Feb 9 12:38:46.550554 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Feb 9 12:38:46.550566 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 12:38:46.550574 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 12:38:46.550578 kernel: BIOS-provided physical RAM map: Feb 9 12:38:46.550581 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 12:38:46.550585 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 12:38:46.550590 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 12:38:46.550593 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 12:38:46.550597 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 12:38:46.550601 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000062c36fff] usable Feb 9 12:38:46.550605 kernel: BIOS-e820: [mem 0x0000000062c37000-0x0000000062c37fff] ACPI NVS Feb 9 12:38:46.550609 kernel: BIOS-e820: [mem 0x0000000062c38000-0x0000000062c38fff] reserved Feb 9 12:38:46.550612 kernel: BIOS-e820: [mem 0x0000000062c39000-0x000000006c0c6fff] usable Feb 9 12:38:46.550616 kernel: BIOS-e820: [mem 0x000000006c0c7000-0x000000006d1a9fff] reserved Feb 9 12:38:46.550621 kernel: BIOS-e820: [mem 0x000000006d1aa000-0x000000006d332fff] usable Feb 9 12:38:46.550626 kernel: BIOS-e820: [mem 0x000000006d333000-0x000000006d764fff] ACPI NVS Feb 9 12:38:46.550630 kernel: BIOS-e820: [mem 0x000000006d765000-0x000000006fffefff] reserved Feb 9 12:38:46.550634 kernel: BIOS-e820: [mem 0x000000006ffff000-0x000000006fffffff] usable Feb 9 12:38:46.550638 kernel: BIOS-e820: [mem 0x0000000070000000-0x000000007b7fffff] reserved Feb 9 12:38:46.550642 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 12:38:46.550646 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 12:38:46.550650 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 12:38:46.550654 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 12:38:46.550658 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 12:38:46.550662 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000008837fffff] usable Feb 9 12:38:46.550667 kernel: NX (Execute Disable) protection: active Feb 9 12:38:46.550671 kernel: SMBIOS 3.2.1 present. Feb 9 12:38:46.550675 kernel: DMI: Supermicro X11SCH-F/X11SCH-F, BIOS 1.5 11/17/2020 Feb 9 12:38:46.550679 kernel: tsc: Detected 3400.000 MHz processor Feb 9 12:38:46.550683 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 12:38:46.550687 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 12:38:46.550692 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 12:38:46.550696 kernel: last_pfn = 0x883800 max_arch_pfn = 0x400000000 Feb 9 12:38:46.550700 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 12:38:46.550705 kernel: last_pfn = 0x70000 max_arch_pfn = 0x400000000 Feb 9 12:38:46.550709 kernel: Using GB pages for direct mapping Feb 9 12:38:46.550714 kernel: ACPI: Early table checksum verification disabled Feb 9 12:38:46.550718 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 12:38:46.550722 kernel: ACPI: XSDT 0x000000006D6460C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 12:38:46.550727 kernel: ACPI: FACP 0x000000006D682620 000114 (v06 01072009 AMI 00010013) Feb 9 12:38:46.550733 kernel: ACPI: DSDT 0x000000006D646268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 12:38:46.550737 kernel: ACPI: FACS 0x000000006D764F80 000040 Feb 9 12:38:46.550742 kernel: ACPI: APIC 0x000000006D682738 00012C (v04 01072009 AMI 00010013) Feb 9 12:38:46.550747 kernel: ACPI: FPDT 0x000000006D682868 000044 (v01 01072009 AMI 00010013) Feb 9 12:38:46.550752 kernel: ACPI: FIDT 0x000000006D6828B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 12:38:46.550756 kernel: ACPI: MCFG 0x000000006D682950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 12:38:46.550761 kernel: ACPI: SPMI 0x000000006D682990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 12:38:46.550765 kernel: ACPI: SSDT 0x000000006D6829D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 12:38:46.550770 kernel: ACPI: SSDT 0x000000006D6844F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 12:38:46.550775 kernel: ACPI: SSDT 0x000000006D6876C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 12:38:46.550779 kernel: ACPI: HPET 0x000000006D6899F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:38:46.550784 kernel: ACPI: SSDT 0x000000006D689A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 12:38:46.550789 kernel: ACPI: SSDT 0x000000006D68A9D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 12:38:46.550793 kernel: ACPI: UEFI 0x000000006D68B2D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:38:46.550798 kernel: ACPI: LPIT 0x000000006D68B318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:38:46.550802 kernel: ACPI: SSDT 0x000000006D68B3B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 12:38:46.550807 kernel: ACPI: SSDT 0x000000006D68DB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 12:38:46.550812 kernel: ACPI: DBGP 0x000000006D68F078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:38:46.550817 kernel: ACPI: DBG2 0x000000006D68F0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 12:38:46.550821 kernel: ACPI: SSDT 0x000000006D68F108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 12:38:46.550826 kernel: ACPI: DMAR 0x000000006D690C70 0000A8 (v01 INTEL EDK2 00000002 01000013) Feb 9 12:38:46.550830 kernel: ACPI: SSDT 0x000000006D690D18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 12:38:46.550835 kernel: ACPI: TPM2 0x000000006D690E60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 12:38:46.550839 kernel: ACPI: SSDT 0x000000006D690E98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 12:38:46.550844 kernel: ACPI: WSMT 0x000000006D691C28 000028 (v01 \xbcb 01072009 AMI 00010013) Feb 9 12:38:46.550849 kernel: ACPI: EINJ 0x000000006D691C50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 12:38:46.550854 kernel: ACPI: ERST 0x000000006D691D80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 12:38:46.550859 kernel: ACPI: BERT 0x000000006D691FB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 12:38:46.550863 kernel: ACPI: HEST 0x000000006D691FE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 12:38:46.550868 kernel: ACPI: SSDT 0x000000006D692260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 12:38:46.550872 kernel: ACPI: Reserving FACP table memory at [mem 0x6d682620-0x6d682733] Feb 9 12:38:46.550877 kernel: ACPI: Reserving DSDT table memory at [mem 0x6d646268-0x6d68261e] Feb 9 12:38:46.550881 kernel: ACPI: Reserving FACS table memory at [mem 0x6d764f80-0x6d764fbf] Feb 9 12:38:46.550886 kernel: ACPI: Reserving APIC table memory at [mem 0x6d682738-0x6d682863] Feb 9 12:38:46.550890 kernel: ACPI: Reserving FPDT table memory at [mem 0x6d682868-0x6d6828ab] Feb 9 12:38:46.550895 kernel: ACPI: Reserving FIDT table memory at [mem 0x6d6828b0-0x6d68294b] Feb 9 12:38:46.550900 kernel: ACPI: Reserving MCFG table memory at [mem 0x6d682950-0x6d68298b] Feb 9 12:38:46.550904 kernel: ACPI: Reserving SPMI table memory at [mem 0x6d682990-0x6d6829d0] Feb 9 12:38:46.550909 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6829d8-0x6d6844f3] Feb 9 12:38:46.550913 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6844f8-0x6d6876bd] Feb 9 12:38:46.550918 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6876c0-0x6d6899ea] Feb 9 12:38:46.550922 kernel: ACPI: Reserving HPET table memory at [mem 0x6d6899f0-0x6d689a27] Feb 9 12:38:46.550927 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d689a28-0x6d68a9d5] Feb 9 12:38:46.550931 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68a9d8-0x6d68b2ce] Feb 9 12:38:46.550937 kernel: ACPI: Reserving UEFI table memory at [mem 0x6d68b2d0-0x6d68b311] Feb 9 12:38:46.550941 kernel: ACPI: Reserving LPIT table memory at [mem 0x6d68b318-0x6d68b3ab] Feb 9 12:38:46.550946 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68b3b0-0x6d68db8d] Feb 9 12:38:46.550950 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68db90-0x6d68f071] Feb 9 12:38:46.550955 kernel: ACPI: Reserving DBGP table memory at [mem 0x6d68f078-0x6d68f0ab] Feb 9 12:38:46.550959 kernel: ACPI: Reserving DBG2 table memory at [mem 0x6d68f0b0-0x6d68f103] Feb 9 12:38:46.550964 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68f108-0x6d690c6e] Feb 9 12:38:46.550968 kernel: ACPI: Reserving DMAR table memory at [mem 0x6d690c70-0x6d690d17] Feb 9 12:38:46.550973 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d690d18-0x6d690e5b] Feb 9 12:38:46.550978 kernel: ACPI: Reserving TPM2 table memory at [mem 0x6d690e60-0x6d690e93] Feb 9 12:38:46.550983 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d690e98-0x6d691c26] Feb 9 12:38:46.550987 kernel: ACPI: Reserving WSMT table memory at [mem 0x6d691c28-0x6d691c4f] Feb 9 12:38:46.550992 kernel: ACPI: Reserving EINJ table memory at [mem 0x6d691c50-0x6d691d7f] Feb 9 12:38:46.550996 kernel: ACPI: Reserving ERST table memory at [mem 0x6d691d80-0x6d691faf] Feb 9 12:38:46.551001 kernel: ACPI: Reserving BERT table memory at [mem 0x6d691fb0-0x6d691fdf] Feb 9 12:38:46.551005 kernel: ACPI: Reserving HEST table memory at [mem 0x6d691fe0-0x6d69225b] Feb 9 12:38:46.551010 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d692260-0x6d6923c1] Feb 9 12:38:46.551014 kernel: No NUMA configuration found Feb 9 12:38:46.551019 kernel: Faking a node at [mem 0x0000000000000000-0x00000008837fffff] Feb 9 12:38:46.551024 kernel: NODE_DATA(0) allocated [mem 0x8837fa000-0x8837fffff] Feb 9 12:38:46.551028 kernel: Zone ranges: Feb 9 12:38:46.551033 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 12:38:46.551037 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 12:38:46.551042 kernel: Normal [mem 0x0000000100000000-0x00000008837fffff] Feb 9 12:38:46.551046 kernel: Movable zone start for each node Feb 9 12:38:46.551051 kernel: Early memory node ranges Feb 9 12:38:46.551055 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 12:38:46.551060 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 12:38:46.551065 kernel: node 0: [mem 0x0000000040400000-0x0000000062c36fff] Feb 9 12:38:46.551070 kernel: node 0: [mem 0x0000000062c39000-0x000000006c0c6fff] Feb 9 12:38:46.551074 kernel: node 0: [mem 0x000000006d1aa000-0x000000006d332fff] Feb 9 12:38:46.551079 kernel: node 0: [mem 0x000000006ffff000-0x000000006fffffff] Feb 9 12:38:46.551083 kernel: node 0: [mem 0x0000000100000000-0x00000008837fffff] Feb 9 12:38:46.551088 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000008837fffff] Feb 9 12:38:46.551096 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 12:38:46.551101 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 12:38:46.551106 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 12:38:46.551111 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 12:38:46.551117 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Feb 9 12:38:46.551121 kernel: On node 0, zone DMA32: 11468 pages in unavailable ranges Feb 9 12:38:46.551126 kernel: On node 0, zone Normal: 18432 pages in unavailable ranges Feb 9 12:38:46.551131 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 12:38:46.551136 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 12:38:46.551141 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 12:38:46.551147 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 12:38:46.551152 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 12:38:46.551156 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 12:38:46.551161 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 12:38:46.551166 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 12:38:46.551171 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 12:38:46.551175 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 12:38:46.551180 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 12:38:46.551185 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 12:38:46.551191 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 12:38:46.551195 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 12:38:46.551200 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 12:38:46.551205 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 12:38:46.551210 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 12:38:46.551215 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 12:38:46.551219 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 12:38:46.551224 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 12:38:46.551229 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 12:38:46.551235 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 12:38:46.551240 kernel: TSC deadline timer available Feb 9 12:38:46.551245 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 12:38:46.551249 kernel: [mem 0x7b800000-0xdfffffff] available for PCI devices Feb 9 12:38:46.551254 kernel: Booting paravirtualized kernel on bare hardware Feb 9 12:38:46.551259 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 12:38:46.551264 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 12:38:46.551269 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 12:38:46.551274 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 12:38:46.551279 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 12:38:46.551284 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8190325 Feb 9 12:38:46.551289 kernel: Policy zone: Normal Feb 9 12:38:46.551295 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 12:38:46.551300 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 12:38:46.551304 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 12:38:46.551309 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 12:38:46.551314 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 12:38:46.551320 kernel: Memory: 32555736K/33281948K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 725952K reserved, 0K cma-reserved) Feb 9 12:38:46.551325 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 12:38:46.551330 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 12:38:46.551335 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 12:38:46.551339 kernel: rcu: Hierarchical RCU implementation. Feb 9 12:38:46.551344 kernel: rcu: RCU event tracing is enabled. Feb 9 12:38:46.551349 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 12:38:46.551354 kernel: Rude variant of Tasks RCU enabled. Feb 9 12:38:46.551359 kernel: Tracing variant of Tasks RCU enabled. Feb 9 12:38:46.551365 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 12:38:46.551369 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 12:38:46.551374 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 12:38:46.551379 kernel: random: crng init done Feb 9 12:38:46.551384 kernel: Console: colour dummy device 80x25 Feb 9 12:38:46.551389 kernel: printk: console [tty0] enabled Feb 9 12:38:46.551393 kernel: printk: console [ttyS1] enabled Feb 9 12:38:46.551398 kernel: ACPI: Core revision 20210730 Feb 9 12:38:46.551403 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Feb 9 12:38:46.551409 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 12:38:46.551414 kernel: DMAR: Host address width 39 Feb 9 12:38:46.551419 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Feb 9 12:38:46.551423 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Feb 9 12:38:46.551428 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 12:38:46.551433 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 12:38:46.551438 kernel: DMAR: RMRR base: 0x0000006e011000 end: 0x0000006e25afff Feb 9 12:38:46.551443 kernel: DMAR: RMRR base: 0x00000079000000 end: 0x0000007b7fffff Feb 9 12:38:46.551448 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Feb 9 12:38:46.551453 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 12:38:46.551458 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 12:38:46.551463 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 12:38:46.551468 kernel: x2apic enabled Feb 9 12:38:46.551473 kernel: Switched APIC routing to cluster x2apic. Feb 9 12:38:46.551480 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 12:38:46.551485 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 12:38:46.551512 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 12:38:46.551517 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 12:38:46.551522 kernel: process: using mwait in idle threads Feb 9 12:38:46.551541 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 12:38:46.551546 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 12:38:46.551551 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 12:38:46.551556 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 12:38:46.551561 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 12:38:46.551566 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 12:38:46.551571 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 12:38:46.551576 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 12:38:46.551582 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 12:38:46.551587 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 12:38:46.551591 kernel: TAA: Mitigation: TSX disabled Feb 9 12:38:46.551596 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 12:38:46.551601 kernel: SRBDS: Mitigation: Microcode Feb 9 12:38:46.551606 kernel: GDS: Vulnerable: No microcode Feb 9 12:38:46.551611 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 12:38:46.551616 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 12:38:46.551620 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 12:38:46.551626 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 12:38:46.551631 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 12:38:46.551636 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 12:38:46.551641 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 12:38:46.551645 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 12:38:46.551650 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 12:38:46.551655 kernel: Freeing SMP alternatives memory: 32K Feb 9 12:38:46.551660 kernel: pid_max: default: 32768 minimum: 301 Feb 9 12:38:46.551665 kernel: LSM: Security Framework initializing Feb 9 12:38:46.551670 kernel: SELinux: Initializing. Feb 9 12:38:46.551675 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 12:38:46.551680 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 12:38:46.551685 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 12:38:46.551690 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 12:38:46.551695 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 12:38:46.551699 kernel: ... version: 4 Feb 9 12:38:46.551704 kernel: ... bit width: 48 Feb 9 12:38:46.551710 kernel: ... generic registers: 4 Feb 9 12:38:46.551715 kernel: ... value mask: 0000ffffffffffff Feb 9 12:38:46.551720 kernel: ... max period: 00007fffffffffff Feb 9 12:38:46.551724 kernel: ... fixed-purpose events: 3 Feb 9 12:38:46.551729 kernel: ... event mask: 000000070000000f Feb 9 12:38:46.551734 kernel: signal: max sigframe size: 2032 Feb 9 12:38:46.551739 kernel: rcu: Hierarchical SRCU implementation. Feb 9 12:38:46.551744 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 12:38:46.551749 kernel: smp: Bringing up secondary CPUs ... Feb 9 12:38:46.551753 kernel: x86: Booting SMP configuration: Feb 9 12:38:46.551759 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 12:38:46.551764 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 12:38:46.551769 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 12:38:46.551774 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 12:38:46.551779 kernel: smpboot: Max logical packages: 1 Feb 9 12:38:46.551784 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 12:38:46.551788 kernel: devtmpfs: initialized Feb 9 12:38:46.551793 kernel: x86/mm: Memory block size: 128MB Feb 9 12:38:46.551799 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x62c37000-0x62c37fff] (4096 bytes) Feb 9 12:38:46.551804 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6d333000-0x6d764fff] (4399104 bytes) Feb 9 12:38:46.551809 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 12:38:46.551814 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 12:38:46.551818 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 12:38:46.551823 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 12:38:46.551828 kernel: audit: initializing netlink subsys (disabled) Feb 9 12:38:46.551833 kernel: audit: type=2000 audit(1707482320.110:1): state=initialized audit_enabled=0 res=1 Feb 9 12:38:46.551838 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 12:38:46.551843 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 12:38:46.551848 kernel: cpuidle: using governor menu Feb 9 12:38:46.551853 kernel: ACPI: bus type PCI registered Feb 9 12:38:46.551858 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 12:38:46.551863 kernel: dca service started, version 1.12.1 Feb 9 12:38:46.551867 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 12:38:46.551872 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 12:38:46.551877 kernel: PCI: Using configuration type 1 for base access Feb 9 12:38:46.551882 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 12:38:46.551888 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 12:38:46.551892 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 12:38:46.551897 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 12:38:46.551902 kernel: ACPI: Added _OSI(Module Device) Feb 9 12:38:46.551907 kernel: ACPI: Added _OSI(Processor Device) Feb 9 12:38:46.551912 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 12:38:46.551916 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 12:38:46.551921 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 12:38:46.551926 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 12:38:46.551932 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 12:38:46.551937 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 12:38:46.551942 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:38:46.551946 kernel: ACPI: SSDT 0xFFFF920D80215700 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 12:38:46.551951 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 12:38:46.551956 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:38:46.551961 kernel: ACPI: SSDT 0xFFFF920D81CE8C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 12:38:46.551966 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:38:46.551971 kernel: ACPI: SSDT 0xFFFF920D81C5A000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 12:38:46.551975 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:38:46.551981 kernel: ACPI: SSDT 0xFFFF920D81C5D800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 12:38:46.551986 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:38:46.551990 kernel: ACPI: SSDT 0xFFFF920D80148000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 12:38:46.551995 kernel: ACPI: Dynamic OEM Table Load: Feb 9 12:38:46.552000 kernel: ACPI: SSDT 0xFFFF920D81CE9800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 12:38:46.552005 kernel: ACPI: Interpreter enabled Feb 9 12:38:46.552010 kernel: ACPI: PM: (supports S0 S5) Feb 9 12:38:46.552014 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 12:38:46.552019 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 12:38:46.552025 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 12:38:46.552030 kernel: HEST: Table parsing has been initialized. Feb 9 12:38:46.552035 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 12:38:46.552039 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 12:38:46.552044 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 12:38:46.552049 kernel: ACPI: PM: Power Resource [USBC] Feb 9 12:38:46.552054 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 12:38:46.552059 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 12:38:46.552064 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 12:38:46.552069 kernel: ACPI: PM: Power Resource [WRST] Feb 9 12:38:46.552074 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 9 12:38:46.552079 kernel: ACPI: PM: Power Resource [FN00] Feb 9 12:38:46.552084 kernel: ACPI: PM: Power Resource [FN01] Feb 9 12:38:46.552088 kernel: ACPI: PM: Power Resource [FN02] Feb 9 12:38:46.552093 kernel: ACPI: PM: Power Resource [FN03] Feb 9 12:38:46.552098 kernel: ACPI: PM: Power Resource [FN04] Feb 9 12:38:46.552103 kernel: ACPI: PM: Power Resource [PIN] Feb 9 12:38:46.552108 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 12:38:46.552171 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 12:38:46.552215 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 12:38:46.552255 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 12:38:46.552262 kernel: PCI host bridge to bus 0000:00 Feb 9 12:38:46.552304 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 12:38:46.552341 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 12:38:46.552378 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 12:38:46.552413 kernel: pci_bus 0000:00: root bus resource [mem 0x7b800000-0xdfffffff window] Feb 9 12:38:46.552449 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 12:38:46.552487 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 12:38:46.552571 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 12:38:46.552621 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 12:38:46.552663 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 12:38:46.552711 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Feb 9 12:38:46.552752 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Feb 9 12:38:46.552798 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Feb 9 12:38:46.552840 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x7c000000-0x7cffffff 64bit] Feb 9 12:38:46.552880 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Feb 9 12:38:46.552920 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Feb 9 12:38:46.552968 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 12:38:46.553010 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x7e51f000-0x7e51ffff 64bit] Feb 9 12:38:46.553054 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 12:38:46.553096 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x7e51e000-0x7e51efff 64bit] Feb 9 12:38:46.553140 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 12:38:46.553181 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x7e500000-0x7e50ffff 64bit] Feb 9 12:38:46.553223 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 12:38:46.553269 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 12:38:46.553310 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x7e512000-0x7e513fff 64bit] Feb 9 12:38:46.553351 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x7e51d000-0x7e51dfff 64bit] Feb 9 12:38:46.553394 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 12:38:46.553434 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 12:38:46.553481 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 12:38:46.553559 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 12:38:46.553603 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 12:38:46.553644 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x7e51a000-0x7e51afff 64bit] Feb 9 12:38:46.553685 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 12:38:46.553736 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 12:38:46.553778 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x7e519000-0x7e519fff 64bit] Feb 9 12:38:46.553820 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 12:38:46.553864 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 12:38:46.553905 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x7e518000-0x7e518fff 64bit] Feb 9 12:38:46.553945 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 12:38:46.553988 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 12:38:46.554029 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x7e510000-0x7e511fff] Feb 9 12:38:46.554069 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x7e517000-0x7e5170ff] Feb 9 12:38:46.554111 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Feb 9 12:38:46.554150 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Feb 9 12:38:46.554190 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Feb 9 12:38:46.554230 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x7e516000-0x7e5167ff] Feb 9 12:38:46.554270 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 12:38:46.554317 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 12:38:46.554360 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 12:38:46.554409 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 12:38:46.554450 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 12:38:46.554516 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 12:38:46.554575 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 12:38:46.554620 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 12:38:46.554660 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 12:38:46.554705 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Feb 9 12:38:46.554746 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Feb 9 12:38:46.554790 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 12:38:46.554833 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 12:38:46.554879 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 12:38:46.554924 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 12:38:46.554965 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x7e514000-0x7e5140ff 64bit] Feb 9 12:38:46.555005 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 12:38:46.555049 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 12:38:46.555090 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 12:38:46.555133 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 12:38:46.555179 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 12:38:46.555222 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 12:38:46.555263 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x7e200000-0x7e2fffff pref] Feb 9 12:38:46.555305 kernel: pci 0000:02:00.0: PME# supported from D3cold Feb 9 12:38:46.555346 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 12:38:46.555389 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 12:38:46.555436 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 12:38:46.555480 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 12:38:46.555560 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x7e100000-0x7e1fffff pref] Feb 9 12:38:46.555601 kernel: pci 0000:02:00.1: PME# supported from D3cold Feb 9 12:38:46.555643 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 12:38:46.555684 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 12:38:46.555725 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 12:38:46.555767 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Feb 9 12:38:46.555808 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 12:38:46.555848 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 12:38:46.555894 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 12:38:46.555936 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x7e400000-0x7e47ffff] Feb 9 12:38:46.555978 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 12:38:46.556019 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x7e480000-0x7e483fff] Feb 9 12:38:46.556062 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 12:38:46.556103 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 12:38:46.556143 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 12:38:46.556183 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Feb 9 12:38:46.556232 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Feb 9 12:38:46.556329 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x7e300000-0x7e37ffff] Feb 9 12:38:46.556371 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 12:38:46.556413 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x7e380000-0x7e383fff] Feb 9 12:38:46.556456 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Feb 9 12:38:46.556520 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 12:38:46.556580 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 12:38:46.556620 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Feb 9 12:38:46.556661 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 12:38:46.556707 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 12:38:46.556750 kernel: pci 0000:07:00.0: enabling Extended Tags Feb 9 12:38:46.556791 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 12:38:46.556835 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 12:38:46.556876 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 12:38:46.556917 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 12:38:46.556957 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 12:38:46.557002 kernel: pci_bus 0000:08: extended config space not accessible Feb 9 12:38:46.557049 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 12:38:46.557095 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x7d000000-0x7dffffff] Feb 9 12:38:46.557140 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x7e000000-0x7e01ffff] Feb 9 12:38:46.557184 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 12:38:46.557228 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 12:38:46.557272 kernel: pci 0000:08:00.0: supports D1 D2 Feb 9 12:38:46.557315 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 12:38:46.557358 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 12:38:46.557403 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 12:38:46.557448 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 12:38:46.557455 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 12:38:46.557461 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 12:38:46.557467 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 12:38:46.557472 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 12:38:46.557477 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 12:38:46.557484 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 12:38:46.557514 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 12:38:46.557520 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 12:38:46.557526 kernel: iommu: Default domain type: Translated Feb 9 12:38:46.557531 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 12:38:46.557594 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Feb 9 12:38:46.557638 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 12:38:46.557683 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Feb 9 12:38:46.557690 kernel: vgaarb: loaded Feb 9 12:38:46.557696 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 12:38:46.557701 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 12:38:46.557706 kernel: PTP clock support registered Feb 9 12:38:46.557713 kernel: PCI: Using ACPI for IRQ routing Feb 9 12:38:46.557718 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 12:38:46.557723 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 12:38:46.557728 kernel: e820: reserve RAM buffer [mem 0x62c37000-0x63ffffff] Feb 9 12:38:46.557733 kernel: e820: reserve RAM buffer [mem 0x6c0c7000-0x6fffffff] Feb 9 12:38:46.557738 kernel: e820: reserve RAM buffer [mem 0x6d333000-0x6fffffff] Feb 9 12:38:46.557743 kernel: e820: reserve RAM buffer [mem 0x883800000-0x883ffffff] Feb 9 12:38:46.557748 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 9 12:38:46.557754 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Feb 9 12:38:46.557760 kernel: clocksource: Switched to clocksource tsc-early Feb 9 12:38:46.557765 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 12:38:46.557770 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 12:38:46.557775 kernel: pnp: PnP ACPI init Feb 9 12:38:46.557818 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 12:38:46.557861 kernel: pnp 00:02: [dma 0 disabled] Feb 9 12:38:46.557902 kernel: pnp 00:03: [dma 0 disabled] Feb 9 12:38:46.557944 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 12:38:46.557981 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 12:38:46.558022 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 12:38:46.558061 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 12:38:46.558098 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 12:38:46.558136 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 12:38:46.558173 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 12:38:46.558210 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 12:38:46.558246 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 12:38:46.558284 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 12:38:46.558319 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 12:38:46.558360 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 12:38:46.558397 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 12:38:46.558434 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 12:38:46.558471 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 12:38:46.558535 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 12:38:46.558592 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 12:38:46.558628 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 12:38:46.558667 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 12:38:46.558675 kernel: pnp: PnP ACPI: found 10 devices Feb 9 12:38:46.558680 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 12:38:46.558687 kernel: NET: Registered PF_INET protocol family Feb 9 12:38:46.558692 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 12:38:46.558698 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 12:38:46.558703 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 12:38:46.558708 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 12:38:46.558714 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 12:38:46.558719 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 12:38:46.558724 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 12:38:46.558730 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 12:38:46.558735 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 12:38:46.558740 kernel: NET: Registered PF_XDP protocol family Feb 9 12:38:46.558781 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7b800000-0x7b800fff 64bit] Feb 9 12:38:46.558822 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7b801000-0x7b801fff 64bit] Feb 9 12:38:46.558863 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7b802000-0x7b802fff 64bit] Feb 9 12:38:46.558905 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 12:38:46.558948 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 12:38:46.558991 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 12:38:46.559036 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 12:38:46.559078 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 12:38:46.559120 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 9 12:38:46.559162 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Feb 9 12:38:46.559205 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 12:38:46.559246 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 9 12:38:46.559287 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 9 12:38:46.559330 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 12:38:46.559371 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Feb 9 12:38:46.559413 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 9 12:38:46.559454 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 12:38:46.559523 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Feb 9 12:38:46.559586 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 9 12:38:46.559628 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 9 12:38:46.559671 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 9 12:38:46.559713 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 12:38:46.559755 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 9 12:38:46.559797 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 9 12:38:46.559838 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Feb 9 12:38:46.559875 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 12:38:46.559912 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 12:38:46.559949 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 12:38:46.559985 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 12:38:46.560021 kernel: pci_bus 0000:00: resource 7 [mem 0x7b800000-0xdfffffff window] Feb 9 12:38:46.560056 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 12:38:46.560101 kernel: pci_bus 0000:02: resource 1 [mem 0x7e100000-0x7e2fffff] Feb 9 12:38:46.560139 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 12:38:46.560180 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Feb 9 12:38:46.560221 kernel: pci_bus 0000:04: resource 1 [mem 0x7e400000-0x7e4fffff] Feb 9 12:38:46.560262 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Feb 9 12:38:46.560300 kernel: pci_bus 0000:05: resource 1 [mem 0x7e300000-0x7e3fffff] Feb 9 12:38:46.560342 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 12:38:46.560381 kernel: pci_bus 0000:07: resource 1 [mem 0x7d000000-0x7e0fffff] Feb 9 12:38:46.560420 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Feb 9 12:38:46.560462 kernel: pci_bus 0000:08: resource 1 [mem 0x7d000000-0x7e0fffff] Feb 9 12:38:46.560470 kernel: PCI: CLS 64 bytes, default 64 Feb 9 12:38:46.560475 kernel: DMAR: No ATSR found Feb 9 12:38:46.560499 kernel: DMAR: No SATC found Feb 9 12:38:46.560505 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Feb 9 12:38:46.560510 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Feb 9 12:38:46.560515 kernel: DMAR: IOMMU feature nwfs inconsistent Feb 9 12:38:46.560521 kernel: DMAR: IOMMU feature pasid inconsistent Feb 9 12:38:46.560546 kernel: DMAR: IOMMU feature eafs inconsistent Feb 9 12:38:46.560551 kernel: DMAR: IOMMU feature prs inconsistent Feb 9 12:38:46.560557 kernel: DMAR: IOMMU feature nest inconsistent Feb 9 12:38:46.560562 kernel: DMAR: IOMMU feature mts inconsistent Feb 9 12:38:46.560567 kernel: DMAR: IOMMU feature sc_support inconsistent Feb 9 12:38:46.560573 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Feb 9 12:38:46.560578 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 12:38:46.560583 kernel: DMAR: dmar1: Using Queued invalidation Feb 9 12:38:46.560625 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 12:38:46.560666 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 12:38:46.560709 kernel: pci 0000:00:01.1: Adding to iommu group 1 Feb 9 12:38:46.560750 kernel: pci 0000:00:02.0: Adding to iommu group 2 Feb 9 12:38:46.560792 kernel: pci 0000:00:08.0: Adding to iommu group 3 Feb 9 12:38:46.560833 kernel: pci 0000:00:12.0: Adding to iommu group 4 Feb 9 12:38:46.560874 kernel: pci 0000:00:14.0: Adding to iommu group 5 Feb 9 12:38:46.560914 kernel: pci 0000:00:14.2: Adding to iommu group 5 Feb 9 12:38:46.560954 kernel: pci 0000:00:15.0: Adding to iommu group 6 Feb 9 12:38:46.560994 kernel: pci 0000:00:15.1: Adding to iommu group 6 Feb 9 12:38:46.561034 kernel: pci 0000:00:16.0: Adding to iommu group 7 Feb 9 12:38:46.561077 kernel: pci 0000:00:16.1: Adding to iommu group 7 Feb 9 12:38:46.561117 kernel: pci 0000:00:16.4: Adding to iommu group 7 Feb 9 12:38:46.561156 kernel: pci 0000:00:17.0: Adding to iommu group 8 Feb 9 12:38:46.561197 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Feb 9 12:38:46.561238 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Feb 9 12:38:46.561278 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Feb 9 12:38:46.561318 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Feb 9 12:38:46.561359 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Feb 9 12:38:46.561401 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Feb 9 12:38:46.561441 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Feb 9 12:38:46.561501 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Feb 9 12:38:46.561563 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Feb 9 12:38:46.561605 kernel: pci 0000:02:00.0: Adding to iommu group 1 Feb 9 12:38:46.561647 kernel: pci 0000:02:00.1: Adding to iommu group 1 Feb 9 12:38:46.561689 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 12:38:46.561732 kernel: pci 0000:05:00.0: Adding to iommu group 17 Feb 9 12:38:46.561776 kernel: pci 0000:07:00.0: Adding to iommu group 18 Feb 9 12:38:46.561821 kernel: pci 0000:08:00.0: Adding to iommu group 18 Feb 9 12:38:46.561829 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 12:38:46.561834 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 12:38:46.561839 kernel: software IO TLB: mapped [mem 0x00000000680c7000-0x000000006c0c7000] (64MB) Feb 9 12:38:46.561845 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Feb 9 12:38:46.561850 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 12:38:46.561855 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 12:38:46.561861 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 12:38:46.561867 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Feb 9 12:38:46.561912 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 12:38:46.561920 kernel: Initialise system trusted keyrings Feb 9 12:38:46.561925 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 12:38:46.561930 kernel: Key type asymmetric registered Feb 9 12:38:46.561935 kernel: Asymmetric key parser 'x509' registered Feb 9 12:38:46.561941 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 12:38:46.561947 kernel: io scheduler mq-deadline registered Feb 9 12:38:46.561952 kernel: io scheduler kyber registered Feb 9 12:38:46.561957 kernel: io scheduler bfq registered Feb 9 12:38:46.561998 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Feb 9 12:38:46.562040 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Feb 9 12:38:46.562081 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Feb 9 12:38:46.562123 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Feb 9 12:38:46.562163 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Feb 9 12:38:46.562205 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Feb 9 12:38:46.562246 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Feb 9 12:38:46.562292 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 12:38:46.562299 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 12:38:46.562305 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 12:38:46.562310 kernel: pstore: Registered erst as persistent store backend Feb 9 12:38:46.562315 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 12:38:46.562320 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 12:38:46.562327 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 12:38:46.562332 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 12:38:46.562373 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 12:38:46.562381 kernel: i8042: PNP: No PS/2 controller found. Feb 9 12:38:46.562417 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 12:38:46.562455 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 12:38:46.562512 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T12:38:45 UTC (1707482325) Feb 9 12:38:46.562571 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 12:38:46.562578 kernel: fail to initialize ptp_kvm Feb 9 12:38:46.562584 kernel: intel_pstate: Intel P-state driver initializing Feb 9 12:38:46.562589 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 12:38:46.562594 kernel: intel_pstate: HWP enabled Feb 9 12:38:46.562600 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 12:38:46.562605 kernel: vesafb: scrolling: redraw Feb 9 12:38:46.562610 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 12:38:46.562615 kernel: vesafb: framebuffer at 0x7d000000, mapped to 0x00000000ecd0103a, using 768k, total 768k Feb 9 12:38:46.562622 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 12:38:46.562627 