790 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=80 res=1 Feb 9 10:40:41.072039 kernel: audit: type=1300 audit(1707475240.831:2136): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0be91980 a2=3 a3=0 items=0 ppid=1 pid=8790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:40.831000 audit[8790]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0be91980 a2=3 a3=0 items=0 ppid=1 pid=8790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:41.164011 kernel: audit: type=1327 audit(1707475240.831:2136): proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:40.831000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:41.194502 kernel: audit: type=1105 audit(1707475240.836:2137): pid=8790 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:40.836000 audit[8790]: USER_START pid=8790 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:41.288962 kernel: audit: type=1103 audit(1707475240.837:2138): pid=8792 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:40.837000 audit[8792]: CRED_ACQ pid=8792 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:40.914000 audit[8790]: USER_END pid=8790 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:41.378408 kernel: audit: type=1106 audit(1707475240.914:2139): pid=8790 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:40.914000 audit[8790]: CRED_DISP pid=8790 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:41.562891 kernel: audit: type=1104 audit(1707475240.914:2140): pid=8790 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:40.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.49.59:22-147.75.109.163:38518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:45.928435 systemd[1]: Started sshd@79-147.75.49.59:22-147.75.109.163:56068.service. Feb 9 10:40:45.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.49.59:22-147.75.109.163:56068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:45.956249 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:40:45.956293 kernel: audit: type=1130 audit(1707475245.928:2142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.49.59:22-147.75.109.163:56068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:46.067000 audit[8816]: USER_ACCT pid=8816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:46.068322 sshd[8816]: Accepted publickey for core from 147.75.109.163 port 56068 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:40:46.069665 sshd[8816]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:40:46.072035 systemd-logind[1465]: New session 81 of user core. Feb 9 10:40:46.072502 systemd[1]: Started session-81.scope. Feb 9 10:40:46.151063 sshd[8816]: pam_unix(sshd:session): session closed for user core Feb 9 10:40:46.152456 systemd[1]: sshd@79-147.75.49.59:22-147.75.109.163:56068.service: Deactivated successfully. Feb 9 10:40:46.152934 systemd[1]: session-81.scope: Deactivated successfully. Feb 9 10:40:46.153274 systemd-logind[1465]: Session 81 logged out. Waiting for processes to exit. Feb 9 10:40:46.153700 systemd-logind[1465]: Removed session 81. Feb 9 10:40:46.069000 audit[8816]: CRED_ACQ pid=8816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:46.250174 kernel: audit: type=1101 audit(1707475246.067:2143): pid=8816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:46.250212 kernel: audit: type=1103 audit(1707475246.069:2144): pid=8816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:46.250231 kernel: audit: type=1006 audit(1707475246.069:2145): pid=8816 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=81 res=1 Feb 9 10:40:46.308746 kernel: audit: type=1300 audit(1707475246.069:2145): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbf2f5460 a2=3 a3=0 items=0 ppid=1 pid=8816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:46.069000 audit[8816]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbf2f5460 a2=3 a3=0 items=0 ppid=1 pid=8816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:46.400722 kernel: audit: type=1327 audit(1707475246.069:2145): proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:46.069000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:46.431211 kernel: audit: type=1105 audit(1707475246.074:2146): pid=8816 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:46.074000 audit[8816]: USER_START pid=8816 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:46.525703 kernel: audit: type=1103 audit(1707475246.075:2147): pid=8818 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:46.075000 audit[8818]: CRED_ACQ pid=8818 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:46.614864 kernel: audit: type=1106 audit(1707475246.151:2148): pid=8816 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:46.151000 audit[8816]: USER_END pid=8816 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:46.710341 kernel: audit: type=1104 audit(1707475246.151:2149): pid=8816 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:46.151000 audit[8816]: CRED_DISP pid=8816 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:46.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.49.59:22-147.75.109.163:56068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:47.985819 update_engine[1467]: I0209 10:40:47.985692 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:40:47.986803 update_engine[1467]: I0209 10:40:47.986142 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:40:47.986803 update_engine[1467]: E0209 10:40:47.986399 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:40:47.986803 update_engine[1467]: I0209 10:40:47.986654 1467 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 10:40:51.160330 systemd[1]: Started sshd@80-147.75.49.59:22-147.75.109.163:56080.service. Feb 9 10:40:51.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.49.59:22-147.75.109.163:56080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:51.187402 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:40:51.187491 kernel: audit: type=1130 audit(1707475251.160:2151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.49.59:22-147.75.109.163:56080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:51.298000 audit[8840]: USER_ACCT pid=8840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:51.299300 sshd[8840]: Accepted publickey for core from 147.75.109.163 port 56080 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:40:51.300652 sshd[8840]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:40:51.302729 systemd-logind[1465]: New session 82 of user core. Feb 9 10:40:51.303515 systemd[1]: Started session-82.scope. Feb 9 10:40:51.300000 audit[8840]: CRED_ACQ pid=8840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:51.393074 sshd[8840]: pam_unix(sshd:session): session closed for user core Feb 9 10:40:51.394606 systemd[1]: sshd@80-147.75.49.59:22-147.75.109.163:56080.service: Deactivated successfully. Feb 9 10:40:51.395086 systemd[1]: session-82.scope: Deactivated successfully. Feb 9 10:40:51.395471 systemd-logind[1465]: Session 82 logged out. Waiting for processes to exit. Feb 9 10:40:51.395898 systemd-logind[1465]: Removed session 82. Feb 9 10:40:51.481562 kernel: audit: type=1101 audit(1707475251.298:2152): pid=8840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:51.481607 kernel: audit: type=1103 audit(1707475251.300:2153): pid=8840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:51.481624 kernel: audit: type=1006 audit(1707475251.300:2154): pid=8840 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=82 res=1 Feb 9 10:40:51.540126 kernel: audit: type=1300 audit(1707475251.300:2154): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde45558c0 a2=3 a3=0 items=0 ppid=1 pid=8840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:51.300000 audit[8840]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde45558c0 a2=3 a3=0 items=0 ppid=1 pid=8840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:51.632125 kernel: audit: type=1327 audit(1707475251.300:2154): proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:51.300000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:51.662639 kernel: audit: type=1105 audit(1707475251.305:2155): pid=8840 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:51.305000 audit[8840]: USER_START pid=8840 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:51.757133 kernel: audit: type=1103 audit(1707475251.306:2156): pid=8842 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:51.306000 audit[8842]: CRED_ACQ pid=8842 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:51.846311 kernel: audit: type=1106 audit(1707475251.393:2157): pid=8840 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:51.393000 audit[8840]: USER_END pid=8840 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:51.941768 kernel: audit: type=1104 audit(1707475251.393:2158): pid=8840 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:51.393000 audit[8840]: CRED_DISP pid=8840 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:51.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.49.59:22-147.75.109.163:56080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:56.402159 systemd[1]: Started sshd@81-147.75.49.59:22-147.75.109.163:41842.service. Feb 9 10:40:56.