kernel: fb0: VESA VGA frame buffer device Feb 9 12:38:46.562632 kernel: NET: Registered PF_INET6 protocol family Feb 9 12:38:46.562637 kernel: Segment Routing with IPv6 Feb 9 12:38:46.562642 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 12:38:46.562647 kernel: NET: Registered PF_PACKET protocol family Feb 9 12:38:46.562653 kernel: Key type dns_resolver registered Feb 9 12:38:46.562658 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 12:38:46.562663 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 12:38:46.562669 kernel: IPI shorthand broadcast: enabled Feb 9 12:38:46.562674 kernel: sched_clock: Marking stable (1840212195, 1352949623)->(4616581756, -1423419938) Feb 9 12:38:46.562679 kernel: registered taskstats version 1 Feb 9 12:38:46.562684 kernel: Loading compiled-in X.509 certificates Feb 9 12:38:46.562690 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 12:38:46.562695 kernel: Key type .fscrypt registered Feb 9 12:38:46.562700 kernel: Key type fscrypt-provisioning registered Feb 9 12:38:46.562705 kernel: pstore: Using crash dump compression: deflate Feb 9 12:38:46.562710 kernel: ima: Allocated hash algorithm: sha1 Feb 9 12:38:46.562716 kernel: ima: No architecture policies found Feb 9 12:38:46.562721 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 12:38:46.562726 kernel: Write protecting the kernel read-only data: 28672k Feb 9 12:38:46.562732 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 12:38:46.562737 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 12:38:46.562742 kernel: Run /init as init process Feb 9 12:38:46.562747 kernel: with arguments: Feb 9 12:38:46.562752 kernel: /init Feb 9 12:38:46.562757 kernel: with environment: Feb 9 12:38:46.562763 kernel: HOME=/ Feb 9 12:38:46.562768 kernel: TERM=linux Feb 9 12:38:46.562773 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 12:38:46.562780 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 12:38:46.562786 systemd[1]: Detected architecture x86-64. Feb 9 12:38:46.562792 systemd[1]: Running in initrd. Feb 9 12:38:46.562797 systemd[1]: No hostname configured, using default hostname. Feb 9 12:38:46.562803 systemd[1]: Hostname set to . Feb 9 12:38:46.562809 systemd[1]: Initializing machine ID from random generator. Feb 9 12:38:46.562814 systemd[1]: Queued start job for default target initrd.target. Feb 9 12:38:46.562820 systemd[1]: Started systemd-ask-password-console.path. Feb 9 12:38:46.562825 systemd[1]: Reached target cryptsetup.target. Feb 9 12:38:46.562830 systemd[1]: Reached target paths.target. Feb 9 12:38:46.562835 systemd[1]: Reached target slices.target. Feb 9 12:38:46.562841 systemd[1]: Reached target swap.target. Feb 9 12:38:46.562846 systemd[1]: Reached target timers.target. Feb 9 12:38:46.562852 systemd[1]: Listening on iscsid.socket. Feb 9 12:38:46.562858 systemd[1]: Listening on iscsiuio.socket. Feb 9 12:38:46.562863 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 12:38:46.562869 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 12:38:46.562874 systemd[1]: Listening on systemd-journald.socket. Feb 9 12:38:46.562880 systemd[1]: Listening on systemd-networkd.socket. Feb 9 12:38:46.562885 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 12:38:46.562891 kernel: tsc: Refined TSC clocksource calibration: 3408.015 MHz Feb 9 12:38:46.562896 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fe287ed6, max_idle_ns: 440795329018 ns Feb 9 12:38:46.562902 kernel: clocksource: Switched to clocksource tsc Feb 9 12:38:46.562907 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 12:38:46.562912 systemd[1]: Reached target sockets.target. Feb 9 12:38:46.562918 systemd[1]: Starting kmod-static-nodes.service... Feb 9 12:38:46.562923 systemd[1]: Finished network-cleanup.service. Feb 9 12:38:46.562928 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 12:38:46.562934 systemd[1]: Starting systemd-journald.service... Feb 9 12:38:46.562940 systemd[1]: Starting systemd-modules-load.service... Feb 9 12:38:46.562947 systemd-journald[268]: Journal started Feb 9 12:38:46.562972 systemd-journald[268]: Runtime Journal (/run/log/journal/7a06f65afb124645a29cf287ba7657b7) is 8.0M, max 636.8M, 628.8M free. Feb 9 12:38:46.565047 systemd-modules-load[269]: Inserted module 'overlay' Feb 9 12:38:46.594850 kernel: audit: type=1334 audit(1707482326.571:2): prog-id=6 op=LOAD Feb 9 12:38:46.594860 systemd[1]: Starting systemd-resolved.service... Feb 9 12:38:46.571000 audit: BPF prog-id=6 op=LOAD Feb 9 12:38:46.638538 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 12:38:46.638553 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 12:38:46.668532 kernel: Bridge firewalling registered Feb 9 12:38:46.668548 systemd[1]: Started systemd-journald.service. Feb 9 12:38:46.682637 systemd-modules-load[269]: Inserted module 'br_netfilter' Feb 9 12:38:46.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:46.688418 systemd-resolved[271]: Positive Trust Anchors: Feb 9 12:38:46.805262 kernel: audit: type=1130 audit(1707482326.690:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:46.805278 kernel: SCSI subsystem initialized Feb 9 12:38:46.805286 kernel: audit: type=1130 audit(1707482326.742:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:46.805293 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 12:38:46.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:46.688424 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 12:38:46.906424 kernel: device-mapper: uevent: version 1.0.3 Feb 9 12:38:46.906435 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 12:38:46.906442 kernel: audit: type=1130 audit(1707482326.862:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:46.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:46.688443 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 12:38:46.979702 kernel: audit: type=1130 audit(1707482326.914:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:46.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:46.690002 systemd-resolved[271]: Defaulting to hostname 'linux'. Feb 9 12:38:46.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:46.690714 systemd[1]: Started systemd-resolved.service. Feb 9 12:38:47.087285 kernel: audit: type=1130 audit(1707482326.988:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:47.087297 kernel: audit: type=1130 audit(1707482327.041:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:47.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:46.742675 systemd[1]: Finished kmod-static-nodes.service. Feb 9 12:38:46.862914 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 12:38:46.906590 systemd-modules-load[269]: Inserted module 'dm_multipath' Feb 9 12:38:46.914655 systemd[1]: Finished systemd-modules-load.service. Feb 9 12:38:46.988802 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 12:38:47.041778 systemd[1]: Reached target nss-lookup.target. Feb 9 12:38:47.096042 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 12:38:47.103112 systemd[1]: Starting systemd-sysctl.service... Feb 9 12:38:47.116129 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 12:38:47.116819 systemd[1]: Finished systemd-sysctl.service. Feb 9 12:38:47.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:47.118827 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 12:38:47.164709 kernel: audit: type=1130 audit(1707482327.116:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:47.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:47.180854 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 12:38:47.245571 kernel: audit: type=1130 audit(1707482327.180:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:47.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:47.238111 systemd[1]: Starting dracut-cmdline.service... Feb 9 12:38:47.260578 dracut-cmdline[292]: dracut-dracut-053 Feb 9 12:38:47.260578 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 12:38:47.260578 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 12:38:47.328551 kernel: Loading iSCSI transport class v2.0-870. Feb 9 12:38:47.328565 kernel: iscsi: registered transport (tcp) Feb 9 12:38:47.377132 kernel: iscsi: registered transport (qla4xxx) Feb 9 12:38:47.377149 kernel: QLogic iSCSI HBA Driver Feb 9 12:38:47.392732 systemd[1]: Finished dracut-cmdline.service. Feb 9 12:38:47.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:47.403180 systemd[1]: Starting dracut-pre-udev.service... Feb 9 12:38:47.460565 kernel: raid6: avx2x4 gen() 48288 MB/s Feb 9 12:38:47.495548 kernel: raid6: avx2x4 xor() 21914 MB/s Feb 9 12:38:47.530547 kernel: raid6: avx2x2 gen() 53178 MB/s Feb 9 12:38:47.565514 kernel: raid6: avx2x2 xor() 32115 MB/s Feb 9 12:38:47.600547 kernel: raid6: avx2x1 gen() 45317 MB/s Feb 9 12:38:47.635547 kernel: raid6: avx2x1 xor() 27676 MB/s Feb 9 12:38:47.670511 kernel: raid6: sse2x4 gen() 20920 MB/s Feb 9 12:38:47.703521 kernel: raid6: sse2x4 xor() 11519 MB/s Feb 9 12:38:47.737547 kernel: raid6: sse2x2 gen() 21241 MB/s Feb 9 12:38:47.771548 kernel: raid6: sse2x2 xor() 13193 MB/s Feb 9 12:38:47.805548 kernel: raid6: sse2x1 gen() 17922 MB/s Feb 9 12:38:47.857199 kernel: raid6: sse2x1 xor() 8748 MB/s Feb 9 12:38:47.857214 kernel: raid6: using algorithm avx2x2 gen() 53178 MB/s Feb 9 12:38:47.857222 kernel: raid6: .... xor() 32115 MB/s, rmw enabled Feb 9 12:38:47.875296 kernel: raid6: using avx2x2 recovery algorithm Feb 9 12:38:47.921521 kernel: xor: automatically using best checksumming function avx Feb 9 12:38:48.000537 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 12:38:48.005316 systemd[1]: Finished dracut-pre-udev.service. Feb 9 12:38:48.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:48.013000 audit: BPF prog-id=7 op=LOAD Feb 9 12:38:48.013000 audit: BPF prog-id=8 op=LOAD Feb 9 12:38:48.014433 systemd[1]: Starting systemd-udevd.service... Feb 9 12:38:48.022619 systemd-udevd[472]: Using default interface naming scheme 'v252'. Feb 9 12:38:48.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:48.027640 systemd[1]: Started systemd-udevd.service. Feb 9 12:38:48.066608 dracut-pre-trigger[484]: rd.md=0: removing MD RAID activation Feb 9 12:38:48.043086 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 12:38:48.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:48.070320 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 12:38:48.083452 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 12:38:48.170115 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 12:38:48.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:48.197489 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 12:38:48.215484 kernel: ACPI: bus type USB registered Feb 9 12:38:48.215511 kernel: usbcore: registered new interface driver usbfs Feb 9 12:38:48.215522 kernel: usbcore: registered new interface driver hub Feb 9 12:38:48.215532 kernel: usbcore: registered new device driver usb Feb 9 12:38:48.269490 kernel: libata version 3.00 loaded. Feb 9 12:38:48.312530 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 12:38:48.312689 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 12:38:48.312882 kernel: AES CTR mode by8 optimization enabled Feb 9 12:38:48.312899 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Feb 9 12:38:48.353864 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 12:38:48.354484 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 12:38:48.387750 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 12:38:48.387770 kernel: scsi host0: ahci Feb 9 12:38:48.420484 kernel: scsi host1: ahci Feb 9 12:38:48.420557 kernel: mlx5_core 0000:02:00.0: firmware version: 14.28.2006 Feb 9 12:38:48.420615 kernel: scsi host2: ahci Feb 9 12:38:48.420629 kernel: pps pps0: new PPS source ptp0 Feb 9 12:38:48.420687 kernel: igb 0000:04:00.0: added PHC on eth0 Feb 9 12:38:48.420742 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 12:38:48.420795 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:25:58 Feb 9 12:38:48.420845 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Feb 9 12:38:48.420893 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 12:38:48.445837 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 12:38:48.452523 kernel: scsi host3: ahci Feb 9 12:38:48.452551 kernel: pps pps1: new PPS source ptp1 Feb 9 12:38:48.452624 kernel: igb 0000:05:00.0: added PHC on eth1 Feb 9 12:38:48.452687 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 12:38:48.452748 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:25:59 Feb 9 12:38:48.452799 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Feb 9 12:38:48.452849 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 12:38:48.653493 kernel: scsi host4: ahci Feb 9 12:38:48.653595 kernel: scsi host5: ahci Feb 9 12:38:48.673334 kernel: scsi host6: ahci Feb 9 12:38:48.673437 kernel: scsi host7: ahci Feb 9 12:38:48.683194 kernel: ata1: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516100 irq 129 Feb 9 12:38:48.697968 kernel: ata2: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516180 irq 129 Feb 9 12:38:48.712726 kernel: ata3: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516200 irq 129 Feb 9 12:38:48.727491 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 12:38:48.727564 kernel: ata4: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516280 irq 129 Feb 9 12:38:48.774742 kernel: ata5: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516300 irq 129 Feb 9 12:38:48.774757 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 12:38:48.774825 kernel: ata6: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516380 irq 129 Feb 9 12:38:48.774835 kernel: ata7: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516400 irq 129 Feb 9 12:38:48.774842 kernel: ata8: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516480 irq 129 Feb 9 12:38:49.072519 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 12:38:49.123084 kernel: mlx5_core 0000:02:00.1: firmware version: 14.28.2006 Feb 9 12:38:49.123205 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 12:38:49.158504 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 12:38:49.158523 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 12:38:49.173503 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 12:38:49.187501 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 12:38:49.201507 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 12:38:49.215507 kernel: ata8: SATA link down (SStatus 0 SControl 300) Feb 9 12:38:49.228532 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 12:38:49.241510 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 12:38:49.255507 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 9 12:38:49.270506 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 9 12:38:49.313270 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 12:38:49.313288 kernel: ata2.00: Features: NCQ-prio Feb 9 12:38:49.313296 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 12:38:49.339072 kernel: ata1.00: Features: NCQ-prio Feb 9 12:38:49.355557 kernel: ata2.00: configured for UDMA/133 Feb 9 12:38:49.355572 kernel: ata1.00: configured for UDMA/133 Feb 9 12:38:49.367552 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 9 12:38:49.383527 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 9 12:38:49.403487 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 12:38:49.403600 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 12:38:49.403670 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Feb 9 12:38:49.431297 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 12:38:49.444486 kernel: port_module: 9 callbacks suppressed Feb 9 12:38:49.444507 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Feb 9 12:38:49.459461 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 12:38:49.518351 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 12:38:49.518425 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 12:38:49.533955 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 12:38:49.561062 kernel: hub 1-0:1.0: USB hub found Feb 9 12:38:49.561134 kernel: hub 1-0:1.0: 16 ports detected Feb 9 12:38:49.598345 kernel: hub 2-0:1.0: USB hub found Feb 9 12:38:49.598425 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Feb 9 12:38:49.598486 kernel: hub 2-0:1.0: 10 ports detected Feb 9 12:38:49.611496 kernel: usb: port power management may be unreliable Feb 9 12:38:49.637451 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 12:38:49.637467 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:38:49.650325 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 12:38:49.650410 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 12:38:49.652483 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 12:38:49.681992 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 12:38:49.682075 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 9 12:38:49.698441 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 12:38:49.725306 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 9 12:38:49.725380 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 12:38:49.737971 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 12:38:49.738045 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 12:38:49.750642 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 12:38:49.797403 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:38:49.809909 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 12:38:49.822189 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 12:38:49.822204 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 12:38:49.828484 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 12:38:49.828500 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 12:38:49.863806 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 12:38:49.863881 kernel: GPT:9289727 != 937703087 Feb 9 12:38:49.907889 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 12:38:49.907904 kernel: GPT:9289727 != 937703087 Feb 9 12:38:49.920090 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 12:38:49.933827 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 12:38:49.961437 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:38:49.961454 kernel: hub 1-14:1.0: USB hub found Feb 9 12:38:49.961530 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 9 12:38:49.987107 kernel: hub 1-14:1.0: 4 ports detected Feb 9 12:38:50.017533 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Feb 9 12:38:50.024461 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 12:38:50.070779 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (645) Feb 9 12:38:50.070792 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Feb 9 12:38:50.047132 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 12:38:50.080572 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 12:38:50.104867 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 12:38:50.115597 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 12:38:50.130218 systemd[1]: Starting disk-uuid.service... Feb 9 12:38:50.165558 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:38:50.165585 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 12:38:50.165750 disk-uuid[691]: Primary Header is updated. Feb 9 12:38:50.165750 disk-uuid[691]: Secondary Entries is updated. Feb 9 12:38:50.165750 disk-uuid[691]: Secondary Header is updated. Feb 9 12:38:50.210579 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:38:50.210591 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 12:38:50.210599 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:38:50.230485 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 12:38:50.315565 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 12:38:50.446524 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 12:38:50.477851 kernel: usbcore: registered new interface driver usbhid Feb 9 12:38:50.477867 kernel: usbhid: USB HID core driver Feb 9 12:38:50.509667 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 12:38:50.623831 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 12:38:50.623969 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 12:38:50.623978 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 12:38:51.216214 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 12:38:51.235217 disk-uuid[693]: The operation has completed successfully. Feb 9 12:38:51.243592 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 9 12:38:51.269077 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 12:38:51.364386 kernel: audit: type=1130 audit(1707482331.276:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.364401 kernel: audit: type=1131 audit(1707482331.276:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.269133 systemd[1]: Finished disk-uuid.service. Feb 9 12:38:51.393579 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 12:38:51.279982 systemd[1]: Starting verity-setup.service... Feb 9 12:38:51.436636 systemd[1]: Found device dev-mapper-usr.device. Feb 9 12:38:51.446536 systemd[1]: Mounting sysusr-usr.mount... Feb 9 12:38:51.453794 systemd[1]: Finished verity-setup.service. Feb 9 12:38:51.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.518497 kernel: audit: type=1130 audit(1707482331.472:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.546458 systemd[1]: Mounted sysusr-usr.mount. Feb 9 12:38:51.561626 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 12:38:51.554791 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 12:38:51.656771 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 12:38:51.656786 kernel: BTRFS info (device sdb6): using free space tree Feb 9 12:38:51.656794 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 12:38:51.656800 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 12:38:51.555188 systemd[1]: Starting ignition-setup.service... Feb 9 12:38:51.576912 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 12:38:51.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.667094 systemd[1]: Finished ignition-setup.service. Feb 9 12:38:51.781644 kernel: audit: type=1130 audit(1707482331.674:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.781737 kernel: audit: type=1130 audit(1707482331.732:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.674885 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 12:38:51.812241 kernel: audit: type=1334 audit(1707482331.789:24): prog-id=9 op=LOAD Feb 9 12:38:51.789000 audit: BPF prog-id=9 op=LOAD Feb 9 12:38:51.733149 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 12:38:51.790330 systemd[1]: Starting systemd-networkd.service... Feb 9 12:38:51.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.826329 systemd-networkd[881]: lo: Link UP Feb 9 12:38:51.902588 kernel: audit: type=1130 audit(1707482331.835:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.851295 ignition[870]: Ignition 2.14.0 Feb 9 12:38:51.826332 systemd-networkd[881]: lo: Gained carrier Feb 9 12:38:51.851299 ignition[870]: Stage: fetch-offline Feb 9 12:38:51.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.826636 systemd-networkd[881]: Enumeration completed Feb 9 12:38:52.064159 kernel: audit: type=1130 audit(1707482331.928:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:52.064191 kernel: audit: type=1130 audit(1707482331.988:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:52.064208 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 12:38:51.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.851325 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:38:52.089410 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Feb 9 12:38:51.826681 systemd[1]: Started systemd-networkd.service. Feb 9 12:38:51.851338 ignition[870]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:38:51.827351 systemd-networkd[881]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 12:38:52.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.854136 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:38:51.835605 systemd[1]: Reached target network.target. Feb 9 12:38:52.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:52.154798 iscsid[905]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 12:38:52.154798 iscsid[905]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 12:38:52.154798 iscsid[905]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 12:38:52.154798 iscsid[905]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 12:38:52.154798 iscsid[905]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 12:38:52.154798 iscsid[905]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 12:38:52.154798 iscsid[905]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 12:38:52.324680 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 9 12:38:52.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:51.854200 ignition[870]: parsed url from cmdline: "" Feb 9 12:38:51.870417 unknown[870]: fetched base config from "system" Feb 9 12:38:51.854202 ignition[870]: no config URL provided Feb 9 12:38:51.870424 unknown[870]: fetched user config from "system" Feb 9 12:38:51.854205 ignition[870]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 12:38:51.895049 systemd[1]: Starting iscsiuio.service... Feb 9 12:38:51.858680 ignition[870]: parsing config with SHA512: 76d03e6abaa15a04d79ce7d1e8c8dd851c537e68682b68307b075376fb60c36163aea215165dab920c80adcf1c010ca22d64edeff2b644f61eebbcaa90b25630 Feb 9 12:38:51.909789 systemd[1]: Started iscsiuio.service. Feb 9 12:38:51.870732 ignition[870]: fetch-offline: fetch-offline passed Feb 9 12:38:51.928842 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 12:38:51.870735 ignition[870]: POST message to Packet Timeline Feb 9 12:38:51.988810 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 12:38:51.870739 ignition[870]: POST Status error: resource requires networking Feb 9 12:38:51.989310 systemd[1]: Starting ignition-kargs.service... Feb 9 12:38:51.870771 ignition[870]: Ignition finished successfully Feb 9 12:38:52.065740 systemd-networkd[881]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 12:38:52.068548 ignition[895]: Ignition 2.14.0 Feb 9 12:38:52.078089 systemd[1]: Starting iscsid.service... Feb 9 12:38:52.068551 ignition[895]: Stage: kargs Feb 9 12:38:52.103695 systemd[1]: Started iscsid.service. Feb 9 12:38:52.068605 ignition[895]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:38:52.118068 systemd[1]: Starting dracut-initqueue.service... Feb 9 12:38:52.068614 ignition[895]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:38:52.137659 systemd[1]: Finished dracut-initqueue.service. Feb 9 12:38:52.069904 ignition[895]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:38:52.154671 systemd[1]: Reached target remote-fs-pre.target. Feb 9 12:38:52.072253 ignition[895]: kargs: kargs passed Feb 9 12:38:52.168664 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 12:38:52.072256 ignition[895]: POST message to Packet Timeline Feb 9 12:38:52.176643 systemd[1]: Reached target remote-fs.target. Feb 9 12:38:52.072266 ignition[895]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:38:52.177161 systemd[1]: Starting dracut-pre-mount.service... Feb 9 12:38:52.075150 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:36496->[::1]:53: read: connection refused Feb 9 12:38:52.232571 systemd[1]: Finished dracut-pre-mount.service. Feb 9 12:38:52.275568 ignition[895]: GET https://metadata.packet.net/metadata: attempt #2 Feb 9 12:38:52.316100 systemd-networkd[881]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 12:38:52.276044 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:34062->[::1]:53: read: connection refused Feb 9 12:38:52.345060 systemd-networkd[881]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 12:38:52.375698 systemd-networkd[881]: enp2s0f1np1: Link UP Feb 9 12:38:52.376107 systemd-networkd[881]: enp2s0f1np1: Gained carrier Feb 9 12:38:52.389938 systemd-networkd[881]: enp2s0f0np0: Link UP Feb 9 12:38:52.390288 systemd-networkd[881]: eno2: Link UP Feb 9 12:38:52.390641 systemd-networkd[881]: eno1: Link UP Feb 9 12:38:52.676170 ignition[895]: GET https://metadata.packet.net/metadata: attempt #3 Feb 9 12:38:52.677675 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:57513->[::1]:53: read: connection refused Feb 9 12:38:53.088960 systemd-networkd[881]: enp2s0f0np0: Gained carrier Feb 9 12:38:53.098758 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Feb 9 12:38:53.125914 systemd-networkd[881]: enp2s0f0np0: DHCPv4 address 139.178.90.255/31, gateway 139.178.90.254 acquired from 145.40.83.140 Feb 9 12:38:53.478046 ignition[895]: GET https://metadata.packet.net/metadata: attempt #4 Feb 9 12:38:53.479257 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43870->[::1]:53: read: connection refused Feb 9 12:38:54.345959 systemd-networkd[881]: enp2s0f1np1: Gained IPv6LL Feb 9 12:38:54.601942 systemd-networkd[881]: enp2s0f0np0: Gained IPv6LL Feb 9 12:38:55.080751 ignition[895]: GET https://metadata.packet.net/metadata: attempt #5 Feb 9 12:38:55.082018 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:48545->[::1]:53: read: connection refused Feb 9 12:38:58.285458 ignition[895]: GET https://metadata.packet.net/metadata: attempt #6 Feb 9 12:38:58.320307 ignition[895]: GET result: OK Feb 9 12:38:58.530049 ignition[895]: Ignition finished successfully Feb 9 12:38:58.532268 systemd[1]: Finished ignition-kargs.service. Feb 9 12:38:58.623842 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 12:38:58.623859 kernel: audit: type=1130 audit(1707482338.546:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:58.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:58.555402 ignition[923]: Ignition 2.14.0 Feb 9 12:38:58.548576 systemd[1]: Starting ignition-disks.service... Feb 9 12:38:58.555405 ignition[923]: Stage: disks Feb 9 12:38:58.555462 ignition[923]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:38:58.555471 ignition[923]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:38:58.556806 ignition[923]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:38:58.558194 ignition[923]: disks: disks passed Feb 9 12:38:58.558197 ignition[923]: POST message to Packet Timeline Feb 9 12:38:58.558207 ignition[923]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:38:58.583476 ignition[923]: GET result: OK Feb 9 12:38:58.801515 ignition[923]: Ignition finished successfully Feb 9 12:38:58.803947 systemd[1]: Finished ignition-disks.service. Feb 9 12:38:58.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:58.819070 systemd[1]: Reached target initrd-root-device.target. Feb 9 12:38:58.907738 kernel: audit: type=1130 audit(1707482338.818:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:58.893697 systemd[1]: Reached target local-fs-pre.target. Feb 9 12:38:58.893734 systemd[1]: Reached target local-fs.target. Feb 9 12:38:58.916697 systemd[1]: Reached target sysinit.target. Feb 9 12:38:58.930650 systemd[1]: Reached target basic.target. Feb 9 12:38:58.931272 systemd[1]: Starting systemd-fsck-root.service... Feb 9 12:38:58.955290 systemd-fsck[940]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 12:38:58.976152 systemd[1]: Finished systemd-fsck-root.service. Feb 9 12:38:59.069152 kernel: audit: type=1130 audit(1707482338.985:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:59.069241 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 12:38:58.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:58.986073 systemd[1]: Mounting sysroot.mount... Feb 9 12:38:59.077115 systemd[1]: Mounted sysroot.mount. Feb 9 12:38:59.090821 systemd[1]: Reached target initrd-root-fs.target. Feb 9 12:38:59.098503 systemd[1]: Mounting sysroot-usr.mount... Feb 9 12:38:59.119459 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 12:38:59.134027 systemd[1]: Starting flatcar-static-network.service... Feb 9 12:38:59.150595 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 12:38:59.150636 systemd[1]: Reached target ignition-diskful.target. Feb 9 12:38:59.169316 systemd[1]: Mounted sysroot-usr.mount. Feb 9 12:38:59.193898 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 12:38:59.340916 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (954) Feb 9 12:38:59.340934 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 12:38:59.340942 kernel: BTRFS info (device sdb6): using free space tree Feb 9 12:38:59.340952 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 12:38:59.340960 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 12:38:59.341024 coreos-metadata[948]: Feb 09 12:38:59.256 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 12:38:59.341024 coreos-metadata[948]: Feb 09 12:38:59.278 INFO Fetch successful Feb 9 12:38:59.341024 coreos-metadata[948]: Feb 09 12:38:59.296 INFO wrote hostname ci-3510.3.2-a-fbd511b770 to /sysroot/etc/hostname Feb 9 12:38:59.590178 kernel: audit: type=1130 audit(1707482339.349:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:59.590193 kernel: audit: type=1130 audit(1707482339.413:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:59.590202 kernel: audit: type=1130 audit(1707482339.477:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:59.590209 kernel: audit: type=1131 audit(1707482339.477:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:59.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:59.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:59.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:59.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:59.590284 coreos-metadata[949]: Feb 09 12:38:59.256 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 12:38:59.590284 coreos-metadata[949]: Feb 09 12:38:59.292 INFO Fetch successful Feb 9 12:38:59.206470 systemd[1]: Starting initrd-setup-root.service... Feb 9 12:38:59.256900 systemd[1]: Finished initrd-setup-root.service. Feb 9 12:38:59.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:59.676646 initrd-setup-root[959]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 12:38:59.716711 kernel: audit: type=1130 audit(1707482339.650:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:59.350846 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 12:38:59.725715 initrd-setup-root[967]: cut: /sysroot/etc/group: No such file or directory Feb 9 12:38:59.413832 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 9 12:38:59.745686 initrd-setup-root[975]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 12:38:59.755695 ignition[1025]: INFO : Ignition 2.14.0 Feb 9 12:38:59.755695 ignition[1025]: INFO : Stage: mount Feb 9 12:38:59.755695 ignition[1025]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:38:59.755695 ignition[1025]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:38:59.755695 ignition[1025]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:38:59.755695 ignition[1025]: INFO : mount: mount passed Feb 9 12:38:59.755695 ignition[1025]: INFO : POST message to Packet Timeline Feb 9 12:38:59.755695 ignition[1025]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:38:59.755695 ignition[1025]: INFO : GET result: OK Feb 9 12:38:59.413870 systemd[1]: Finished flatcar-static-network.service. Feb 9 12:38:59.853756 initrd-setup-root[983]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 12:38:59.477776 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 12:38:59.599651 systemd[1]: Starting ignition-mount.service... Feb 9 12:38:59.613465 systemd[1]: Starting sysroot-boot.service... Feb 9 12:38:59.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:59.947269 ignition[1025]: INFO : Ignition finished successfully Feb 9 12:38:59.963684 kernel: audit: type=1130 audit(1707482339.888:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:38:59.634199 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 12:38:59.634237 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 12:38:59.634804 systemd[1]: Finished sysroot-boot.service. Feb 9 12:39:00.094571 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1038) Feb 9 12:39:00.094583 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 9 12:39:00.094590 kernel: BTRFS info (device sdb6): using free space tree Feb 9 12:39:00.094597 kernel: BTRFS info (device sdb6): has skinny extents Feb 9 12:39:00.094603 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 9 12:38:59.879277 systemd[1]: Finished ignition-mount.service. Feb 9 12:38:59.890689 systemd[1]: Starting ignition-files.service... Feb 9 12:39:00.116773 ignition[1057]: INFO : Ignition 2.14.0 Feb 9 12:39:00.116773 ignition[1057]: INFO : Stage: files Feb 9 12:39:00.116773 ignition[1057]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:39:00.116773 ignition[1057]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:39:00.116773 ignition[1057]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:39:00.116773 ignition[1057]: DEBUG : files: compiled without relabeling support, skipping Feb 9 12:39:00.116773 ignition[1057]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 12:39:00.116773 ignition[1057]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 12:39:00.116773 ignition[1057]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 12:39:00.116773 ignition[1057]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 12:39:00.116773 ignition[1057]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 12:39:00.116773 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 12:39:00.116773 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 12:38:59.957470 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 12:39:00.091678 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 12:39:00.114937 unknown[1057]: wrote ssh authorized keys file for user: core Feb 9 12:39:00.631394 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 12:39:00.725954 ignition[1057]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 12:39:00.725954 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 12:39:00.768713 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 12:39:00.768713 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 12:39:01.122817 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 12:39:01.173856 ignition[1057]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 12:39:01.199744 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 12:39:01.199744 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 12:39:01.199744 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 9 12:39:01.257770 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 12:39:01.476932 ignition[1057]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 9 12:39:01.502742 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 12:39:01.502742 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 12:39:01.502742 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 9 12:39:01.552575 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 12:39:02.155678 ignition[1057]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 9 12:39:02.179792 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 12:39:02.179792 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 12:39:02.179792 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 12:39:02.179792 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 12:39:02.179792 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 12:39:02.179792 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 12:39:02.179792 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 12:39:02.179792 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 12:39:02.179792 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 12:39:02.352825 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1067) Feb 9 12:39:02.352898 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2364166245" Feb 9 12:39:02.352898 ignition[1057]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2364166245": device or resource busy Feb 9 12:39:02.352898 ignition[1057]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2364166245", trying btrfs: device or resource busy Feb 9 12:39:02.352898 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2364166245" Feb 9 12:39:02.352898 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2364166245" Feb 9 12:39:02.352898 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2364166245" Feb 9 12:39:02.352898 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2364166245" Feb 9 12:39:02.352898 ignition[1057]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 12:39:02.352898 ignition[1057]: INFO : files: op(e): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 12:39:02.352898 ignition[1057]: INFO : files: op(e): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 12:39:02.352898 ignition[1057]: INFO : files: op(f): [started] processing unit "packet-phone-home.service" Feb 9 12:39:02.352898 ignition[1057]: INFO : files: op(f): [finished] processing unit "packet-phone-home.service" Feb 9 12:39:02.352898 ignition[1057]: INFO : files: op(10): [started] processing unit "prepare-critools.service" Feb 9 12:39:02.352898 ignition[1057]: INFO : files: op(10): op(11): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 12:39:02.352898 ignition[1057]: INFO : files: op(10): op(11): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 12:39:02.352898 ignition[1057]: INFO : files: op(10): [finished] processing unit "prepare-critools.service" Feb 9 12:39:02.352898 ignition[1057]: INFO : files: op(12): [started] processing unit "prepare-cni-plugins.service" Feb 9 12:39:02.717725 kernel: audit: type=1130 audit(1707482342.467:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.446301 systemd[1]: Finished ignition-files.service. Feb 9 12:39:02.731735 ignition[1057]: INFO : files: op(12): op(13): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 12:39:02.731735 ignition[1057]: INFO : files: op(12): op(13): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 12:39:02.731735 ignition[1057]: INFO : files: op(12): [finished] processing unit "prepare-cni-plugins.service" Feb 9 12:39:02.731735 ignition[1057]: INFO : files: op(14): [started] setting preset to enabled for "prepare-critools.service" Feb 9 12:39:02.731735 ignition[1057]: INFO : files: op(14): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 12:39:02.731735 ignition[1057]: INFO : files: op(15): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 12:39:02.731735 ignition[1057]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 12:39:02.731735 ignition[1057]: INFO : files: op(16): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 12:39:02.731735 ignition[1057]: INFO : files: op(16): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 12:39:02.731735 ignition[1057]: INFO : files: op(17): [started] setting preset to enabled for "packet-phone-home.service" Feb 9 12:39:02.731735 ignition[1057]: INFO : files: op(17): [finished] setting preset to enabled for "packet-phone-home.service" Feb 9 12:39:02.731735 ignition[1057]: INFO : files: createResultFile: createFiles: op(18): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 12:39:02.731735 ignition[1057]: INFO : files: createResultFile: createFiles: op(18): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 12:39:02.731735 ignition[1057]: INFO : files: files passed Feb 9 12:39:02.731735 ignition[1057]: INFO : POST message to Packet Timeline Feb 9 12:39:02.731735 ignition[1057]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:39:02.731735 ignition[1057]: INFO : GET result: OK Feb 9 12:39:02.731735 ignition[1057]: INFO : Ignition finished successfully Feb 9 12:39:02.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.472907 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 12:39:03.118907 initrd-setup-root-after-ignition[1089]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 12:39:02.534758 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 12:39:03.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.535151 systemd[1]: Starting ignition-quench.service... Feb 9 12:39:02.570941 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 12:39:03.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.584054 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 12:39:03.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.584126 systemd[1]: Finished ignition-quench.service. Feb 9 12:39:02.610991 systemd[1]: Reached target ignition-complete.target. Feb 9 12:39:02.631693 systemd[1]: Starting initrd-parse-etc.service... Feb 9 12:39:02.671550 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 12:39:02.671622 systemd[1]: Finished initrd-parse-etc.service. Feb 9 12:39:03.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.688858 systemd[1]: Reached target initrd-fs.target. Feb 9 12:39:03.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.699857 systemd[1]: Reached target initrd.target. Feb 9 12:39:03.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.724937 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 12:39:03.343694 ignition[1104]: INFO : Ignition 2.14.0 Feb 9 12:39:03.343694 ignition[1104]: INFO : Stage: umount Feb 9 12:39:03.343694 ignition[1104]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 12:39:03.343694 ignition[1104]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 12:39:03.343694 ignition[1104]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 12:39:03.343694 ignition[1104]: INFO : umount: umount passed Feb 9 12:39:03.343694 ignition[1104]: INFO : POST message to Packet Timeline Feb 9 12:39:03.343694 ignition[1104]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 12:39:03.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.482171 iscsid[905]: iscsid shutting down. Feb 9 12:39:03.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.727033 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 12:39:03.512935 ignition[1104]: INFO : GET result: OK Feb 9 12:39:02.760416 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 12:39:02.786042 systemd[1]: Starting initrd-cleanup.service... Feb 9 12:39:03.554850 ignition[1104]: INFO : Ignition finished successfully Feb 9 12:39:03.643483 kernel: kauditd_printk_skb: 19 callbacks suppressed Feb 9 12:39:03.643499 kernel: audit: type=1131 audit(1707482343.563:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.820608 systemd[1]: Stopped target nss-lookup.target. Feb 9 12:39:03.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.839170 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 12:39:03.782719 kernel: audit: type=1131 audit(1707482343.652:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.782732 kernel: audit: type=1131 audit(1707482343.717:62): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.862230 systemd[1]: Stopped target timers.target. Feb 9 12:39:03.870689 kernel: audit: type=1131 audit(1707482343.789:63): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.870700 kernel: audit: type=1334 audit(1707482343.789:64): prog-id=6 op=UNLOAD Feb 9 12:39:03.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.789000 audit: BPF prog-id=6 op=UNLOAD Feb 9 12:39:02.884131 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 12:39:02.884511 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 12:39:03.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.907440 systemd[1]: Stopped target initrd.target. Feb 9 12:39:04.018678 kernel: audit: type=1131 audit(1707482343.895:65): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:04.018690 kernel: audit: type=1131 audit(1707482343.960:66): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.929170 systemd[1]: Stopped target basic.target. Feb 9 12:39:04.085389 kernel: audit: type=1131 audit(1707482344.027:67): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:04.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.950171 systemd[1]: Stopped target ignition-complete.target. Feb 9 12:39:04.152731 kernel: audit: type=1131 audit(1707482344.093:68): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:04.