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.49.59:22-147.75.109.163:41842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:56.429138 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:40:56.429176 kernel: audit: type=1130 audit(1707475256.401:2160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.49.59:22-147.75.109.163:41842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:56.540000 audit[8885]: USER_ACCT pid=8885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:56.540703 sshd[8885]: Accepted publickey for core from 147.75.109.163 port 41842 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:40:56.541748 sshd[8885]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:40:56.544022 systemd-logind[1465]: New session 83 of user core. Feb 9 10:40:56.544717 systemd[1]: Started session-83.scope. Feb 9 10:40:56.625932 sshd[8885]: pam_unix(sshd:session): session closed for user core Feb 9 10:40:56.627409 systemd[1]: sshd@81-147.75.49.59:22-147.75.109.163:41842.service: Deactivated successfully. Feb 9 10:40:56.627885 systemd[1]: session-83.scope: Deactivated successfully. Feb 9 10:40:56.628220 systemd-logind[1465]: Session 83 logged out. Waiting for processes to exit. Feb 9 10:40:56.628765 systemd-logind[1465]: Removed session 83. Feb 9 10:40:56.541000 audit[8885]: CRED_ACQ pid=8885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:56.722416 kernel: audit: type=1101 audit(1707475256.540:2161): pid=8885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:56.722452 kernel: audit: type=1103 audit(1707475256.541:2162): pid=8885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:56.722469 kernel: audit: type=1006 audit(1707475256.541:2163): pid=8885 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=83 res=1 Feb 9 10:40:56.781021 kernel: audit: type=1300 audit(1707475256.541:2163): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0401d800 a2=3 a3=0 items=0 ppid=1 pid=8885 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:56.541000 audit[8885]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0401d800 a2=3 a3=0 items=0 ppid=1 pid=8885 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:40:56.541000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:56.903517 kernel: audit: type=1327 audit(1707475256.541:2163): proctitle=737368643A20636F7265205B707269765D Feb 9 10:40:56.903547 kernel: audit: type=1105 audit(1707475256.546:2164): pid=8885 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:56.546000 audit[8885]: USER_START pid=8885 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:56.998023 kernel: audit: type=1103 audit(1707475256.547:2165): pid=8887 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:56.547000 audit[8887]: CRED_ACQ pid=8887 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:57.087194 kernel: audit: type=1106 audit(1707475256.626:2166): pid=8885 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:56.626000 audit[8885]: USER_END pid=8885 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:57.182712 kernel: audit: type=1104 audit(1707475256.626:2167): pid=8885 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:56.626000 audit[8885]: CRED_DISP pid=8885 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:40:56.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.49.59:22-147.75.109.163:41842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:40:57.984559 update_engine[1467]: I0209 10:40:57.984453 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:40:57.985295 update_engine[1467]: I0209 10:40:57.984886 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:40:57.985295 update_engine[1467]: E0209 10:40:57.985069 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:40:57.985295 update_engine[1467]: I0209 10:40:57.985208 1467 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 10:40:57.985295 update_engine[1467]: I0209 10:40:57.985224 1467 omaha_request_action.cc:621] Omaha request response: Feb 9 10:40:57.985745 update_engine[1467]: E0209 10:40:57.985389 1467 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 10:40:57.985745 update_engine[1467]: I0209 10:40:57.985415 1467 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 10:40:57.985745 update_engine[1467]: I0209 10:40:57.985424 1467 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 10:40:57.985745 update_engine[1467]: I0209 10:40:57.985431 1467 update_attempter.cc:306] Processing Done. Feb 9 10:40:57.985745 update_engine[1467]: E0209 10:40:57.985455 1467 update_attempter.cc:619] Update failed. Feb 9 10:40:57.985745 update_engine[1467]: I0209 10:40:57.985462 1467 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 10:40:57.985745 update_engine[1467]: I0209 10:40:57.985471 1467 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 10:40:57.985745 update_engine[1467]: I0209 10:40:57.985478 1467 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 10:40:57.985745 update_engine[1467]: I0209 10:40:57.985620 1467 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 10:40:57.985745 update_engine[1467]: I0209 10:40:57.985666 1467 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 10:40:57.985745 update_engine[1467]: I0209 10:40:57.985674 1467 omaha_request_action.cc:271] Request: Feb 9 10:40:57.985745 update_engine[1467]: Feb 9 10:40:57.985745 update_engine[1467]: Feb 9 10:40:57.985745 update_engine[1467]: Feb 9 10:40:57.985745 update_engine[1467]: Feb 9 10:40:57.985745 update_engine[1467]: Feb 9 10:40:57.985745 update_engine[1467]: Feb 9 10:40:57.985745 update_engine[1467]: I0209 10:40:57.985683 1467 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:40:57.987643 update_engine[1467]: I0209 10:40:57.985960 1467 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:40:57.987643 update_engine[1467]: E0209 10:40:57.986105 1467 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:40:57.987643 update_engine[1467]: I0209 10:40:57.986225 1467 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 10:40:57.987643 update_engine[1467]: I0209 10:40:57.986238 1467 omaha_request_action.cc:621] Omaha request response: Feb 9 10:40:57.987643 update_engine[1467]: I0209 10:40:57.986248 1467 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 10:40:57.987643 update_engine[1467]: I0209 10:40:57.986255 1467 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 10:40:57.987643 update_engine[1467]: I0209 10:40:57.986261 1467 update_attempter.cc:306] Processing Done. Feb 9 10:40:57.987643 update_engine[1467]: I0209 10:40:57.986268 1467 update_attempter.cc:310] Error event sent. Feb 9 10:40:57.987643 update_engine[1467]: I0209 10:40:57.986289 1467 update_check_scheduler.cc:74] Next update check in 41m29s Feb 9 10:40:57.988396 locksmithd[1511]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 10:40:57.988396 locksmithd[1511]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 10:41:01.635955 systemd[1]: Started sshd@82-147.75.49.59:22-147.75.109.163:41848.service. Feb 9 10:41:01.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.49.59:22-147.75.109.163:41848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:01.662803 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:41:01.662886 kernel: audit: type=1130 audit(1707475261.635:2169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.49.59:22-147.75.109.163:41848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:01.774000 audit[8913]: USER_ACCT pid=8913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:01.774509 sshd[8913]: Accepted publickey for core from 147.75.109.163 port 41848 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:41:01.776542 sshd[8913]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:41:01.778932 systemd-logind[1465]: New session 84 of user core. Feb 9 10:41:01.779649 systemd[1]: Started session-84.scope. Feb 9 10:41:01.776000 audit[8913]: CRED_ACQ pid=8913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:01.868174 sshd[8913]: pam_unix(sshd:session): session closed for user core Feb 9 10:41:01.869563 systemd[1]: sshd@82-147.75.49.59:22-147.75.109.163:41848.service: Deactivated successfully. Feb 9 10:41:01.870012 systemd[1]: session-84.scope: Deactivated successfully. Feb 9 10:41:01.870325 systemd-logind[1465]: Session 84 logged out. Waiting for processes to exit. Feb 9 10:41:01.870925 systemd-logind[1465]: Removed session 84. Feb 9 10:41:01.956248 kernel: audit: type=1101 audit(1707475261.774:2170): pid=8913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:01.956287 kernel: audit: type=1103 audit(1707475261.776:2171): pid=8913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:01.956303 kernel: audit: type=1006 audit(1707475261.776:2172): pid=8913 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=84 res=1 Feb 9 10:41:01.776000 audit[8913]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2003e5d0 a2=3 a3=0 items=0 ppid=1 pid=8913 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:02.106862 kernel: audit: type=1300 audit(1707475261.776:2172): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2003e5d0 a2=3 a3=0 items=0 ppid=1 pid=8913 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:02.106900 kernel: audit: type=1327 audit(1707475261.776:2172): proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:01.776000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:02.137353 kernel: audit: type=1105 audit(1707475261.781:2173): pid=8913 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:01.781000 audit[8913]: USER_START pid=8913 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:02.231843 kernel: audit: type=1103 audit(1707475261.782:2174): pid=8915 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:01.782000 audit[8915]: CRED_ACQ pid=8915 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:02.321134 kernel: audit: type=1106 audit(1707475261.868:2175): pid=8913 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:01.868000 audit[8913]: USER_END pid=8913 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:02.416612 kernel: audit: type=1104 audit(1707475261.868:2176): pid=8913 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:01.868000 audit[8913]: CRED_DISP pid=8913 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:01.