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:02.972151 systemd[1]: Stopped target ignition-diskful.target. Feb 9 12:39:02.998141 systemd[1]: Stopped target initrd-root-device.target. Feb 9 12:39:04.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.023160 systemd[1]: Stopped target remote-fs.target. Feb 9 12:39:04.253723 kernel: audit: type=1131 audit(1707482344.179:69): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:04.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.039167 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 12:39:04.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.055199 systemd[1]: Stopped target sysinit.target. Feb 9 12:39:03.074182 systemd[1]: Stopped target local-fs.target. Feb 9 12:39:04.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.091149 systemd[1]: Stopped target local-fs-pre.target. Feb 9 12:39:03.109165 systemd[1]: Stopped target swap.target. Feb 9 12:39:03.126062 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 12:39:04.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.126431 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 12:39:04.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.148381 systemd[1]: Stopped target cryptsetup.target. Feb 9 12:39:04.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.175068 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 12:39:04.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.175425 systemd[1]: Stopped dracut-initqueue.service. Feb 9 12:39:04.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.190320 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 12:39:04.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.190697 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 12:39:04.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:04.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.206370 systemd[1]: Stopped target paths.target. Feb 9 12:39:03.222037 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 12:39:03.225692 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 12:39:03.237167 systemd[1]: Stopped target slices.target. Feb 9 12:39:03.253159 systemd[1]: Stopped target sockets.target. Feb 9 12:39:03.269159 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 12:39:03.269562 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 12:39:03.288268 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 12:39:03.288631 systemd[1]: Stopped ignition-files.service. Feb 9 12:39:03.303139 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 12:39:03.303475 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 12:39:04.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:03.321549 systemd[1]: Stopping ignition-mount.service... Feb 9 12:39:03.332749 systemd[1]: Stopping iscsid.service... Feb 9 12:39:03.352274 systemd[1]: Stopping sysroot-boot.service... Feb 9 12:39:03.365655 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 12:39:03.365809 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 12:39:03.372837 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 12:39:03.372988 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 12:39:03.404458 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 12:39:03.404840 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 12:39:03.404887 systemd[1]: Stopped iscsid.service. Feb 9 12:39:03.418151 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 12:39:03.418205 systemd[1]: Closed iscsid.socket. Feb 9 12:39:03.441776 systemd[1]: Stopping iscsiuio.service... Feb 9 12:39:03.456895 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 12:39:03.456999 systemd[1]: Stopped iscsiuio.service. Feb 9 12:39:03.472203 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 12:39:03.472375 systemd[1]: Finished initrd-cleanup.service. Feb 9 12:39:03.491863 systemd[1]: Stopped target network.target. Feb 9 12:39:03.504806 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 12:39:03.504901 systemd[1]: Closed iscsiuio.socket. Feb 9 12:39:03.520083 systemd[1]: Stopping systemd-networkd.service... Feb 9 12:39:03.527642 systemd-networkd[881]: enp2s0f1np1: DHCPv6 lease lost Feb 9 12:39:03.534042 systemd[1]: Stopping systemd-resolved.service... Feb 9 12:39:03.538607 systemd-networkd[881]: enp2s0f0np0: DHCPv6 lease lost Feb 9 12:39:03.548314 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 12:39:04.621000 audit: BPF prog-id=9 op=UNLOAD Feb 9 12:39:03.548572 systemd[1]: Stopped systemd-resolved.service. Feb 9 12:39:03.565074 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 12:39:03.565305 systemd[1]: Stopped systemd-networkd.service. Feb 9 12:39:03.652829 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 12:39:03.652868 systemd[1]: Stopped ignition-mount.service. Feb 9 12:39:03.717656 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 12:39:03.717696 systemd[1]: Stopped sysroot-boot.service. Feb 9 12:39:03.789807 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 12:39:03.789823 systemd[1]: Closed systemd-networkd.socket. Feb 9 12:39:03.879700 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 12:39:03.879722 systemd[1]: Stopped ignition-disks.service. Feb 9 12:39:03.895706 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 12:39:03.895728 systemd[1]: Stopped ignition-kargs.service. Feb 9 12:39:03.960738 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 12:39:03.960758 systemd[1]: Stopped ignition-setup.service. Feb 9 12:39:04.027740 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 12:39:04.027760 systemd[1]: Stopped initrd-setup-root.service. Feb 9 12:39:04.114357 systemd[1]: Stopping network-cleanup.service... Feb 9 12:39:04.160722 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 12:39:04.160749 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 12:39:04.179743 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 12:39:04.200277 systemd[1]: Stopped systemd-sysctl.service. Feb 9 12:39:04.246762 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 12:39:04.246858 systemd[1]: Stopped systemd-modules-load.service. Feb 9 12:39:04.263825 systemd[1]: Stopping systemd-udevd.service... Feb 9 12:39:04.622498 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Feb 9 12:39:04.282575 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 12:39:04.282889 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 12:39:04.282959 systemd[1]: Stopped systemd-udevd.service. Feb 9 12:39:04.289909 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 12:39:04.289945 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 12:39:04.309702 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 12:39:04.309736 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 12:39:04.324777 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 12:39:04.324868 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 12:39:04.340941 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 12:39:04.341085 systemd[1]: Stopped dracut-cmdline.service. Feb 9 12:39:04.356885 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 12:39:04.357044 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 12:39:04.373680 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 12:39:04.386570 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 12:39:04.386604 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 12:39:04.386813 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 12:39:04.386836 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 12:39:04.409576 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 12:39:04.409599 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 12:39:04.425100 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 12:39:04.425331 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 12:39:04.425368 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 12:39:04.531680 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 12:39:04.531908 systemd[1]: Stopped network-cleanup.service. Feb 9 12:39:04.542070 systemd[1]: Reached target initrd-switch-root.target. Feb 9 12:39:04.559300 systemd[1]: Starting initrd-switch-root.service... Feb 9 12:39:04.579583 systemd[1]: Switching root. Feb 9 12:39:04.623105 systemd-journald[268]: Journal stopped Feb 9 12:39:08.234618 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 12:39:08.234631 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 12:39:08.234640 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 12:39:08.234646 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 12:39:08.234651 kernel: SELinux: policy capability open_perms=1 Feb 9 12:39:08.234656 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 12:39:08.234662 kernel: SELinux: policy capability always_check_network=0 Feb 9 12:39:08.234667 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 12:39:08.234672 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 12:39:08.234678 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 12:39:08.234683 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 12:39:08.234689 systemd[1]: Successfully loaded SELinux policy in 323.299ms. Feb 9 12:39:08.234696 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.214ms. Feb 9 12:39:08.234703 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 12:39:08.234710 systemd[1]: Detected architecture x86-64. Feb 9 12:39:08.234716 systemd[1]: Detected first boot. Feb 9 12:39:08.234722 systemd[1]: Hostname set to . Feb 9 12:39:08.234728 systemd[1]: Initializing machine ID from random generator. Feb 9 12:39:08.234734 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 12:39:08.234739 systemd[1]: Populated /etc with preset unit settings. Feb 9 12:39:08.234745 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 12:39:08.234753 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 12:39:08.234760 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 12:39:08.234766 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 12:39:08.234772 systemd[1]: Stopped initrd-switch-root.service. Feb 9 12:39:08.234778 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 12:39:08.234784 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 12:39:08.234791 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 12:39:08.234797 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 12:39:08.234803 systemd[1]: Created slice system-getty.slice. Feb 9 12:39:08.234809 systemd[1]: Created slice system-modprobe.slice. Feb 9 12:39:08.234815 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 12:39:08.234822 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 12:39:08.234827 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 12:39:08.234833 systemd[1]: Created slice user.slice. Feb 9 12:39:08.234839 systemd[1]: Started systemd-ask-password-console.path. Feb 9 12:39:08.234846 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 12:39:08.234852 systemd[1]: Set up automount boot.automount. Feb 9 12:39:08.234858 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 12:39:08.234864 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 12:39:08.234871 systemd[1]: Stopped target initrd-fs.target. Feb 9 12:39:08.234878 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 12:39:08.234884 systemd[1]: Reached target integritysetup.target. Feb 9 12:39:08.234890 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 12:39:08.234898 systemd[1]: Reached target remote-fs.target. Feb 9 12:39:08.234904 systemd[1]: Reached target slices.target. Feb 9 12:39:08.234910 systemd[1]: Reached target swap.target. Feb 9 12:39:08.234916 systemd[1]: Reached target torcx.target. Feb 9 12:39:08.234923 systemd[1]: Reached target veritysetup.target. Feb 9 12:39:08.234929 systemd[1]: Listening on systemd-coredump.socket. Feb 9 12:39:08.234935 systemd[1]: Listening on systemd-initctl.socket. Feb 9 12:39:08.234941 systemd[1]: Listening on systemd-networkd.socket. Feb 9 12:39:08.234949 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 12:39:08.234955 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 12:39:08.234961 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 12:39:08.234968 systemd[1]: Mounting dev-hugepages.mount... Feb 9 12:39:08.234974 systemd[1]: Mounting dev-mqueue.mount... Feb 9 12:39:08.234980 systemd[1]: Mounting media.mount... Feb 9 12:39:08.234988 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 12:39:08.234994 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 12:39:08.235000 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 12:39:08.235007 systemd[1]: Mounting tmp.mount... Feb 9 12:39:08.235013 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 12:39:08.235019 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 12:39:08.235026 systemd[1]: Starting kmod-static-nodes.service... Feb 9 12:39:08.235032 systemd[1]: Starting modprobe@configfs.service... Feb 9 12:39:08.235040 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 12:39:08.235046 systemd[1]: Starting modprobe@drm.service... Feb 9 12:39:08.235052 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 12:39:08.235059 systemd[1]: Starting modprobe@fuse.service... Feb 9 12:39:08.235065 kernel: fuse: init (API version 7.34) Feb 9 12:39:08.235071 systemd[1]: Starting modprobe@loop.service... Feb 9 12:39:08.235077 kernel: loop: module loaded Feb 9 12:39:08.235083 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 12:39:08.235091 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 12:39:08.235097 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 12:39:08.235104 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 12:39:08.235110 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 12:39:08.235116 systemd[1]: Stopped systemd-journald.service. Feb 9 12:39:08.235122 systemd[1]: Starting systemd-journald.service... Feb 9 12:39:08.235129 systemd[1]: Starting systemd-modules-load.service... Feb 9 12:39:08.235137 systemd-journald[1258]: Journal started Feb 9 12:39:08.235162 systemd-journald[1258]: Runtime Journal (/run/log/journal/842da53beb474841bea5f4a8ce87ba3a) is 8.0M, max 636.8M, 628.8M free. Feb 9 12:39:05.022000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 12:39:05.286000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 12:39:05.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 12:39:05.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 12:39:05.289000 audit: BPF prog-id=10 op=LOAD Feb 9 12:39:05.289000 audit: BPF prog-id=10 op=UNLOAD Feb 9 12:39:05.289000 audit: BPF prog-id=11 op=LOAD Feb 9 12:39:05.289000 audit: BPF prog-id=11 op=UNLOAD Feb 9 12:39:05.358000 audit[1145]: AVC avc: denied { associate } for pid=1145 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 12:39:05.358000 audit[1145]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a58e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1128 pid=1145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:05.358000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 12:39:05.384000 audit[1145]: AVC avc: denied { associate } for pid=1145 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 12:39:05.384000 audit[1145]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a59b9 a2=1ed a3=0 items=2 ppid=1128 pid=1145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:05.384000 audit: CWD cwd="/" Feb 9 12:39:05.384000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:05.384000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:05.384000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 12:39:06.894000 audit: BPF prog-id=12 op=LOAD Feb 9 12:39:06.894000 audit: BPF prog-id=3 op=UNLOAD Feb 9 12:39:06.895000 audit: BPF prog-id=13 op=LOAD Feb 9 12:39:06.895000 audit: BPF prog-id=14 op=LOAD Feb 9 12:39:06.895000 audit: BPF prog-id=4 op=UNLOAD Feb 9 12:39:06.895000 audit: BPF prog-id=5 op=UNLOAD Feb 9 12:39:06.895000 audit: BPF prog-id=15 op=LOAD Feb 9 12:39:06.895000 audit: BPF prog-id=12 op=UNLOAD Feb 9 12:39:06.895000 audit: BPF prog-id=16 op=LOAD Feb 9 12:39:06.895000 audit: BPF prog-id=17 op=LOAD Feb 9 12:39:06.895000 audit: BPF prog-id=13 op=UNLOAD Feb 9 12:39:06.895000 audit: BPF prog-id=14 op=UNLOAD Feb 9 12:39:06.896000 audit: BPF prog-id=18 op=LOAD Feb 9 12:39:06.896000 audit: BPF prog-id=15 op=UNLOAD Feb 9 12:39:06.896000 audit: BPF prog-id=19 op=LOAD Feb 9 12:39:06.897000 audit: BPF prog-id=20 op=LOAD Feb 9 12:39:06.897000 audit: BPF prog-id=16 op=UNLOAD Feb 9 12:39:06.897000 audit: BPF prog-id=17 op=UNLOAD Feb 9 12:39:06.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:06.944000 audit: BPF prog-id=18 op=UNLOAD Feb 9 12:39:06.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:06.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.207000 audit: BPF prog-id=21 op=LOAD Feb 9 12:39:08.208000 audit: BPF prog-id=22 op=LOAD Feb 9 12:39:08.208000 audit: BPF prog-id=23 op=LOAD Feb 9 12:39:08.208000 audit: BPF prog-id=19 op=UNLOAD Feb 9 12:39:08.208000 audit: BPF prog-id=20 op=UNLOAD Feb 9 12:39:08.231000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 12:39:08.231000 audit[1258]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff86966620 a2=4000 a3=7fff869666bc items=0 ppid=1 pid=1258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:08.231000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 12:39:06.893808 systemd[1]: Queued start job for default target multi-user.target. Feb 9 12:39:05.356715 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 12:39:06.897686 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 12:39:05.357187 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 12:39:05.357201 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 12:39:05.357223 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 12:39:05.357230 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 12:39:05.357250 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 12:39:05.357259 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 12:39:05.357389 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 12:39:05.357415 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 12:39:05.357424 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 12:39:05.357920 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 12:39:05.357944 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 12:39:05.357957 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 12:39:05.357967 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 12:39:05.357978 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 12:39:05.357987 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:05Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 12:39:06.546889 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:06Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 12:39:06.547031 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:06Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 12:39:06.547086 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:06Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 12:39:06.547174 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:06Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 12:39:06.547205 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:06Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 12:39:06.547238 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-09T12:39:06Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 12:39:08.265696 systemd[1]: Starting systemd-network-generator.service... Feb 9 12:39:08.287522 systemd[1]: Starting systemd-remount-fs.service... Feb 9 12:39:08.308530 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 12:39:08.342017 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 12:39:08.342038 systemd[1]: Stopped verity-setup.service. Feb 9 12:39:08.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.376527 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 12:39:08.390532 systemd[1]: Started systemd-journald.service. Feb 9 12:39:08.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.399027 systemd[1]: Mounted dev-hugepages.mount. Feb 9 12:39:08.406762 systemd[1]: Mounted dev-mqueue.mount. Feb 9 12:39:08.413753 systemd[1]: Mounted media.mount. Feb 9 12:39:08.420765 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 12:39:08.429738 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 12:39:08.438719 systemd[1]: Mounted tmp.mount. Feb 9 12:39:08.445807 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 12:39:08.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.454829 systemd[1]: Finished kmod-static-nodes.service. Feb 9 12:39:08.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.463918 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 12:39:08.464038 systemd[1]: Finished modprobe@configfs.service. Feb 9 12:39:08.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.472931 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 12:39:08.473090 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 12:39:08.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.482173 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 12:39:08.482413 systemd[1]: Finished modprobe@drm.service. Feb 9 12:39:08.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.491287 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 12:39:08.491613 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 12:39:08.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.500286 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 12:39:08.500796 systemd[1]: Finished modprobe@fuse.service. Feb 9 12:39:08.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.510273 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 12:39:08.510649 systemd[1]: Finished modprobe@loop.service. Feb 9 12:39:08.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.519297 systemd[1]: Finished systemd-modules-load.service. Feb 9 12:39:08.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.529261 systemd[1]: Finished systemd-network-generator.service. Feb 9 12:39:08.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.539303 systemd[1]: Finished systemd-remount-fs.service. Feb 9 12:39:08.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.548279 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 12:39:08.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.558755 systemd[1]: Reached target network-pre.target. Feb 9 12:39:08.569229 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 12:39:08.578210 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 12:39:08.585699 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 12:39:08.586584 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 12:39:08.594120 systemd[1]: Starting systemd-journal-flush.service... Feb 9 12:39:08.597588 systemd-journald[1258]: Time spent on flushing to /var/log/journal/842da53beb474841bea5f4a8ce87ba3a is 14.775ms for 1627 entries. Feb 9 12:39:08.597588 systemd-journald[1258]: System Journal (/var/log/journal/842da53beb474841bea5f4a8ce87ba3a) is 8.0M, max 195.6M, 187.6M free. Feb 9 12:39:08.632207 systemd-journald[1258]: Received client request to flush runtime journal. Feb 9 12:39:08.610642 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 12:39:08.611100 systemd[1]: Starting systemd-random-seed.service... Feb 9 12:39:08.621600 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 12:39:08.622089 systemd[1]: Starting systemd-sysctl.service... Feb 9 12:39:08.629055 systemd[1]: Starting systemd-sysusers.service... Feb 9 12:39:08.636190 systemd[1]: Starting systemd-udev-settle.service... Feb 9 12:39:08.643588 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 12:39:08.651641 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 12:39:08.659709 systemd[1]: Finished systemd-journal-flush.service. Feb 9 12:39:08.