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.49.59:22-147.75.109.163:41848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:06.877774 systemd[1]: Started sshd@83-147.75.49.59:22-147.75.109.163:37426.service. Feb 9 10:41:06.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.49.59:22-147.75.109.163:37426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:06.904845 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:41:06.904934 kernel: audit: type=1130 audit(1707475266.876:2178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.49.59:22-147.75.109.163:37426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:07.017394 sshd[8966]: Accepted publickey for core from 147.75.109.163 port 37426 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:41:07.016000 audit[8966]: USER_ACCT pid=8966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:07.018811 sshd[8966]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:41:07.021229 systemd-logind[1465]: New session 85 of user core. Feb 9 10:41:07.021843 systemd[1]: Started session-85.scope. Feb 9 10:41:07.100099 sshd[8966]: pam_unix(sshd:session): session closed for user core Feb 9 10:41:07.101552 systemd[1]: sshd@83-147.75.49.59:22-147.75.109.163:37426.service: Deactivated successfully. Feb 9 10:41:07.101989 systemd[1]: session-85.scope: Deactivated successfully. Feb 9 10:41:07.102278 systemd-logind[1465]: Session 85 logged out. Waiting for processes to exit. Feb 9 10:41:07.102838 systemd-logind[1465]: Removed session 85. Feb 9 10:41:07.017000 audit[8966]: CRED_ACQ pid=8966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:07.199217 kernel: audit: type=1101 audit(1707475267.016:2179): pid=8966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:07.199259 kernel: audit: type=1103 audit(1707475267.017:2180): pid=8966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:07.199277 kernel: audit: type=1006 audit(1707475267.017:2181): pid=8966 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=85 res=1 Feb 9 10:41:07.257763 kernel: audit: type=1300 audit(1707475267.017:2181): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebb289370 a2=3 a3=0 items=0 ppid=1 pid=8966 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:07.017000 audit[8966]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebb289370 a2=3 a3=0 items=0 ppid=1 pid=8966 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:07.017000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:07.380291 kernel: audit: type=1327 audit(1707475267.017:2181): proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:07.380322 kernel: audit: type=1105 audit(1707475267.022:2182): pid=8966 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:07.022000 audit[8966]: USER_START pid=8966 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:07.474909 kernel: audit: type=1103 audit(1707475267.023:2183): pid=8968 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:07.023000 audit[8968]: CRED_ACQ pid=8968 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:07.564134 kernel: audit: type=1106 audit(1707475267.099:2184): pid=8966 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:07.099000 audit[8966]: USER_END pid=8966 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:07.099000 audit[8966]: CRED_DISP pid=8966 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:07.660419 kernel: audit: type=1104 audit(1707475267.099:2185): pid=8966 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:07.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.49.59:22-147.75.109.163:37426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:12.109817 systemd[1]: Started sshd@84-147.75.49.59:22-147.75.109.163:37428.service. Feb 9 10:41:12.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.49.59:22-147.75.109.163:37428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:12.136381 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:41:12.136422 kernel: audit: type=1130 audit(1707475272.108:2187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.49.59:22-147.75.109.163:37428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:12.246000 audit[8991]: USER_ACCT pid=8991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:12.248343 sshd[8991]: Accepted publickey for core from 147.75.109.163 port 37428 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:41:12.249490 sshd[8991]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:41:12.251844 systemd-logind[1465]: New session 86 of user core. Feb 9 10:41:12.252284 systemd[1]: Started session-86.scope. Feb 9 10:41:12.331624 sshd[8991]: pam_unix(sshd:session): session closed for user core Feb 9 10:41:12.333015 systemd[1]: sshd@84-147.75.49.59:22-147.75.109.163:37428.service: Deactivated successfully. Feb 9 10:41:12.333466 systemd[1]: session-86.scope: Deactivated successfully. Feb 9 10:41:12.333852 systemd-logind[1465]: Session 86 logged out. Waiting for processes to exit. Feb 9 10:41:12.334252 systemd-logind[1465]: Removed session 86. Feb 9 10:41:12.247000 audit[8991]: CRED_ACQ pid=8991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:12.430089 kernel: audit: type=1101 audit(1707475272.246:2188): pid=8991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:12.430136 kernel: audit: type=1103 audit(1707475272.247:2189): pid=8991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:12.430153 kernel: audit: type=1006 audit(1707475272.248:2190): pid=8991 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=86 res=1 Feb 9 10:41:12.488650 kernel: audit: type=1300 audit(1707475272.248:2190): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9219d900 a2=3 a3=0 items=0 ppid=1 pid=8991 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:12.248000 audit[8991]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9219d900 a2=3 a3=0 items=0 ppid=1 pid=8991 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:12.580775 kernel: audit: type=1327 audit(1707475272.248:2190): proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:12.248000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:12.611315 kernel: audit: type=1105 audit(1707475272.253:2191): pid=8991 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:12.253000 audit[8991]: USER_START pid=8991 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:12.705817 kernel: audit: type=1103 audit(1707475272.253:2192): pid=8993 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:12.253000 audit[8993]: CRED_ACQ pid=8993 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:12.795034 kernel: audit: type=1106 audit(1707475272.330:2193): pid=8991 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:12.330000 audit[8991]: USER_END pid=8991 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:12.890530 kernel: audit: type=1104 audit(1707475272.331:2194): pid=8991 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:12.331000 audit[8991]: CRED_DISP pid=8991 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:12.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.49.59:22-147.75.109.163:37428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:12.756000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:41:12.756000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0006d8c20 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:41:12.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:41:12.756000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:41:12.756000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007f67e0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:41:12.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:41:12.800000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:41:12.800000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00bdde6e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:41:12.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:41:12.800000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:41:12.800000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012f97ad0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:41:12.800000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:41:12.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:41:12.800000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c008c4c120 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:41:12.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:41:12.800000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:41:12.800000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00bdde720 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:41:12.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:41:12.800000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:41:12.800000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:41:12.800000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c013f9f680 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:41:12.800000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c012f97b30 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:41:12.