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.667736 systemd[1]: Finished systemd-random-seed.service. Feb 9 12:39:08.681562 kernel: kauditd_printk_skb: 84 callbacks suppressed Feb 9 12:39:08.681608 kernel: audit: type=1130 audit(1707482348.667:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.730721 systemd[1]: Finished systemd-sysctl.service. Feb 9 12:39:08.773554 kernel: audit: type=1130 audit(1707482348.730:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.780660 systemd[1]: Finished systemd-sysusers.service. Feb 9 12:39:08.824525 kernel: audit: type=1130 audit(1707482348.780:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.832754 systemd[1]: Reached target first-boot-complete.target. Feb 9 12:39:08.876523 kernel: audit: type=1130 audit(1707482348.831:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.885359 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 12:39:08.894577 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 12:39:08.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.902793 udevadm[1275]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 12:39:08.903269 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 12:39:08.950555 kernel: audit: type=1130 audit(1707482348.902:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:08.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:09.021000 audit: BPF prog-id=24 op=LOAD Feb 9 12:39:09.042176 kernel: audit: type=1130 audit(1707482348.958:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:09.042225 kernel: audit: type=1334 audit(1707482349.021:151): prog-id=24 op=LOAD Feb 9 12:39:09.041000 audit: BPF prog-id=25 op=LOAD Feb 9 12:39:09.042534 kernel: audit: type=1334 audit(1707482349.041:152): prog-id=25 op=LOAD Feb 9 12:39:09.042538 systemd[1]: Starting systemd-udevd.service... Feb 9 12:39:09.041000 audit: BPF prog-id=7 op=UNLOAD Feb 9 12:39:09.041000 audit: BPF prog-id=8 op=UNLOAD Feb 9 12:39:09.062544 kernel: audit: type=1334 audit(1707482349.041:153): prog-id=7 op=UNLOAD Feb 9 12:39:09.062566 kernel: audit: type=1334 audit(1707482349.041:154): prog-id=8 op=UNLOAD Feb 9 12:39:09.112854 systemd-udevd[1278]: Using default interface naming scheme 'v252'. Feb 9 12:39:09.131826 systemd[1]: Started systemd-udevd.service. Feb 9 12:39:09.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:09.141581 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 12:39:09.141000 audit: BPF prog-id=26 op=LOAD Feb 9 12:39:09.142838 systemd[1]: Starting systemd-networkd.service... Feb 9 12:39:09.167000 audit: BPF prog-id=27 op=LOAD Feb 9 12:39:09.186545 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 12:39:09.186611 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 12:39:09.186627 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1289) Feb 9 12:39:09.186655 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 12:39:09.209000 audit: BPF prog-id=28 op=LOAD Feb 9 12:39:09.230000 audit: BPF prog-id=29 op=LOAD Feb 9 12:39:09.231039 systemd[1]: Starting systemd-userdbd.service... Feb 9 12:39:09.231485 kernel: IPMI message handler: version 39.2 Feb 9 12:39:09.236516 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 12:39:09.236541 kernel: ACPI: button: Power Button [PWRF] Feb 9 12:39:09.302660 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 12:39:09.175000 audit[1339]: AVC avc: denied { confidentiality } for pid=1339 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 12:39:09.175000 audit[1339]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557255cb9860 a1=4d8bc a2=7f79f04acbc5 a3=5 items=42 ppid=1278 pid=1339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:09.175000 audit: CWD cwd="/" Feb 9 12:39:09.175000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=1 name=(null) inode=26635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=2 name=(null) inode=26635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=3 name=(null) inode=26636 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=4 name=(null) inode=26635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=5 name=(null) inode=26637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=6 name=(null) inode=26635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=7 name=(null) inode=26638 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=8 name=(null) inode=26638 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=9 name=(null) inode=26639 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=10 name=(null) inode=26638 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=11 name=(null) inode=26640 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=12 name=(null) inode=26638 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=13 name=(null) inode=26641 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=14 name=(null) inode=26638 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=15 name=(null) inode=26642 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=16 name=(null) inode=26638 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=17 name=(null) inode=26643 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=18 name=(null) inode=26635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=19 name=(null) inode=26644 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=20 name=(null) inode=26644 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=21 name=(null) inode=26645 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=22 name=(null) inode=26644 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=23 name=(null) inode=26646 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=24 name=(null) inode=26644 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=25 name=(null) inode=26647 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=26 name=(null) inode=26644 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=27 name=(null) inode=26648 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=28 name=(null) inode=26644 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=29 name=(null) inode=26649 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=30 name=(null) inode=26635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=31 name=(null) inode=26650 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=32 name=(null) inode=26650 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=33 name=(null) inode=26651 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=34 name=(null) inode=26650 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=35 name=(null) inode=26652 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=36 name=(null) inode=26650 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=37 name=(null) inode=26653 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=38 name=(null) inode=26650 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=39 name=(null) inode=26654 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=40 name=(null) inode=26650 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PATH item=41 name=(null) inode=26655 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:39:09.175000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 12:39:09.310635 systemd[1]: Started systemd-userdbd.service. Feb 9 12:39:09.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:09.329493 kernel: ipmi device interface Feb 9 12:39:09.349488 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 12:39:09.349652 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 12:39:09.427827 kernel: ipmi_si: IPMI System Interface driver Feb 9 12:39:09.427871 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 12:39:09.427966 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 12:39:09.428036 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 12:39:09.466217 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 12:39:09.487481 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 12:39:09.487564 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 12:39:09.543516 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 12:39:09.543605 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 12:39:09.616312 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 12:39:09.616520 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 12:39:09.616535 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 12:39:09.616548 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 12:39:09.701488 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 12:39:09.728485 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Feb 9 12:39:09.728596 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Feb 9 12:39:09.733737 systemd-networkd[1310]: bond0: netdev ready Feb 9 12:39:09.736283 systemd-networkd[1310]: lo: Link UP Feb 9 12:39:09.736286 systemd-networkd[1310]: lo: Gained carrier Feb 9 12:39:09.736828 systemd-networkd[1310]: Enumeration completed Feb 9 12:39:09.736917 systemd[1]: Started systemd-networkd.service. Feb 9 12:39:09.737150 systemd-networkd[1310]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 12:39:09.740640 systemd-networkd[1310]: enp2s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:79:42:2d.network. Feb 9 12:39:09.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:09.780484 kernel: intel_rapl_common: Found RAPL domain package Feb 9 12:39:09.780511 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 12:39:09.780598 kernel: intel_rapl_common: Found RAPL domain core Feb 9 12:39:09.780614 kernel: intel_rapl_common: Found RAPL domain uncore Feb 9 12:39:09.780624 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 12:39:09.887484 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 12:39:09.890773 systemd[1]: Finished systemd-udev-settle.service. Feb 9 12:39:09.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:09.899223 systemd[1]: Starting lvm2-activation-early.service... Feb 9 12:39:09.916262 lvm[1381]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 12:39:09.940927 systemd[1]: Finished lvm2-activation-early.service. Feb 9 12:39:09.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:09.949621 systemd[1]: Reached target cryptsetup.target. Feb 9 12:39:09.958155 systemd[1]: Starting lvm2-activation.service... Feb 9 12:39:09.960235 lvm[1382]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 12:39:09.982935 systemd[1]: Finished lvm2-activation.service. Feb 9 12:39:09.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:09.990608 systemd[1]: Reached target local-fs-pre.target. Feb 9 12:39:09.998568 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 12:39:09.998582 systemd[1]: Reached target local-fs.target. Feb 9 12:39:10.006573 systemd[1]: Reached target machines.target. Feb 9 12:39:10.016114 systemd[1]: Starting ldconfig.service... Feb 9 12:39:10.023999 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 12:39:10.024019 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 12:39:10.024529 systemd[1]: Starting systemd-boot-update.service... Feb 9 12:39:10.033172 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 12:39:10.043144 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 12:39:10.043220 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 12:39:10.043242 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 12:39:10.043765 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 12:39:10.043960 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1384 (bootctl) Feb 9 12:39:10.044526 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 12:39:10.063974 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 12:39:10.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:10.064780 systemd-tmpfiles[1388]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 12:39:10.067854 systemd-tmpfiles[1388]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 12:39:10.072820 systemd-tmpfiles[1388]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 12:39:10.300555 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 12:39:10.325483 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Feb 9 12:39:10.326919 systemd-networkd[1310]: enp2s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:79:42:2c.network. Feb 9 12:39:10.384524 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 12:39:10.420904 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 12:39:10.421271 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 12:39:10.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:10.455884 systemd-fsck[1392]: fsck.fat 4.2 (2021-01-31) Feb 9 12:39:10.455884 systemd-fsck[1392]: /dev/sdb1: 789 files, 115332/258078 clusters Feb 9 12:39:10.456811 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 12:39:10.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:10.469721 systemd[1]: Mounting boot.mount... Feb 9 12:39:10.496488 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 9 12:39:10.496719 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 12:39:10.498117 systemd[1]: Mounted boot.mount. Feb 9 12:39:10.517529 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Feb 9 12:39:10.537483 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 12:39:10.543594 systemd[1]: Finished systemd-boot-update.service. Feb 9 12:39:10.557287 systemd-networkd[1310]: bond0: Link UP Feb 9 12:39:10.557485 systemd-networkd[1310]: enp2s0f1np1: Link UP Feb 9 12:39:10.557608 systemd-networkd[1310]: enp2s0f1np1: Gained carrier Feb 9 12:39:10.558547 systemd-networkd[1310]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:79:42:2c.network. Feb 9 12:39:10.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:10.572246 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 12:39:10.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:10.606259 systemd[1]: Starting audit-rules.service... Feb 9 12:39:10.606804 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 12:39:10.606836 kernel: bond0: active interface up! Feb 9 12:39:10.614115 systemd[1]: Starting clean-ca-certificates.service... Feb 9 12:39:10.624000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 12:39:10.624000 audit[1413]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff44ebcf30 a2=420 a3=0 items=0 ppid=1397 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:10.624000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 12:39:10.625636 augenrules[1413]: No rules Feb 9 12:39:10.632134 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 12:39:10.639485 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 12:39:10.639511 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 12:39:10.662573 ldconfig[1383]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 12:39:10.667570 systemd[1]: Starting systemd-resolved.service... Feb 9 12:39:10.675381 systemd[1]: Starting systemd-timesyncd.service... Feb 9 12:39:10.683054 systemd[1]: Starting systemd-update-utmp.service... Feb 9 12:39:10.689819 systemd[1]: Finished ldconfig.service. Feb 9 12:39:10.696702 systemd[1]: Finished audit-rules.service. Feb 9 12:39:10.703670 systemd[1]: Finished clean-ca-certificates.service. Feb 9 12:39:10.711680 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 12:39:10.731307 systemd[1]: Starting systemd-update-done.service... Feb 9 12:39:10.735297 systemd-networkd[1310]: enp2s0f0np0: Link UP Feb 9 12:39:10.735462 systemd-networkd[1310]: bond0: Gained carrier Feb 9 12:39:10.735497 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 12:39:10.735552 systemd-networkd[1310]: enp2s0f0np0: Gained carrier Feb 9 12:39:10.750556 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 12:39:10.750943 systemd[1]: Finished systemd-update-done.service. Feb 9 12:39:10.759482 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 12:39:10.759508 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Feb 9 12:39:10.793365 systemd[1]: Finished systemd-update-utmp.service. Feb 9 12:39:10.796268 systemd-networkd[1310]: enp2s0f1np1: Link DOWN Feb 9 12:39:10.796270 systemd-networkd[1310]: enp2s0f1np1: Lost carrier Feb 9 12:39:10.796482 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 12:39:10.805610 systemd[1]: Started systemd-timesyncd.service. Feb 9 12:39:10.807098 systemd-resolved[1419]: Positive Trust Anchors: Feb 9 12:39:10.807104 systemd-resolved[1419]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 12:39:10.807124 systemd-resolved[1419]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 12:39:10.810789 systemd-resolved[1419]: Using system hostname 'ci-3510.3.2-a-fbd511b770'. Feb 9 12:39:10.813619 systemd[1]: Reached target time-set.target. Feb 9 12:39:10.959489 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 9 12:39:10.978482 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Feb 9 12:39:10.980346 systemd-networkd[1310]: enp2s0f1np1: Link UP Feb 9 12:39:10.980552 systemd-networkd[1310]: enp2s0f1np1: Gained carrier Feb 9 12:39:10.981475 systemd[1]: Started systemd-resolved.service. Feb 9 12:39:10.989625 systemd[1]: Reached target network.target. Feb 9 12:39:10.997569 systemd[1]: Reached target nss-lookup.target. Feb 9 12:39:11.012567 systemd[1]: Reached target sysinit.target. Feb 9 12:39:11.020481 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Feb 9 12:39:11.035601 systemd[1]: Started motdgen.path. Feb 9 12:39:11.040480 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 12:39:11.046566 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 12:39:11.056625 systemd[1]: Started logrotate.timer. Feb 9 12:39:11.063594 systemd[1]: Started mdadm.timer. Feb 9 12:39:11.070556 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 12:39:11.078547 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 12:39:11.078564 systemd[1]: Reached target paths.target. Feb 9 12:39:11.085547 systemd[1]: Reached target timers.target. Feb 9 12:39:11.092671 systemd[1]: Listening on dbus.socket. Feb 9 12:39:11.100147 systemd[1]: Starting docker.socket... Feb 9 12:39:11.107891 systemd[1]: Listening on sshd.socket. Feb 9 12:39:11.114609 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 12:39:11.114816 systemd[1]: Listening on docker.socket. Feb 9 12:39:11.121603 systemd[1]: Reached target sockets.target. Feb 9 12:39:11.129547 systemd[1]: Reached target basic.target. Feb 9 12:39:11.136574 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 12:39:11.136588 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 12:39:11.137012 systemd[1]: Starting containerd.service... Feb 9 12:39:11.143947 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 12:39:11.153011 systemd[1]: Starting coreos-metadata.service... Feb 9 12:39:11.160126 systemd[1]: Starting dbus.service... Feb 9 12:39:11.166085 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 12:39:11.170581 jq[1434]: false Feb 9 12:39:11.173059 systemd[1]: Starting extend-filesystems.service... Feb 9 12:39:11.174353 coreos-metadata[1427]: Feb 09 12:39:11.174 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 12:39:11.178814 dbus-daemon[1433]: [system] SELinux support is enabled Feb 9 12:39:11.179615 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 12:39:11.180221 systemd[1]: Starting motdgen.service... Feb 9 12:39:11.181226 extend-filesystems[1435]: Found sda Feb 9 12:39:11.198860 extend-filesystems[1435]: Found sdb Feb 9 12:39:11.198860 extend-filesystems[1435]: Found sdb1 Feb 9 12:39:11.198860 extend-filesystems[1435]: Found sdb2 Feb 9 12:39:11.198860 extend-filesystems[1435]: Found sdb3 Feb 9 12:39:11.198860 extend-filesystems[1435]: Found usr Feb 9 12:39:11.198860 extend-filesystems[1435]: Found sdb4 Feb 9 12:39:11.198860 extend-filesystems[1435]: Found sdb6 Feb 9 12:39:11.198860 extend-filesystems[1435]: Found sdb7 Feb 9 12:39:11.198860 extend-filesystems[1435]: Found sdb9 Feb 9 12:39:11.198860 extend-filesystems[1435]: Checking size of /dev/sdb9 Feb 9 12:39:11.198860 extend-filesystems[1435]: Resized partition /dev/sdb9 Feb 9 12:39:11.319542 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 9 12:39:11.187339 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 12:39:11.319700 coreos-metadata[1430]: Feb 09 12:39:11.183 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 12:39:11.319843 extend-filesystems[1451]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 12:39:11.223289 systemd[1]: Starting prepare-critools.service... Feb 9 12:39:11.242088 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 12:39:11.261020 systemd[1]: Starting sshd-keygen.service... Feb 9 12:39:11.279761 systemd[1]: Starting systemd-logind.service... Feb 9 12:39:11.296559 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 12:39:11.297072 systemd[1]: Starting tcsd.service... Feb 9 12:39:11.304675 systemd-logind[1463]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 12:39:11.336125 jq[1466]: true Feb 9 12:39:11.304688 systemd-logind[1463]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 12:39:11.304698 systemd-logind[1463]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 12:39:11.304872 systemd-logind[1463]: New seat seat0. Feb 9 12:39:11.310765 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 12:39:11.311120 systemd[1]: Starting update-engine.service... Feb 9 12:39:11.328187 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 12:39:11.344855 systemd[1]: Started dbus.service. Feb 9 12:39:11.353255 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 12:39:11.353344 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 12:39:11.353562 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 12:39:11.353645 systemd[1]: Finished motdgen.service. Feb 9 12:39:11.354036 update_engine[1465]: I0209 12:39:11.353518 1465 main.cc:92] Flatcar Update Engine starting Feb 9 12:39:11.357137 update_engine[1465]: I0209 12:39:11.357100 1465 update_check_scheduler.cc:74] Next update check in 7m55s Feb 9 12:39:11.361398 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 12:39:11.361487 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 12:39:11.365977 tar[1468]: ./ Feb 9 12:39:11.366087 tar[1468]: ./loopback Feb 9 12:39:11.372134 jq[1472]: true Feb 9 12:39:11.372690 dbus-daemon[1433]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 12:39:11.373594 tar[1469]: crictl Feb 9 12:39:11.377832 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 12:39:11.377927 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 12:39:11.378002 systemd[1]: Started update-engine.service. Feb 9 12:39:11.381430 env[1473]: time="2024-02-09T12:39:11.381401177Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 12:39:11.384874 tar[1468]: ./bandwidth Feb 9 12:39:11.390334 systemd[1]: Started systemd-logind.service. Feb 9 12:39:11.391384 env[1473]: time="2024-02-09T12:39:11.391366266Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 12:39:11.392492 env[1473]: time="2024-02-09T12:39:11.392474354Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 12:39:11.393115 env[1473]: time="2024-02-09T12:39:11.393095647Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 12:39:11.393150 env[1473]: time="2024-02-09T12:39:11.393116155Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 12:39:11.394720 env[1473]: time="2024-02-09T12:39:11.394703876Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 12:39:11.394754 env[1473]: time="2024-02-09T12:39:11.394721510Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 12:39:11.394754 env[1473]: time="2024-02-09T12:39:11.394733522Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 12:39:11.394754 env[1473]: time="2024-02-09T12:39:11.394743082Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 12:39:11.394846 env[1473]: time="2024-02-09T12:39:11.394803153Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 12:39:11.396815 env[1473]: time="2024-02-09T12:39:11.396801138Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 12:39:11.396916 env[1473]: time="2024-02-09T12:39:11.396902026Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 12:39:11.396943 env[1473]: time="2024-02-09T12:39:11.396916406Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 12:39:11.398823 env[1473]: time="2024-02-09T12:39:11.398807473Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 12:39:11.398862 env[1473]: time="2024-02-09T12:39:11.398822245Z" level=info msg="metadata content store policy set" policy=shared Feb 9 12:39:11.399123 bash[1499]: Updated "/home/core/.ssh/authorized_keys" Feb 9 12:39:11.400185 systemd[1]: Started locksmithd.service. Feb 9 12:39:11.406221 env[1473]: time="2024-02-09T12:39:11.406205547Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 12:39:11.406264 env[1473]: time="2024-02-09T12:39:11.406226690Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 12:39:11.406264 env[1473]: time="2024-02-09T12:39:11.406238765Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 12:39:11.406264 env[1473]: time="2024-02-09T12:39:11.406259677Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 12:39:11.406334 env[1473]: time="2024-02-09T12:39:11.406271027Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 12:39:11.406334 env[1473]: time="2024-02-09T12:39:11.406282483Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 12:39:11.406334 env[1473]: time="2024-02-09T12:39:11.406292438Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 12:39:11.406334 env[1473]: time="2024-02-09T12:39:11.406303993Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 12:39:11.406334 env[1473]: time="2024-02-09T12:39:11.406316416Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 12:39:11.406334 env[1473]: time="2024-02-09T12:39:11.406329231Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 12:39:11.406468 env[1473]: time="2024-02-09T12:39:11.406340591Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 12:39:11.406468 env[1473]: time="2024-02-09T12:39:11.406351432Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 12:39:11.406468 env[1473]: time="2024-02-09T12:39:11.406416871Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 12:39:11.406541 env[1473]: time="2024-02-09T12:39:11.406477453Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 12:39:11.406609 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 12:39:11.406681 env[1473]: time="2024-02-09T12:39:11.406670475Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 12:39:11.406711 env[1473]: time="2024-02-09T12:39:11.406691081Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 12:39:11.406711 env[1473]: time="2024-02-09T12:39:11.406701911Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 12:39:11.406706 systemd[1]: Reached target system-config.target. Feb 9 12:39:11.406800 env[1473]: time="2024-02-09T12:39:11.406739936Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 12:39:11.406800 env[1473]: time="2024-02-09T12:39:11.406752510Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 12:39:11.406800 env[1473]: time="2024-02-09T12:39:11.406763817Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 12:39:11.406800 env[1473]: time="2024-02-09T12:39:11.406773828Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 12:39:11.406800 env[1473]: time="2024-02-09T12:39:11.406785190Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 12:39:11.406800 env[1473]: time="2024-02-09T12:39:11.406795725Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 12:39:11.406936 env[1473]: time="2024-02-09T12:39:11.406806465Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 12:39:11.406936 env[1473]: time="2024-02-09T12:39:11.406817678Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 12:39:11.406936 env[1473]: time="2024-02-09T12:39:11.406828141Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 12:39:11.406936 env[1473]: time="2024-02-09T12:39:11.406908410Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 12:39:11.406936 env[1473]: time="2024-02-09T12:39:11.406921779Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 12:39:11.406936 env[1473]: time="2024-02-09T12:39:11.406932144Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 12:39:11.407076 env[1473]: time="2024-02-09T12:39:11.406942443Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 12:39:11.407076 env[1473]: time="2024-02-09T12:39:11.406957473Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 12:39:11.407076 env[1473]: time="2024-02-09T12:39:11.406966826Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 12:39:11.407076 env[1473]: time="2024-02-09T12:39:11.406980054Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 12:39:11.407076 env[1473]: time="2024-02-09T12:39:11.407006788Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 12:39:11.407212 env[1473]: time="2024-02-09T12:39:11.407169682Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 12:39:11.409578 env[1473]: time="2024-02-09T12:39:11.407221419Z" level=info msg="Connect containerd service" Feb 9 12:39:11.409578 env[1473]: time="2024-02-09T12:39:11.407248418Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 12:39:11.409578 env[1473]: time="2024-02-09T12:39:11.407625776Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 12:39:11.409578 env[1473]: time="2024-02-09T12:39:11.407717650Z" level=info msg="Start subscribing containerd event" Feb 9 12:39:11.409578 env[1473]: time="2024-02-09T12:39:11.407748731Z" level=info msg="Start recovering state" Feb 9 12:39:11.409578 env[1473]: time="2024-02-09T12:39:11.407770778Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 12:39:11.409578 env[1473]: time="2024-02-09T12:39:11.407780385Z" level=info msg="Start event monitor" Feb 9 12:39:11.409578 env[1473]: time="2024-02-09T12:39:11.407787161Z" level=info msg="Start snapshots syncer" Feb 9 12:39:11.409578 env[1473]: time="2024-02-09T12:39:11.407792674Z" level=info msg="Start cni network conf syncer for default" Feb 9 12:39:11.409578 env[1473]: time="2024-02-09T12:39:11.407799393Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 12:39:11.409578 env[1473]: time="2024-02-09T12:39:11.407800808Z" level=info msg="Start streaming server" Feb 9 12:39:11.409578 env[1473]: time="2024-02-09T12:39:11.407834008Z" level=info msg="containerd successfully booted in 0.026814s" Feb 9 12:39:11.414639 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 12:39:11.414715 systemd[1]: Reached target user-config.target. Feb 9 12:39:11.418272 tar[1468]: ./ptp Feb 9 12:39:11.424169 systemd[1]: Started containerd.service. Feb 9 12:39:11.430751 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 12:39:11.441025 tar[1468]: ./vlan Feb 9 12:39:11.456986 locksmithd[1507]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 12:39:11.462892 tar[1468]: ./host-device Feb 9 12:39:11.484138 tar[1468]: ./tuning Feb 9 12:39:11.502902 tar[1468]: ./vrf Feb 9 12:39:11.522590 tar[1468]: ./sbr Feb 9 12:39:11.541817 tar[1468]: ./tap Feb 9 12:39:11.563781 tar[1468]: ./dhcp Feb 9 12:39:11.619768 tar[1468]: ./static Feb 9 12:39:11.635630 tar[1468]: ./firewall Feb 9 12:39:11.655843 systemd[1]: Finished prepare-critools.service. Feb 9 12:39:11.660002 tar[1468]: ./macvlan Feb 9 12:39:11.681962 tar[1468]: ./dummy Feb 9 12:39:11.683483 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 9 12:39:11.712076 extend-filesystems[1451]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 9 12:39:11.712076 extend-filesystems[1451]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 12:39:11.712076 extend-filesystems[1451]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 9 12:39:11.750564 extend-filesystems[1435]: Resized filesystem in /dev/sdb9 Feb 9 12:39:11.758560 tar[1468]: ./bridge Feb 9 12:39:11.758560 tar[1468]: ./ipvlan Feb 9 12:39:11.712459 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 12:39:11.712556 systemd[1]: Finished extend-filesystems.service. Feb 9 12:39:11.778180 tar[1468]: ./portmap Feb 9 12:39:11.798908 tar[1468]: ./host-local Feb 9 12:39:11.823032 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 12:39:11.995135 sshd_keygen[1462]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 12:39:12.006625 systemd[1]: Finished sshd-keygen.service. Feb 9 12:39:12.010603 systemd-networkd[1310]: bond0: Gained IPv6LL Feb 9 12:39:12.014343 systemd[1]: Starting issuegen.service... Feb 9 12:39:12.021723 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 12:39:12.021795 systemd[1]: Finished issuegen.service. Feb 9 12:39:12.029308 systemd[1]: Starting systemd-user-sessions.service... Feb 9 12:39:12.037771 systemd[1]: Finished systemd-user-sessions.service. Feb 9 12:39:12.047261 systemd[1]: Started getty@tty1.service. Feb 9 12:39:12.055188 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 12:39:12.063652 systemd[1]: Reached target getty.target. Feb 9 12:39:13.190546 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 12:39:16.938552 coreos-metadata[1427]: Feb 09 12:39:16.938 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 12:39:16.939302 coreos-metadata[1430]: Feb 09 12:39:16.938 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 12:39:17.074663 login[1535]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 12:39:17.082473 login[1534]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 12:39:17.083110 systemd-logind[1463]: New session 1 of user core. Feb 9 12:39:17.083686 systemd[1]: Created slice user-500.slice. Feb 9 12:39:17.084255 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 12:39:17.085352 systemd-logind[1463]: New session 2 of user core. Feb 9 12:39:17.089324 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 12:39:17.089986 systemd[1]: Starting user@500.service... Feb 9 12:39:17.091799 (systemd)[1539]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:39:17.163157 systemd[1539]: Queued start job for default target default.target. Feb 9 12:39:17.163383 systemd[1539]: Reached target paths.target. Feb 9 12:39:17.163395 systemd[1539]: Reached target sockets.target. Feb 9 12:39:17.163403 systemd[1539]: Reached target timers.target. Feb 9 12:39:17.163409 systemd[1539]: Reached target basic.target. Feb 9 12:39:17.163427 systemd[1539]: Reached target default.target. Feb 9 12:39:17.163440 systemd[1539]: Startup finished in 68ms. Feb 9 12:39:17.163489 systemd[1]: Started user@500.service. Feb 9 12:39:17.164043 systemd[1]: Started session-1.scope. Feb 9 12:39:17.164395 systemd[1]: Started session-2.scope. Feb 9 12:39:17.939332 coreos-metadata[1430]: Feb 09 12:39:17.938 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 12:39:17.940075 coreos-metadata[1427]: Feb 09 12:39:17.938 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 12:39:18.744536 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Feb 9 12:39:18.744697 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 9 12:39:18.995461 systemd[1]: Created slice system-sshd.slice. Feb 9 12:39:18.996258 systemd[1]: Started sshd@0-139.178.90.255:22-147.75.109.163:36582.service. Feb 9 12:39:19.010439 coreos-metadata[1430]: Feb 09 12:39:19.010 INFO Fetch successful Feb 9 12:39:19.010946 coreos-metadata[1427]: Feb 09 12:39:19.010 INFO Fetch successful Feb 9 12:39:19.032109 systemd[1]: Finished coreos-metadata.service. Feb 9 12:39:19.032859 systemd[1]: Started packet-phone-home.service. Feb 9 12:39:19.033938 unknown[1427]: wrote ssh authorized keys file for user: core Feb 9 12:39:19.037919 curl[1564]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 12:39:19.037919 curl[1564]: Dload Upload Total Spent Left Speed Feb 9 12:39:19.044668 update-ssh-keys[1565]: Updated "/home/core/.ssh/authorized_keys" Feb 9 12:39:19.044857 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 12:39:19.045021 systemd[1]: Reached target multi-user.target. Feb 9 12:39:19.045654 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 12:39:19.046764 sshd[1560]: Accepted publickey for core from 147.75.109.163 port 36582 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:39:19.047522 sshd[1560]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:39:19.049574 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 12:39:19.049645 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 12:39:19.049784 systemd[1]: Startup finished in 2.008s (kernel) + 18.843s (initrd) + 14.376s (userspace) = 35.228s. Feb 9 12:39:19.050734 systemd-logind[1463]: New session 3 of user core. Feb 9 12:39:19.051103 systemd[1]: Started session-3.scope. Feb 9 12:39:19.098838 systemd[1]: Started sshd@1-139.178.90.255:22-147.75.109.163:36586.service. Feb 9 12:39:19.126062 sshd[1570]: Accepted publickey for core from 147.75.109.163 port 36586 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:39:19.126762 sshd[1570]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:39:19.129080 systemd-logind[1463]: New session 4 of user core. Feb 9 12:39:19.129505 systemd[1]: Started session-4.scope. Feb 9 12:39:19.180222 sshd[1570]: pam_unix(sshd:session): session closed for user core Feb 9 12:39:19.182984 systemd[1]: sshd@1-139.178.90.255:22-147.75.109.163:36586.service: Deactivated successfully. Feb 9 12:39:19.183697 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 12:39:19.184398 systemd-logind[1463]: Session 4 logged out. Waiting for processes to exit. Feb 9 12:39:19.185553 systemd[1]: Started sshd@2-139.178.90.255:22-147.75.109.163:36596.service. Feb 9 12:39:19.186476 systemd-logind[1463]: Removed session 4. Feb 9 12:39:19.225357 sshd[1576]: Accepted publickey for core from 147.75.109.163 port 36596 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:39:19.226049 sshd[1576]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:39:19.228394 systemd-logind[1463]: New session 5 of user core. Feb 9 12:39:19.228936 systemd[1]: Started session-5.scope. Feb 9 12:39:19.245412 curl[1564]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 12:39:19.246118 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 12:39:19.278908 sshd[1576]: pam_unix(sshd:session): session closed for user core Feb 9 12:39:19.285186 systemd[1]: sshd@2-139.178.90.255:22-147.75.109.163:36596.service: Deactivated successfully. Feb 9 12:39:19.286756 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 12:39:19.288432 systemd-logind[1463]: Session 5 logged out. Waiting for processes to exit. Feb 9 12:39:19.290972 systemd[1]: Started sshd@3-139.178.90.255:22-147.75.109.163:36606.service. Feb 9 12:39:19.293352 systemd-logind[1463]: Removed session 5. Feb 9 12:39:19.356799 sshd[1583]: Accepted publickey for core from 147.75.109.163 port 36606 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:39:19.359957 sshd[1583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:39:19.370367 systemd-logind[1463]: New session 6 of user core. Feb 9 12:39:19.372707 systemd[1]: Started session-6.scope. Feb 9 12:39:18.936400 systemd-resolved[1419]: Clock change detected. Flushing caches. Feb 9 12:39:18.957828 systemd-journald[1258]: Time jumped backwards, rotating. Feb 9 12:39:18.936593 systemd-timesyncd[1420]: Contacted time server 108.61.56.35:123 (0.flatcar.pool.ntp.org). Feb 9 12:39:18.949348 sshd[1583]: pam_unix(sshd:session): session closed for user core Feb 9 12:39:18.936757 systemd-timesyncd[1420]: Initial clock synchronization to Fri 2024-02-09 12:39:18.936242 UTC. Feb 9 12:39:18.950812 systemd[1]: sshd@3-139.178.90.255:22-147.75.109.163:36606.service: Deactivated successfully. Feb 9 12:39:18.951122 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 12:39:18.951449 systemd-logind[1463]: Session 6 logged out. Waiting for processes to exit. Feb 9 12:39:18.952028 systemd[1]: Started sshd@4-139.178.90.255:22-147.75.109.163:36610.service. Feb 9 12:39:18.952467 systemd-logind[1463]: Removed session 6. Feb 9 12:39:18.978921 sshd[1590]: Accepted publickey for core from 147.75.109.163 port 36610 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:39:18.979951 sshd[1590]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:39:18.983456 systemd-logind[1463]: New session 7 of user core. Feb 9 12:39:18.984270 systemd[1]: Started session-7.scope. Feb 9 12:39:19.066434 sudo[1593]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 12:39:19.067064 sudo[1593]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 12:39:19.090312 dbus-daemon[1433]: Ѝ\u0003d\xeaU: received setenforce notice (enforcing=-539929808) Feb 9 12:39:19.095364 sudo[1593]: pam_unix(sudo:session): session closed for user root Feb 9 12:39:19.100669 sshd[1590]: pam_unix(sshd:session): session closed for user core Feb 9 12:39:19.107630 systemd[1]: sshd@4-139.178.90.255:22-147.75.109.163:36610.service: Deactivated successfully. Feb 9 12:39:19.109245 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 12:39:19.110976 systemd-logind[1463]: Session 7 logged out. Waiting for processes to exit. Feb 9 12:39:19.113604 systemd[1]: Started sshd@5-139.178.90.255:22-147.75.109.163:36616.service. Feb 9 12:39:19.115979 systemd-logind[1463]: Removed session 7. Feb 9 12:39:19.164972 sshd[1597]: Accepted publickey for core from 147.75.109.163 port 36616 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:39:19.165623 sshd[1597]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:39:19.168033 systemd-logind[1463]: New session 8 of user core. Feb 9 12:39:19.168412 systemd[1]: Started session-8.scope. Feb 9 12:39:19.218796 sudo[1601]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 12:39:19.219031 sudo[1601]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 12:39:19.222315 sudo[1601]: pam_unix(sudo:session): session closed for user root Feb 9 12:39:19.228387 sudo[1600]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 12:39:19.228709 sudo[1600]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 12:39:19.248119 systemd[1]: Stopping audit-rules.service... Feb 9 12:39:19.250000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 12:39:19.251420 auditctl[1604]: No rules Feb 9 12:39:19.252242 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 12:39:19.252663 systemd[1]: Stopped audit-rules.service. Feb 9 12:39:19.256463 systemd[1]: Starting audit-rules.service... Feb 9 12:39:19.256824 kernel: kauditd_printk_skb: 64 callbacks suppressed Feb 9 12:39:19.257012 kernel: audit: type=1305 audit(1707482359.250:172): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 12:39:19.250000 audit[1604]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd992600f0 a2=420 a3=0 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:19.272811 kernel: audit: type=1300 audit(1707482359.250:172): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd992600f0 a2=420 a3=0 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:19.289961 augenrules[1621]: No rules Feb 9 12:39:19.290558 systemd[1]: Finished audit-rules.service. Feb 9 12:39:19.291402 sudo[1600]: pam_unix(sudo:session): session closed for user root Feb 9 12:39:19.292705 sshd[1597]: pam_unix(sshd:session): session closed for user core Feb 9 12:39:19.295664 systemd[1]: Started sshd@6-139.178.90.255:22-147.75.109.163:36626.service. Feb 9 12:39:19.296193 systemd[1]: sshd@5-139.178.90.255:22-147.75.109.163:36616.service: Deactivated successfully. Feb 9 12:39:19.296664 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 12:39:19.297208 systemd-logind[1463]: Session 8 logged out. Waiting for processes to exit. Feb 9 12:39:19.298016 systemd-logind[1463]: Removed session 8. Feb 9 12:39:19.250000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 12:39:19.313599 kernel: audit: type=1327 audit(1707482359.250:172): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 12:39:19.313625 kernel: audit: type=1131 audit(1707482359.252:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.336051 kernel: audit: type=1130 audit(1707482359.290:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.355791 sshd[1626]: Accepted publickey for core from 147.75.109.163 port 36626 ssh2: RSA SHA256:64VUfRXiMosPxVXfALumiHZVs3BYorCRVSgPBbg6OcI Feb 9 12:39:19.357038 sshd[1626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 12:39:19.358498 kernel: audit: type=1106 audit(1707482359.290:175): pid=1600 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.290000 audit[1600]: USER_END pid=1600 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.359295 systemd-logind[1463]: New session 9 of user core. Feb 9 12:39:19.359665 systemd[1]: Started session-9.scope. Feb 9 12:39:19.384476 kernel: audit: type=1104 audit(1707482359.290:176): pid=1600 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.290000 audit[1600]: CRED_DISP pid=1600 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.406024 sudo[1630]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 12:39:19.406132 sudo[1630]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 12:39:19.408006 kernel: audit: type=1106 audit(1707482359.292:177): pid=1597 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:39:19.292000 audit[1597]: USER_END pid=1597 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:39:19.440263 kernel: audit: type=1104 audit(1707482359.292:178): pid=1597 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:39:19.292000 audit[1597]: CRED_DISP pid=1597 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:39:19.453710 systemd[1]: Started sshd@7-139.178.90.255:22-43.134.226.170:37790.service. Feb 9 12:39:19.466223 kernel: audit: type=1130 audit(1707482359.295:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.255:22-147.75.109.163:36626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.255:22-147.75.109.163:36626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.90.255:22-147.75.109.163:36616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.355000 audit[1626]: USER_ACCT pid=1626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:39:19.356000 audit[1626]: CRED_ACQ pid=1626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:39:19.356000 audit[1626]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea2cab300 a2=3 a3=0 items=0 ppid=1 pid=1626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:19.356000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 12:39:19.360000 audit[1626]: USER_START pid=1626 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:39:19.361000 audit[1629]: CRED_ACQ pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:39:19.405000 audit[1630]: USER_ACCT pid=1630 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.405000 audit[1630]: CRED_REFR pid=1630 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.406000 audit[1630]: USER_START pid=1630 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:39:19.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.255:22-43.134.226.170:37790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:20.494016 sshd[1637]: Invalid user asancar from 43.134.226.170 port 37790 Feb 9 12:39:20.500045 sshd[1637]: pam_faillock(sshd:auth): User unknown Feb 9 12:39:20.501194 sshd[1637]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:39:20.501285 sshd[1637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.226.170 Feb 9 12:39:20.502143 sshd[1637]: pam_faillock(sshd:auth): User unknown Feb 9 12:39:20.501000 audit[1637]: USER_AUTH pid=1637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="asancar" exe="/usr/sbin/sshd" hostname=43.134.226.170 addr=43.134.226.170 terminal=ssh res=failed' Feb 9 12:39:21.037589 systemd[1]: Started sshd@8-139.178.90.255:22-49.232.242.40:57388.service. Feb 9 12:39:21.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.255:22-49.232.242.40:57388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:22.538918 sshd[1637]: Failed password for invalid user asancar from 43.134.226.170 port 37790 ssh2 Feb 9 12:39:22.556161 sshd[1640]: Invalid user heli from 49.232.242.40 port 57388 Feb 9 12:39:22.562243 sshd[1640]: pam_faillock(sshd:auth): User unknown Feb 9 12:39:22.563221 sshd[1640]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:39:22.563309 sshd[1640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.242.40 Feb 9 12:39:22.564181 sshd[1640]: pam_faillock(sshd:auth): User unknown Feb 9 12:39:22.563000 audit[1640]: USER_AUTH pid=1640 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="heli" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:39:22.967856 sshd[1637]: Received disconnect from 43.134.226.170 port 37790:11: Bye Bye [preauth] Feb 9 12:39:22.967856 sshd[1637]: Disconnected from invalid user asancar 43.134.226.170 port 37790 [preauth] Feb 9 12:39:22.970294 systemd[1]: sshd@7-139.178.90.255:22-43.134.226.170:37790.service: Deactivated successfully. Feb 9 12:39:22.