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:41:12.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:41:16.571000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:41:16.571000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014b8460 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:41:16.571000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:41:16.572000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:41:16.572000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c93220 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:41:16.572000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:41:16.572000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:41:16.572000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a9e060 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:41:16.572000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:41:16.572000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:41:16.572000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002ec1b40 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:41:16.572000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:41:17.341075 systemd[1]: Started sshd@85-147.75.49.59:22-147.75.109.163:41820.service. Feb 9 10:41:17.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.49.59:22-147.75.109.163:41820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:17.368286 kernel: kauditd_printk_skb: 37 callbacks suppressed Feb 9 10:41:17.368370 kernel: audit: type=1130 audit(1707475277.339:2208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.49.59:22-147.75.109.163:41820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:17.478000 audit[9020]: USER_ACCT pid=9020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:17.480148 sshd[9020]: Accepted publickey for core from 147.75.109.163 port 41820 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:41:17.481651 sshd[9020]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:41:17.483948 systemd-logind[1465]: New session 87 of user core. Feb 9 10:41:17.484452 systemd[1]: Started session-87.scope. Feb 9 10:41:17.563060 sshd[9020]: pam_unix(sshd:session): session closed for user core Feb 9 10:41:17.564460 systemd[1]: sshd@85-147.75.49.59:22-147.75.109.163:41820.service: Deactivated successfully. Feb 9 10:41:17.564888 systemd[1]: session-87.scope: Deactivated successfully. Feb 9 10:41:17.565227 systemd-logind[1465]: Session 87 logged out. Waiting for processes to exit. Feb 9 10:41:17.565725 systemd-logind[1465]: Removed session 87. Feb 9 10:41:17.480000 audit[9020]: CRED_ACQ pid=9020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:17.661882 kernel: audit: type=1101 audit(1707475277.478:2209): pid=9020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:17.661948 kernel: audit: type=1103 audit(1707475277.480:2210): pid=9020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:17.661965 kernel: audit: type=1006 audit(1707475277.480:2211): pid=9020 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=87 res=1 Feb 9 10:41:17.720467 kernel: audit: type=1300 audit(1707475277.480:2211): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3f26ff70 a2=3 a3=0 items=0 ppid=1 pid=9020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:17.480000 audit[9020]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3f26ff70 a2=3 a3=0 items=0 ppid=1 pid=9020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:17.480000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:17.843108 kernel: audit: type=1327 audit(1707475277.480:2211): proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:17.843151 kernel: audit: type=1105 audit(1707475277.485:2212): pid=9020 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:17.485000 audit[9020]: USER_START pid=9020 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:17.937566 kernel: audit: type=1103 audit(1707475277.485:2213): pid=9022 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:17.485000 audit[9022]: CRED_ACQ pid=9022 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:18.026786 kernel: audit: type=1106 audit(1707475277.562:2214): pid=9020 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:17.562000 audit[9020]: USER_END pid=9020 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:18.122224 kernel: audit: type=1104 audit(1707475277.562:2215): pid=9020 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:17.562000 audit[9020]: CRED_DISP pid=9020 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:17.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.49.59:22-147.75.109.163:41820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:22.576641 systemd[1]: Started sshd@86-147.75.49.59:22-147.75.109.163:41832.service. Feb 9 10:41:22.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.49.59:22-147.75.109.163:41832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:22.617395 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:41:22.617515 kernel: audit: type=1130 audit(1707475282.576:2217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.49.59:22-147.75.109.163:41832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:22.727400 sshd[9046]: Accepted publickey for core from 147.75.109.163 port 41832 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:41:22.726000 audit[9046]: USER_ACCT pid=9046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:22.728650 sshd[9046]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:41:22.730909 systemd-logind[1465]: New session 88 of user core. Feb 9 10:41:22.731665 systemd[1]: Started session-88.scope. Feb 9 10:41:22.808763 sshd[9046]: pam_unix(sshd:session): session closed for user core Feb 9 10:41:22.810056 systemd[1]: sshd@86-147.75.49.59:22-147.75.109.163:41832.service: Deactivated successfully. Feb 9 10:41:22.810543 systemd[1]: session-88.scope: Deactivated successfully. Feb 9 10:41:22.810880 systemd-logind[1465]: Session 88 logged out. Waiting for processes to exit. Feb 9 10:41:22.811288 systemd-logind[1465]: Removed session 88. Feb 9 10:41:22.727000 audit[9046]: CRED_ACQ pid=9046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:22.909244 kernel: audit: type=1101 audit(1707475282.726:2218): pid=9046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:22.909284 kernel: audit: type=1103 audit(1707475282.727:2219): pid=9046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:22.909301 kernel: audit: type=1006 audit(1707475282.727:2220): pid=9046 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=88 res=1 Feb 9 10:41:22.727000 audit[9046]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0eec8020 a2=3 a3=0 items=0 ppid=1 pid=9046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:23.059728 kernel: audit: type=1300 audit(1707475282.727:2220): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0eec8020 a2=3 a3=0 items=0 ppid=1 pid=9046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:23.059766 kernel: audit: type=1327 audit(1707475282.727:2220): proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:22.727000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:23.090211 kernel: audit: type=1105 audit(1707475282.732:2221): pid=9046 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:22.732000 audit[9046]: USER_START pid=9046 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:23.184669 kernel: audit: type=1103 audit(1707475282.733:2222): pid=9048 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:22.733000 audit[9048]: CRED_ACQ pid=9048 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:22.808000 audit[9046]: USER_END pid=9046 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:23.274413 kernel: audit: type=1106 audit(1707475282.808:2223): pid=9046 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:22.808000 audit[9046]: CRED_DISP pid=9046 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:23.458606 kernel: audit: type=1104 audit(1707475282.808:2224): pid=9046 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:22.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.49.59:22-147.75.109.163:41832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:27.818415 systemd[1]: Started sshd@87-147.75.49.59:22-147.75.109.163:60506.service. Feb 9 10:41:27.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.49.59:22-147.75.109.163:60506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:27.845379 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:41:27.845439 kernel: audit: type=1130 audit(1707475287.817:2226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.49.59:22-147.75.109.163:60506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:27.956000 audit[9115]: USER_ACCT pid=9115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:27.957658 sshd[9115]: Accepted publickey for core from 147.75.109.163 port 60506 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:41:27.958940 sshd[9115]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:41:27.961471 systemd-logind[1465]: New session 89 of user core. Feb 9 10:41:27.962296 systemd[1]: Started session-89.scope. Feb 9 10:41:28.040868 sshd[9115]: pam_unix(sshd:session): session closed for user core Feb 9 10:41:28.042112 systemd[1]: sshd@87-147.75.49.59:22-147.75.109.163:60506.service: Deactivated successfully. Feb 9 10:41:28.042633 systemd[1]: session-89.scope: Deactivated successfully. Feb 9 10:41:28.042988 systemd-logind[1465]: Session 89 logged out. Waiting for processes to exit. Feb 9 10:41:28.043749 systemd-logind[1465]: Removed session 89. Feb 9 10:41:27.957000 audit[9115]: CRED_ACQ pid=9115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:28.141165 kernel: audit: type=1101 audit(1707475287.956:2227): pid=9115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:28.141204 kernel: audit: type=1103 audit(1707475287.957:2228): pid=9115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:28.141221 kernel: audit: type=1006 audit(1707475287.957:2229): pid=9115 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=89 res=1 Feb 9 10:41:28.199732 kernel: audit: type=1300 audit(1707475287.957:2229): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa011d260 a2=3 a3=0 items=0 ppid=1 pid=9115 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:27.957000 audit[9115]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa011d260 a2=3 a3=0 items=0 ppid=1 pid=9115 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:28.291685 kernel: audit: type=1327 audit(1707475287.957:2229): proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:27.957000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:28.322222 kernel: audit: type=1105 audit(1707475287.963:2230): pid=9115 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:27.963000 audit[9115]: USER_START pid=9115 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:28.416661 kernel: audit: type=1103 audit(1707475287.964:2231): pid=9117 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:27.964000 audit[9117]: CRED_ACQ pid=9117 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:28.505840 kernel: audit: type=1106 audit(1707475288.040:2232): pid=9115 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:28.040000 audit[9115]: USER_END pid=9115 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:28.601307 kernel: audit: type=1104 audit(1707475288.040:2233): pid=9115 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:28.040000 audit[9115]: CRED_DISP pid=9115 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:28.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.49.59:22-147.75.109.163:60506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:33.054925 systemd[1]: Started sshd@88-147.75.49.59:22-147.75.109.163:60514.service. Feb 9 10:41:33.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.49.59:22-147.75.109.163:60514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:33.082741 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:41:33.082845 kernel: audit: type=1130 audit(1707475293.054:2235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.49.59:22-147.75.109.163:60514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:33.192000 audit[9168]: USER_ACCT pid=9168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:33.193650 sshd[9168]: Accepted publickey for core from 147.75.109.163 port 60514 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:41:33.197669 sshd[9168]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:41:33.200096 systemd-logind[1465]: New session 90 of user core. Feb 9 10:41:33.200853 systemd[1]: Started session-90.scope. Feb 9 10:41:33.281693 sshd[9168]: pam_unix(sshd:session): session closed for user core Feb 9 10:41:33.283125 systemd[1]: sshd@88-147.75.49.59:22-147.75.109.163:60514.service: Deactivated successfully. Feb 9 10:41:33.283606 systemd[1]: session-90.scope: Deactivated successfully. Feb 9 10:41:33.283976 systemd-logind[1465]: Session 90 logged out. Waiting for processes to exit. Feb 9 10:41:33.284705 systemd-logind[1465]: Removed session 90. Feb 9 10:41:33.196000 audit[9168]: CRED_ACQ pid=9168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:33.375425 kernel: audit: type=1101 audit(1707475293.192:2236): pid=9168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:33.375470 kernel: audit: type=1103 audit(1707475293.196:2237): pid=9168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:33.375487 kernel: audit: type=1006 audit(1707475293.196:2238): pid=9168 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=90 res=1 Feb 9 10:41:33.433964 kernel: audit: type=1300 audit(1707475293.196:2238): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea3bd8200 a2=3 a3=0 items=0 ppid=1 pid=9168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:33.196000 audit[9168]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea3bd8200 a2=3 a3=0 items=0 ppid=1 pid=9168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:33.196000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:33.556499 kernel: audit: type=1327 audit(1707475293.196:2238): proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:33.556530 kernel: audit: type=1105 audit(1707475293.202:2239): pid=9168 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:33.202000 audit[9168]: USER_START pid=9168 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:33.651016 kernel: audit: type=1103 audit(1707475293.202:2240): pid=9170 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:33.202000 audit[9170]: CRED_ACQ pid=9170 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:33.740233 kernel: audit: type=1106 audit(1707475293.281:2241): pid=9168 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:33.281000 audit[9168]: USER_END pid=9168 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:33.835768 kernel: audit: type=1104 audit(1707475293.281:2242): pid=9168 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:33.281000 audit[9168]: CRED_DISP pid=9168 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:33.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.49.59:22-147.75.109.163:60514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:38.295225 systemd[1]: Started sshd@89-147.75.49.59:22-147.75.109.163:54366.service. Feb 9 10:41:38.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.49.59:22-147.75.109.163:54366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:38.339731 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:41:38.339834 kernel: audit: type=1130 audit(1707475298.294:2244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.49.59:22-147.75.109.163:54366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:38.449000 audit[9194]: USER_ACCT pid=9194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:38.451228 sshd[9194]: Accepted publickey for core from 147.75.109.163 port 54366 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:41:38.452624 sshd[9194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:41:38.454925 systemd-logind[1465]: New session 91 of user core. Feb 9 10:41:38.455624 systemd[1]: Started session-91.scope. Feb 9 10:41:38.532403 sshd[9194]: pam_unix(sshd:session): session closed for user core Feb 9 10:41:38.533864 systemd[1]: sshd@89-147.75.49.59:22-147.75.109.163:54366.service: Deactivated successfully. Feb 9 10:41:38.534296 systemd[1]: session-91.scope: Deactivated successfully. Feb 9 10:41:38.534724 systemd-logind[1465]: Session 91 logged out. Waiting for processes to exit. Feb 9 10:41:38.535227 systemd-logind[1465]: Removed session 91. Feb 9 10:41:38.451000 audit[9194]: CRED_ACQ pid=9194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:38.633034 kernel: audit: type=1101 audit(1707475298.449:2245): pid=9194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:38.633072 kernel: audit: type=1103 audit(1707475298.451:2246): pid=9194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:38.633089 kernel: audit: type=1006 audit(1707475298.451:2247): pid=9194 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=91 res=1 Feb 9 10:41:38.691620 kernel: audit: type=1300 audit(1707475298.451:2247): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffccaa6580 a2=3 a3=0 items=0 ppid=1 pid=9194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:38.451000 audit[9194]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffccaa6580 a2=3 a3=0 items=0 ppid=1 pid=9194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:38.783659 kernel: audit: type=1327 audit(1707475298.451:2247): proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:38.451000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:38.814180 kernel: audit: type=1105 audit(1707475298.456:2248): pid=9194 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:38.456000 audit[9194]: USER_START pid=9194 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:38.908743 kernel: audit: type=1103 audit(1707475298.457:2249): pid=9196 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:38.457000 audit[9196]: CRED_ACQ pid=9196 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:38.531000 audit[9194]: USER_END pid=9194 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:39.093509 kernel: audit: type=1106 audit(1707475298.531:2250): pid=9194 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:39.093547 kernel: audit: type=1104 audit(1707475298.531:2251): pid=9194 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:38.531000 audit[9194]: CRED_DISP pid=9194 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:38.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.49.59:22-147.75.109.163:54366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:43.535993 systemd[1]: Started sshd@90-147.75.49.59:22-147.75.109.163:54372.service. Feb 9 10:41:43.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.49.59:22-147.75.109.163:54372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:43.562848 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:41:43.562907 kernel: audit: type=1130 audit(1707475303.534:2253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.49.59:22-147.75.109.163:54372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:43.673000 audit[9218]: USER_ACCT pid=9218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:43.674817 sshd[9218]: Accepted publickey for core from 147.75.109.163 port 54372 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:41:43.676516 sshd[9218]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:41:43.678872 systemd-logind[1465]: New session 92 of user core. Feb 9 10:41:43.679319 systemd[1]: Started session-92.scope. Feb 9 10:41:43.761441 sshd[9218]: pam_unix(sshd:session): session closed for user core Feb 9 10:41:43.762895 systemd[1]: sshd@90-147.75.49.59:22-147.75.109.163:54372.service: Deactivated successfully. Feb 9 10:41:43.763351 systemd[1]: session-92.scope: Deactivated successfully. Feb 9 10:41:43.763743 systemd-logind[1465]: Session 92 logged out. Waiting for processes to exit. Feb 9 10:41:43.764213 systemd-logind[1465]: Removed session 92. Feb 9 10:41:43.674000 audit[9218]: CRED_ACQ pid=9218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:43.856554 kernel: audit: type=1101 audit(1707475303.673:2254): pid=9218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:43.856595 kernel: audit: type=1103 audit(1707475303.674:2255): pid=9218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:43.856611 kernel: audit: type=1006 audit(1707475303.674:2256): pid=9218 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=92 res=1 Feb 9 10:41:43.915156 kernel: audit: type=1300 audit(1707475303.674:2256): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd020b1a90 a2=3 a3=0 items=0 ppid=1 pid=9218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:43.674000 audit[9218]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd020b1a90 a2=3 a3=0 items=0 ppid=1 pid=9218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:44.007142 kernel: audit: type=1327 audit(1707475303.674:2256): proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:43.674000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:44.037638 kernel: audit: type=1105 audit(1707475303.680:2257): pid=9218 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:43.680000 audit[9218]: USER_START pid=9218 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:44.132130 kernel: audit: type=1103 audit(1707475303.680:2258): pid=9220 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:43.680000 audit[9220]: CRED_ACQ pid=9220 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:44.221401 kernel: audit: type=1106 audit(1707475303.760:2259): pid=9218 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:43.760000 audit[9218]: USER_END pid=9218 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:44.316903 kernel: audit: type=1104 audit(1707475303.760:2260): pid=9218 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:43.760000 audit[9218]: CRED_DISP pid=9218 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:43.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.49.59:22-147.75.109.163:54372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:48.772940 systemd[1]: Started sshd@91-147.75.49.59:22-147.75.109.163:56932.service. Feb 9 10:41:48.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.49.59:22-147.75.109.163:56932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:48.800402 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:41:48.800460 kernel: audit: type=1130 audit(1707475308.772:2262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.49.59:22-147.75.109.163:56932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:48.911000 audit[9243]: USER_ACCT pid=9243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:48.912742 sshd[9243]: Accepted publickey for core from 147.75.109.163 port 56932 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:41:48.914643 sshd[9243]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:41:48.916917 systemd-logind[1465]: New session 93 of user core. Feb 9 10:41:48.917426 systemd[1]: Started session-93.scope. Feb 9 10:41:48.995397 sshd[9243]: pam_unix(sshd:session): session closed for user core Feb 9 10:41:48.996856 systemd[1]: sshd@91-147.75.49.59:22-147.75.109.163:56932.service: Deactivated successfully. Feb 9 10:41:48.997301 systemd[1]: session-93.scope: Deactivated successfully. Feb 9 10:41:48.997661 systemd-logind[1465]: Session 93 logged out. Waiting for processes to exit. Feb 9 10:41:48.998144 systemd-logind[1465]: Removed session 93. Feb 9 10:41:48.913000 audit[9243]: CRED_ACQ pid=9243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:49.094583 kernel: audit: type=1101 audit(1707475308.911:2263): pid=9243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:49.094617 kernel: audit: type=1103 audit(1707475308.913:2264): pid=9243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:49.094633 kernel: audit: type=1006 audit(1707475308.913:2265): pid=9243 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=93 res=1 Feb 9 10:41:49.153167 kernel: audit: type=1300 audit(1707475308.913:2265): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebb8cae90 a2=3 a3=0 items=0 ppid=1 pid=9243 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:48.913000 audit[9243]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebb8cae90 a2=3 a3=0 items=0 ppid=1 pid=9243 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:49.245265 kernel: audit: type=1327 audit(1707475308.913:2265): proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:48.913000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:49.275757 kernel: audit: type=1105 audit(1707475308.918:2266): pid=9243 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:48.918000 audit[9243]: USER_START pid=9243 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:49.370247 kernel: audit: type=1103 audit(1707475308.919:2267): pid=9245 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:48.919000 audit[9245]: CRED_ACQ pid=9245 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:49.459428 kernel: audit: type=1106 audit(1707475308.994:2268): pid=9243 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:48.994000 audit[9243]: USER_END pid=9243 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:49.554930 kernel: audit: type=1104 audit(1707475308.994:2269): pid=9243 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:48.994000 audit[9243]: CRED_DISP pid=9243 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:48.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.49.59:22-147.75.109.163:56932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:54.005151 systemd[1]: Started sshd@92-147.75.49.59:22-147.75.109.163:56942.service. Feb 9 10:41:54.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.49.59:22-147.75.109.163:56942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:54.031944 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:41:54.032002 kernel: audit: type=1130 audit(1707475314.003:2271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.49.59:22-147.75.109.163:56942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:54.142000 audit[9283]: USER_ACCT pid=9283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:54.144367 sshd[9283]: Accepted publickey for core from 147.75.109.163 port 56942 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:41:54.145478 sshd[9283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:41:54.147822 systemd-logind[1465]: New session 94 of user core. Feb 9 10:41:54.148384 systemd[1]: Started session-94.scope. Feb 9 10:41:54.228681 sshd[9283]: pam_unix(sshd:session): session closed for user core Feb 9 10:41:54.230137 systemd[1]: sshd@92-147.75.49.59:22-147.75.109.163:56942.service: Deactivated successfully. Feb 9 10:41:54.230634 systemd[1]: session-94.scope: Deactivated successfully. Feb 9 10:41:54.231027 systemd-logind[1465]: Session 94 logged out. Waiting for processes to exit. Feb 9 10:41:54.231529 systemd-logind[1465]: Removed session 94. Feb 9 10:41:54.143000 audit[9283]: CRED_ACQ pid=9283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:54.328133 kernel: audit: type=1101 audit(1707475314.142:2272): pid=9283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:54.328167 kernel: audit: type=1103 audit(1707475314.143:2273): pid=9283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:54.328188 kernel: audit: type=1006 audit(1707475314.143:2274): pid=9283 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=94 res=1 Feb 9 10:41:54.386791 kernel: audit: type=1300 audit(1707475314.143:2274): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdbb11460 a2=3 a3=0 items=0 ppid=1 pid=9283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=94 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:54.143000 audit[9283]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdbb11460 a2=3 a3=0 items=0 ppid=1 pid=9283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=94 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:54.478783 kernel: audit: type=1327 audit(1707475314.143:2274): proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:54.143000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:54.509309 kernel: audit: type=1105 audit(1707475314.149:2275): pid=9283 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:54.149000 audit[9283]: USER_START pid=9283 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:54.150000 audit[9285]: CRED_ACQ pid=9285 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:54.692969 kernel: audit: type=1103 audit(1707475314.150:2276): pid=9285 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:54.693006 kernel: audit: type=1106 audit(1707475314.228:2277): pid=9283 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:54.228000 audit[9283]: USER_END pid=9283 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:54.228000 audit[9283]: CRED_DISP pid=9283 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:54.877693 kernel: audit: type=1104 audit(1707475314.228:2278): pid=9283 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:54.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.49.59:22-147.75.109.163:56942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:59.240642 systemd[1]: Started sshd@93-147.75.49.59:22-147.75.109.163:42032.service. Feb 9 10:41:59.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.49.59:22-147.75.109.163:42032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:59.268314 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:41:59.268378 kernel: audit: type=1130 audit(1707475319.239:2280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.49.59:22-147.75.109.163:42032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:41:59.378000 audit[9330]: USER_ACCT pid=9330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:59.379851 sshd[9330]: Accepted publickey for core from 147.75.109.163 port 42032 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:41:59.381298 sshd[9330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:41:59.383729 systemd-logind[1465]: New session 95 of user core. Feb 9 10:41:59.384203 systemd[1]: Started session-95.scope. Feb 9 10:41:59.379000 audit[9330]: CRED_ACQ pid=9330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:59.474058 sshd[9330]: pam_unix(sshd:session): session closed for user core Feb 9 10:41:59.475463 systemd[1]: sshd@93-147.75.49.59:22-147.75.109.163:42032.service: Deactivated successfully. Feb 9 10:41:59.475904 systemd[1]: session-95.scope: Deactivated successfully. Feb 9 10:41:59.476246 systemd-logind[1465]: Session 95 logged out. Waiting for processes to exit. Feb 9 10:41:59.476864 systemd-logind[1465]: Removed session 95. Feb 9 10:41:59.561532 kernel: audit: type=1101 audit(1707475319.378:2281): pid=9330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:59.561577 kernel: audit: type=1103 audit(1707475319.379:2282): pid=9330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:59.561596 kernel: audit: type=1006 audit(1707475319.379:2283): pid=9330 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=95 res=1 Feb 9 10:41:59.620087 kernel: audit: type=1300 audit(1707475319.379:2283): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2f74daf0 a2=3 a3=0 items=0 ppid=1 pid=9330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=95 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:59.379000 audit[9330]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2f74daf0 a2=3 a3=0 items=0 ppid=1 pid=9330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=95 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:41:59.712044 kernel: audit: type=1327 audit(1707475319.379:2283): proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:59.379000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:41:59.742547 kernel: audit: type=1105 audit(1707475319.385:2284): pid=9330 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:59.385000 audit[9330]: USER_START pid=9330 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:59.836994 kernel: audit: type=1103 audit(1707475319.386:2285): pid=9332 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:59.386000 audit[9332]: CRED_ACQ pid=9332 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:59.926178 kernel: audit: type=1106 audit(1707475319.473:2286): pid=9330 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:59.473000 audit[9330]: USER_END pid=9330 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:59.473000 audit[9330]: CRED_DISP pid=9330 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:00.110907 kernel: audit: type=1104 audit(1707475319.473:2287): pid=9330 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:41:59.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.49.59:22-147.75.109.163:42032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:42:04.483609 systemd[1]: Started sshd@94-147.75.49.59:22-147.75.109.163:43726.service. Feb 9 10:42:04.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.49.59:22-147.75.109.163:43726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:42:04.510808 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:42:04.510862 kernel: audit: type=1130 audit(1707475324.482:2289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.49.59:22-147.75.109.163:43726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:42:04.619000 audit[9383]: USER_ACCT pid=9383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:04.620899 sshd[9383]: Accepted publickey for core from 147.75.109.163 port 43726 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:42:04.622091 sshd[9383]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:42:04.624336 systemd-logind[1465]: New session 96 of user core. Feb 9 10:42:04.624897 systemd[1]: Started session-96.scope. Feb 9 10:42:04.704752 sshd[9383]: pam_unix(sshd:session): session closed for user core Feb 9 10:42:04.706088 systemd[1]: sshd@94-147.75.49.59:22-147.75.109.163:43726.service: Deactivated successfully. Feb 9 10:42:04.706534 systemd[1]: session-96.scope: Deactivated successfully. Feb 9 10:42:04.706950 systemd-logind[1465]: Session 96 logged out. Waiting for processes to exit. Feb 9 10:42:04.707422 systemd-logind[1465]: Removed session 96. Feb 9 10:42:04.620000 audit[9383]: CRED_ACQ pid=9383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:04.802572 kernel: audit: type=1101 audit(1707475324.619:2290): pid=9383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:04.802612 kernel: audit: type=1103 audit(1707475324.620:2291): pid=9383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:04.802630 kernel: audit: type=1006 audit(1707475324.620:2292): pid=9383 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=96 res=1 Feb 9 10:42:04.861134 kernel: audit: type=1300 audit(1707475324.620:2292): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe95a76ee0 a2=3 a3=0 items=0 ppid=1 pid=9383 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=96 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:42:04.620000 audit[9383]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe95a76ee0 a2=3 a3=0 items=0 ppid=1 pid=9383 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=96 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:42:04.953148 kernel: audit: type=1327 audit(1707475324.620:2292): proctitle=737368643A20636F7265205B707269765D Feb 9 10:42:04.620000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:42:04.983637 kernel: audit: type=1105 audit(1707475324.625:2293): pid=9383 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:04.625000 audit[9383]: USER_START pid=9383 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:05.078093 kernel: audit: type=1103 audit(1707475324.626:2294): pid=9385 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:04.626000 audit[9385]: CRED_ACQ pid=9385 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:05.167236 kernel: audit: type=1106 audit(1707475324.704:2295): pid=9383 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:04.704000 audit[9383]: USER_END pid=9383 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:05.262713 kernel: audit: type=1104 audit(1707475324.704:2296): pid=9383 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:04.704000 audit[9383]: CRED_DISP pid=9383 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:04.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.49.59:22-147.75.109.163:43726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:42:09.713828 systemd[1]: Started sshd@95-147.75.49.59:22-147.75.109.163:43742.service. Feb 9 10:42:09.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.49.59:22-147.75.109.163:43742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:42:09.740368 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:42:09.740410 kernel: audit: type=1130 audit(1707475329.712:2298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.49.59:22-147.75.109.163:43742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:42:09.851000 audit[9409]: USER_ACCT pid=9409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:09.852762 sshd[9409]: Accepted publickey for core from 147.75.109.163 port 43742 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:42:09.854662 sshd[9409]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:42:09.856983 systemd-logind[1465]: New session 97 of user core. Feb 9 10:42:09.857470 systemd[1]: Started session-97.scope. Feb 9 10:42:09.936112 sshd[9409]: pam_unix(sshd:session): session closed for user core Feb 9 10:42:09.937567 systemd[1]: sshd@95-147.75.49.59:22-147.75.109.163:43742.service: Deactivated successfully. Feb 9 10:42:09.938009 systemd[1]: session-97.scope: Deactivated successfully. Feb 9 10:42:09.938305 systemd-logind[1465]: Session 97 logged out. Waiting for processes to exit. Feb 9 10:42:09.938949 systemd-logind[1465]: Removed session 97. Feb 9 10:42:09.853000 audit[9409]: CRED_ACQ pid=9409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:10.034423 kernel: audit: type=1101 audit(1707475329.851:2299): pid=9409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:10.034459 kernel: audit: type=1103 audit(1707475329.853:2300): pid=9409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:10.034478 kernel: audit: type=1006 audit(1707475329.853:2301): pid=9409 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=97 res=1 Feb 9 10:42:10.092964 kernel: audit: type=1300 audit(1707475329.853:2301): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8967bbb0 a2=3 a3=0 items=0 ppid=1 pid=9409 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=97 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:42:09.853000 audit[9409]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8967bbb0 a2=3 a3=0 items=0 ppid=1 pid=9409 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=97 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:42:10.184947 kernel: audit: type=1327 audit(1707475329.853:2301): proctitle=737368643A20636F7265205B707269765D Feb 9 10:42:09.853000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:42:10.215414 kernel: audit: type=1105 audit(1707475329.858:2302): pid=9409 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:09.858000 audit[9409]: USER_START pid=9409 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:10.309869 kernel: audit: type=1103 audit(1707475329.859:2303): pid=9411 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:09.859000 audit[9411]: CRED_ACQ pid=9411 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:10.399038 kernel: audit: type=1106 audit(1707475329.935:2304): pid=9409 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:09.935000 audit[9409]: USER_END pid=9409 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:10.494427 kernel: audit: type=1104 audit(1707475329.935:2305): pid=9409 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:09.935000 audit[9409]: CRED_DISP pid=9409 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:09.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.49.59:22-147.75.109.163:43742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:42:12.756000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:42:12.756000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002708de0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:42:12.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:42:12.756000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:42:12.756000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f8b5e0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:42:12.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:42:12.800000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:42:12.800000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0048886e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:42:12.800000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:42:12.801000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:42:12.801000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c005f14960 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:42:12.801000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:42:12.801000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:42:12.801000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c01229f620 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:42:12.801000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:42:12.801000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:42:12.801000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00bd180f0 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:42:12.801000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:42:12.801000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:42:12.801000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c008b9c030 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:42:12.801000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:42:12.801000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:42:12.801000 audit[2371]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0143f6000 a2=fc6 a3=0 items=0 ppid=2240 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c699,c702 key=(null) Feb 9 10:42:12.801000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E34392E3539002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:42:14.946285 systemd[1]: Started sshd@96-147.75.49.59:22-147.75.109.163:58108.service. Feb 9 10:42:14.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.49.59:22-147.75.109.163:58108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:42:14.972848 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:42:14.972888 kernel: audit: type=1130 audit(1707475334.945:2315): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.49.59:22-147.75.109.163:58108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:42:15.083000 audit[9434]: USER_ACCT pid=9434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:15.085067 sshd[9434]: Accepted publickey for core from 147.75.109.163 port 58108 ssh2: RSA SHA256:ZOC355QqrH2+lGBbdK08UfA2mwkOMdsag732KUNE1EI Feb 9 10:42:15.086647 sshd[9434]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:42:15.089291 systemd-logind[1465]: New session 98 of user core. Feb 9 10:42:15.089880 systemd[1]: Started session-98.scope. Feb 9 10:42:15.169561 sshd[9434]: pam_unix(sshd:session): session closed for user core Feb 9 10:42:15.171154 systemd[1]: sshd@96-147.75.49.59:22-147.75.109.163:58108.service: Deactivated successfully. Feb 9 10:42:15.171593 systemd[1]: session-98.scope: Deactivated successfully. Feb 9 10:42:15.172058 systemd-logind[1465]: Session 98 logged out. Waiting for processes to exit. Feb 9 10:42:15.172661 systemd-logind[1465]: Removed session 98. Feb 9 10:42:15.085000 audit[9434]: CRED_ACQ pid=9434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:15.267707 kernel: audit: type=1101 audit(1707475335.083:2316): pid=9434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:15.267748 kernel: audit: type=1103 audit(1707475335.085:2317): pid=9434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:15.267764 kernel: audit: type=1006 audit(1707475335.085:2318): pid=9434 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=98 res=1 Feb 9 10:42:15.326224 kernel: audit: type=1300 audit(1707475335.085:2318): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef173d690 a2=3 a3=0 items=0 ppid=1 pid=9434 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=98 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:42:15.085000 audit[9434]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef173d690 a2=3 a3=0 items=0 ppid=1 pid=9434 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=98 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:42:15.418141 kernel: audit: type=1327 audit(1707475335.085:2318): proctitle=737368643A20636F7265205B707269765D Feb 9 10:42:15.085000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:42:15.448633 kernel: audit: type=1105 audit(1707475335.091:2319): pid=9434 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:15.091000 audit[9434]: USER_START pid=9434 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:15.543094 kernel: audit: type=1103 audit(1707475335.092:2320): pid=9436 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:15.092000 audit[9436]: CRED_ACQ pid=9436 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:15.632238 kernel: audit: type=1106 audit(1707475335.169:2321): pid=9434 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:15.169000 audit[9434]: USER_END pid=9434 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:15.727666 kernel: audit: type=1104 audit(1707475335.169:2322): pid=9434 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:15.169000 audit[9434]: CRED_DISP pid=9434 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 10:42:15.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.49.59:22-147.75.109.163:58108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:42:16.573000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:42:16.573000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00015ee40 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:42:16.573000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:42:16.573000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:42:16.573000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c0b060 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:42:16.573000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:42:16.573000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:42:16.573000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027c9fe0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:42:16.573000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:42:16.573000 audit[2410]: AVC avc: denied { watch } for pid=2410 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:42:16.573000 audit[2410]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00128f6a0 a2=fc6 a3=0 items=0 ppid=2233 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c931 key=(null) Feb 9 10:42:16.573000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269