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.255:22-43.134.226.170:37790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:23.389619 systemd[1]: Reloading. Feb 9 12:39:23.421395 /usr/lib/systemd/system-generators/torcx-generator[1668]: time="2024-02-09T12:39:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 12:39:23.421414 /usr/lib/systemd/system-generators/torcx-generator[1668]: time="2024-02-09T12:39:23Z" level=info msg="torcx already run" Feb 9 12:39:23.492011 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 12:39:23.492021 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 12:39:23.506587 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit: BPF prog-id=37 op=LOAD Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.548000 audit: BPF prog-id=38 op=LOAD Feb 9 12:39:23.548000 audit: BPF prog-id=24 op=UNLOAD Feb 9 12:39:23.548000 audit: BPF prog-id=25 op=UNLOAD Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit: BPF prog-id=39 op=LOAD Feb 9 12:39:23.549000 audit: BPF prog-id=32 op=UNLOAD Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit: BPF prog-id=40 op=LOAD Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.550000 audit: BPF prog-id=41 op=LOAD Feb 9 12:39:23.550000 audit: BPF prog-id=33 op=UNLOAD Feb 9 12:39:23.550000 audit: BPF prog-id=34 op=UNLOAD Feb 9 12:39:23.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit: BPF prog-id=42 op=LOAD Feb 9 12:39:23.551000 audit: BPF prog-id=21 op=UNLOAD Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit: BPF prog-id=43 op=LOAD Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit: BPF prog-id=44 op=LOAD Feb 9 12:39:23.551000 audit: BPF prog-id=22 op=UNLOAD Feb 9 12:39:23.551000 audit: BPF prog-id=23 op=UNLOAD Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit: BPF prog-id=45 op=LOAD Feb 9 12:39:23.551000 audit: BPF prog-id=27 op=UNLOAD Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit: BPF prog-id=46 op=LOAD Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit: BPF prog-id=47 op=LOAD Feb 9 12:39:23.552000 audit: BPF prog-id=28 op=UNLOAD Feb 9 12:39:23.552000 audit: BPF prog-id=29 op=UNLOAD Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit: BPF prog-id=48 op=LOAD Feb 9 12:39:23.552000 audit: BPF prog-id=35 op=UNLOAD Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.552000 audit: BPF prog-id=49 op=LOAD Feb 9 12:39:23.552000 audit: BPF prog-id=31 op=UNLOAD Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit: BPF prog-id=50 op=LOAD Feb 9 12:39:23.553000 audit: BPF prog-id=26 op=UNLOAD Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:23.554000 audit: BPF prog-id=51 op=LOAD Feb 9 12:39:23.554000 audit: BPF prog-id=30 op=UNLOAD Feb 9 12:39:23.559050 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 12:39:23.578508 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 12:39:23.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:23.578761 systemd[1]: Reached target network-online.target. Feb 9 12:39:23.579407 systemd[1]: Started kubelet.service. Feb 9 12:39:23.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:23.602599 kubelet[1727]: E0209 12:39:23.602574 1727 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 12:39:23.603822 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 12:39:23.603890 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 12:39:23.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 12:39:23.950303 systemd[1]: Stopped kubelet.service. Feb 9 12:39:23.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:23.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:23.963313 systemd[1]: Reloading. Feb 9 12:39:24.009450 /usr/lib/systemd/system-generators/torcx-generator[1829]: time="2024-02-09T12:39:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 12:39:24.009466 /usr/lib/systemd/system-generators/torcx-generator[1829]: time="2024-02-09T12:39:24Z" level=info msg="torcx already run" Feb 9 12:39:24.079180 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 12:39:24.079193 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 12:39:24.096076 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 12:39:24.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit: BPF prog-id=52 op=LOAD Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit: BPF prog-id=53 op=LOAD Feb 9 12:39:24.139000 audit: BPF prog-id=37 op=UNLOAD Feb 9 12:39:24.139000 audit: BPF prog-id=38 op=UNLOAD Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit: BPF prog-id=54 op=LOAD Feb 9 12:39:24.139000 audit: BPF prog-id=39 op=UNLOAD Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.140000 audit: BPF prog-id=55 op=LOAD Feb 9 12:39:24.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.140000 audit: BPF prog-id=56 op=LOAD Feb 9 12:39:24.140000 audit: BPF prog-id=40 op=UNLOAD Feb 9 12:39:24.140000 audit: BPF prog-id=41 op=UNLOAD Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit: BPF prog-id=57 op=LOAD Feb 9 12:39:24.141000 audit: BPF prog-id=42 op=UNLOAD Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit: BPF prog-id=58 op=LOAD Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit: BPF prog-id=59 op=LOAD Feb 9 12:39:24.141000 audit: BPF prog-id=43 op=UNLOAD Feb 9 12:39:24.141000 audit: BPF prog-id=44 op=UNLOAD Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit: BPF prog-id=60 op=LOAD Feb 9 12:39:24.141000 audit: BPF prog-id=45 op=UNLOAD Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit: BPF prog-id=61 op=LOAD Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit: BPF prog-id=62 op=LOAD Feb 9 12:39:24.142000 audit: BPF prog-id=46 op=UNLOAD Feb 9 12:39:24.142000 audit: BPF prog-id=47 op=UNLOAD Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit: BPF prog-id=63 op=LOAD Feb 9 12:39:24.142000 audit: BPF prog-id=48 op=UNLOAD Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.142000 audit: BPF prog-id=64 op=LOAD Feb 9 12:39:24.142000 audit: BPF prog-id=49 op=UNLOAD Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit: BPF prog-id=65 op=LOAD Feb 9 12:39:24.143000 audit: BPF prog-id=50 op=UNLOAD Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.144000 audit: BPF prog-id=66 op=LOAD Feb 9 12:39:24.144000 audit: BPF prog-id=51 op=UNLOAD Feb 9 12:39:24.151282 systemd[1]: Started kubelet.service. Feb 9 12:39:24.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:24.173049 kubelet[1890]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 12:39:24.173049 kubelet[1890]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 12:39:24.173049 kubelet[1890]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 12:39:24.173049 kubelet[1890]: I0209 12:39:24.173044 1890 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 12:39:24.328084 kubelet[1890]: I0209 12:39:24.328026 1890 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 12:39:24.328084 kubelet[1890]: I0209 12:39:24.328038 1890 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 12:39:24.328206 kubelet[1890]: I0209 12:39:24.328157 1890 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 12:39:24.329558 kubelet[1890]: I0209 12:39:24.329550 1890 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 12:39:24.349134 kubelet[1890]: I0209 12:39:24.349124 1890 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 12:39:24.349227 kubelet[1890]: I0209 12:39:24.349221 1890 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 12:39:24.349308 kubelet[1890]: I0209 12:39:24.349301 1890 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 12:39:24.349367 kubelet[1890]: I0209 12:39:24.349314 1890 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 12:39:24.349367 kubelet[1890]: I0209 12:39:24.349319 1890 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 12:39:24.349367 kubelet[1890]: I0209 12:39:24.349362 1890 state_mem.go:36] "Initialized new in-memory state store" Feb 9 12:39:24.349418 kubelet[1890]: I0209 12:39:24.349401 1890 kubelet.go:393] "Attempting to sync node with API server" Feb 9 12:39:24.349418 kubelet[1890]: I0209 12:39:24.349408 1890 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 12:39:24.349418 kubelet[1890]: I0209 12:39:24.349419 1890 kubelet.go:309] "Adding apiserver pod source" Feb 9 12:39:24.349464 kubelet[1890]: I0209 12:39:24.349428 1890 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 12:39:24.349587 kubelet[1890]: E0209 12:39:24.349575 1890 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:24.349587 kubelet[1890]: E0209 12:39:24.349579 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:24.349848 kubelet[1890]: I0209 12:39:24.349813 1890 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 12:39:24.350055 kubelet[1890]: W0209 12:39:24.350046 1890 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 12:39:24.350443 kubelet[1890]: I0209 12:39:24.350419 1890 server.go:1232] "Started kubelet" Feb 9 12:39:24.350480 kubelet[1890]: I0209 12:39:24.350473 1890 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 12:39:24.350524 kubelet[1890]: I0209 12:39:24.350489 1890 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 12:39:24.350709 kubelet[1890]: I0209 12:39:24.350701 1890 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 12:39:24.350748 kubelet[1890]: E0209 12:39:24.350719 1890 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 12:39:24.350748 kubelet[1890]: E0209 12:39:24.350734 1890 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 12:39:24.350000 audit[1890]: AVC avc: denied { mac_admin } for pid=1890 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.351128 kubelet[1890]: I0209 12:39:24.351095 1890 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 12:39:24.351161 kubelet[1890]: I0209 12:39:24.351125 1890 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 12:39:24.351193 kubelet[1890]: I0209 12:39:24.351161 1890 server.go:462] "Adding debug handlers to kubelet server" Feb 9 12:39:24.351193 kubelet[1890]: I0209 12:39:24.351184 1890 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 12:39:24.351412 kubelet[1890]: I0209 12:39:24.351402 1890 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 12:39:24.351563 kubelet[1890]: I0209 12:39:24.351554 1890 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 12:39:24.351600 kubelet[1890]: I0209 12:39:24.351574 1890 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 12:39:24.356663 kernel: kauditd_printk_skb: 366 callbacks suppressed Feb 9 12:39:24.356711 kernel: audit: type=1400 audit(1707482364.350:544): avc: denied { mac_admin } for pid=1890 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.357098 kubelet[1890]: E0209 12:39:24.357086 1890 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.67.80.17\" not found" node="10.67.80.17" Feb 9 12:39:24.360853 kubelet[1890]: I0209 12:39:24.360820 1890 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 12:39:24.360853 kubelet[1890]: I0209 12:39:24.360849 1890 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 12:39:24.360908 kubelet[1890]: I0209 12:39:24.360856 1890 state_mem.go:36] "Initialized new in-memory state store" Feb 9 12:39:24.376658 kubelet[1890]: I0209 12:39:24.376625 1890 policy_none.go:49] "None policy: Start" Feb 9 12:39:24.377044 kubelet[1890]: I0209 12:39:24.377012 1890 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 12:39:24.377044 kubelet[1890]: I0209 12:39:24.377041 1890 state_mem.go:35] "Initializing new in-memory state store" Feb 9 12:39:24.350000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:39:24.379317 systemd[1]: Created slice kubepods.slice. Feb 9 12:39:24.381750 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 12:39:24.383271 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 12:39:24.406658 kernel: audit: type=1401 audit(1707482364.350:544): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:39:24.406682 kernel: audit: type=1300 audit(1707482364.350:544): arch=c000003e syscall=188 success=no exit=-22 a0=c000e641e0 a1=c00007df68 a2=c000e641b0 a3=25 items=0 ppid=1 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:24.350000 audit[1890]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e641e0 a1=c00007df68 a2=c000e641b0 a3=25 items=0 ppid=1 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:24.451999 kubelet[1890]: I0209 12:39:24.451959 1890 kubelet_node_status.go:70] "Attempting to register node" node="10.67.80.17" Feb 9 12:39:24.458238 kubelet[1890]: I0209 12:39:24.458227 1890 kubelet_node_status.go:73] "Successfully registered node" node="10.67.80.17" Feb 9 12:39:24.488136 kernel: audit: type=1327 audit(1707482364.350:544): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:39:24.350000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:39:24.539838 sshd[1640]: Failed password for invalid user heli from 49.232.242.40 port 57388 ssh2 Feb 9 12:39:24.350000 audit[1890]: AVC avc: denied { mac_admin } for pid=1890 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.626256 kernel: audit: type=1400 audit(1707482364.350:545): avc: denied { mac_admin } for pid=1890 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.626278 kernel: audit: type=1401 audit(1707482364.350:545): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:39:24.350000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:39:24.350000 audit[1890]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e661a0 a1=c00007df80 a2=c000e64270 a3=25 items=0 ppid=1 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:24.746112 kernel: audit: type=1300 audit(1707482364.350:545): arch=c000003e syscall=188 success=no exit=-22 a0=c000e661a0 a1=c00007df80 a2=c000e64270 a3=25 items=0 ppid=1 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:24.746133 kernel: audit: type=1327 audit(1707482364.350:545): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:39:24.350000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:39:24.835000 audit[1917]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:24.835000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff5dd1f230 a2=0 a3=7fff5dd1f21c items=0 ppid=1890 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:24.987550 kernel: audit: type=1325 audit(1707482364.835:546): table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:24.987575 kernel: audit: type=1300 audit(1707482364.835:546): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff5dd1f230 a2=0 a3=7fff5dd1f21c items=0 ppid=1890 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:24.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 12:39:24.835000 audit[1919]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:24.835000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe4a0031d0 a2=0 a3=7ffe4a0031bc items=0 ppid=1890 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:24.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 12:39:24.989431 kubelet[1890]: I0209 12:39:24.989392 1890 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 12:39:24.989431 kubelet[1890]: I0209 12:39:24.989420 1890 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 12:39:24.988000 audit[1890]: AVC avc: denied { mac_admin } for pid=1890 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:24.988000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 12:39:24.988000 audit[1890]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001034f30 a1=c00116f2a8 a2=c001034f00 a3=25 items=0 ppid=1 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:24.988000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 12:39:24.989571 kubelet[1890]: I0209 12:39:24.989565 1890 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 12:39:24.989806 kubelet[1890]: I0209 12:39:24.989799 1890 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 12:39:24.989982 env[1473]: time="2024-02-09T12:39:24.989960185Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 12:39:24.990151 kubelet[1890]: I0209 12:39:24.990045 1890 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 12:39:24.836000 audit[1921]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:24.836000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe97a6c090 a2=0 a3=7ffe97a6c07c items=0 ppid=1890 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:24.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 12:39:25.014000 audit[1926]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:25.014000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdc93a1270 a2=0 a3=7ffdc93a125c items=0 ppid=1890 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:25.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 12:39:25.040000 audit[1931]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:25.040000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcba67ef50 a2=0 a3=7ffcba67ef3c items=0 ppid=1890 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:25.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 12:39:25.041580 kubelet[1890]: I0209 12:39:25.041573 1890 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 12:39:25.041000 audit[1932]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1932 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:25.041000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc1463ee40 a2=0 a3=7ffc1463ee2c items=0 ppid=1890 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:25.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 12:39:25.041000 audit[1933]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:25.041000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe49a85bf0 a2=0 a3=7ffe49a85bdc items=0 ppid=1890 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:25.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 12:39:25.042115 kubelet[1890]: I0209 12:39:25.042060 1890 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 12:39:25.042115 kubelet[1890]: I0209 12:39:25.042071 1890 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 12:39:25.042115 kubelet[1890]: I0209 12:39:25.042081 1890 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 12:39:25.042115 kubelet[1890]: E0209 12:39:25.042102 1890 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 12:39:25.041000 audit[1934]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1934 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:25.041000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1e80f960 a2=0 a3=7ffd1e80f94c items=0 ppid=1890 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:25.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 12:39:25.041000 audit[1935]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:25.041000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffda73217a0 a2=0 a3=7ffda732178c items=0 ppid=1890 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:25.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 12:39:25.042000 audit[1936]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:25.042000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff3624efe0 a2=0 a3=7fff3624efcc items=0 ppid=1890 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:25.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 12:39:25.042000 audit[1937]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:25.042000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf804f340 a2=0 a3=7ffcf804f32c items=0 ppid=1890 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:25.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 12:39:25.042000 audit[1938]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1938 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:25.042000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe71c478c0 a2=0 a3=7ffe71c478ac items=0 ppid=1890 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:25.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 12:39:25.330173 kubelet[1890]: I0209 12:39:25.329976 1890 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 12:39:25.331140 kubelet[1890]: W0209 12:39:25.330468 1890 reflector.go:458] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Feb 9 12:39:25.331140 kubelet[1890]: W0209 12:39:25.330492 1890 reflector.go:458] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.Service ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Feb 9 12:39:25.331140 kubelet[1890]: W0209 12:39:25.330470 1890 reflector.go:458] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Feb 9 12:39:25.344583 sshd[1640]: Received disconnect from 49.232.242.40 port 57388:11: Bye Bye [preauth] Feb 9 12:39:25.344583 sshd[1640]: Disconnected from invalid user heli 49.232.242.40 port 57388 [preauth] Feb 9 12:39:25.347152 systemd[1]: sshd@8-139.178.90.255:22-49.232.242.40:57388.service: Deactivated successfully. Feb 9 12:39:25.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.255:22-49.232.242.40:57388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:25.349962 kubelet[1890]: I0209 12:39:25.349903 1890 apiserver.go:52] "Watching apiserver" Feb 9 12:39:25.350156 kubelet[1890]: E0209 12:39:25.349998 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:25.354919 kubelet[1890]: I0209 12:39:25.354834 1890 topology_manager.go:215] "Topology Admit Handler" podUID="993ee561-f789-4d23-918a-da3957f5e2a5" podNamespace="calico-system" podName="calico-node-tdxtq" Feb 9 12:39:25.355116 kubelet[1890]: I0209 12:39:25.355036 1890 topology_manager.go:215] "Topology Admit Handler" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" podNamespace="calico-system" podName="csi-node-driver-5hr4k" Feb 9 12:39:25.355287 kubelet[1890]: I0209 12:39:25.355214 1890 topology_manager.go:215] "Topology Admit Handler" podUID="d5a471c8-a6d3-4e78-bb81-17686b39e8e4" podNamespace="kube-system" podName="kube-proxy-9lfq4" Feb 9 12:39:25.355758 kubelet[1890]: E0209 12:39:25.355700 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:25.368566 systemd[1]: Created slice kubepods-besteffort-pod993ee561_f789_4d23_918a_da3957f5e2a5.slice. Feb 9 12:39:25.410583 systemd[1]: Created slice kubepods-besteffort-podd5a471c8_a6d3_4e78_bb81_17686b39e8e4.slice. Feb 9 12:39:25.452703 kubelet[1890]: I0209 12:39:25.452624 1890 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 12:39:25.456319 kubelet[1890]: I0209 12:39:25.456270 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/993ee561-f789-4d23-918a-da3957f5e2a5-tigera-ca-bundle\") pod \"calico-node-tdxtq\" (UID: \"993ee561-f789-4d23-918a-da3957f5e2a5\") " pod="calico-system/calico-node-tdxtq" Feb 9 12:39:25.456559 kubelet[1890]: I0209 12:39:25.456370 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9h5jt\" (UniqueName: \"kubernetes.io/projected/7db31f02-8920-4cff-9d23-8db5b7550166-kube-api-access-9h5jt\") pod \"csi-node-driver-5hr4k\" (UID: \"7db31f02-8920-4cff-9d23-8db5b7550166\") " pod="calico-system/csi-node-driver-5hr4k" Feb 9 12:39:25.456715 kubelet[1890]: I0209 12:39:25.456564 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/d5a471c8-a6d3-4e78-bb81-17686b39e8e4-kube-proxy\") pod \"kube-proxy-9lfq4\" (UID: \"d5a471c8-a6d3-4e78-bb81-17686b39e8e4\") " pod="kube-system/kube-proxy-9lfq4" Feb 9 12:39:25.456861 kubelet[1890]: I0209 12:39:25.456759 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d5a471c8-a6d3-4e78-bb81-17686b39e8e4-lib-modules\") pod \"kube-proxy-9lfq4\" (UID: \"d5a471c8-a6d3-4e78-bb81-17686b39e8e4\") " pod="kube-system/kube-proxy-9lfq4" Feb 9 12:39:25.456861 kubelet[1890]: I0209 12:39:25.456858 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xs8bn\" (UniqueName: \"kubernetes.io/projected/d5a471c8-a6d3-4e78-bb81-17686b39e8e4-kube-api-access-xs8bn\") pod \"kube-proxy-9lfq4\" (UID: \"d5a471c8-a6d3-4e78-bb81-17686b39e8e4\") " pod="kube-system/kube-proxy-9lfq4" Feb 9 12:39:25.457137 kubelet[1890]: I0209 12:39:25.456928 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/993ee561-f789-4d23-918a-da3957f5e2a5-policysync\") pod \"calico-node-tdxtq\" (UID: \"993ee561-f789-4d23-918a-da3957f5e2a5\") " pod="calico-system/calico-node-tdxtq" Feb 9 12:39:25.457137 kubelet[1890]: I0209 12:39:25.457008 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/993ee561-f789-4d23-918a-da3957f5e2a5-cni-bin-dir\") pod \"calico-node-tdxtq\" (UID: \"993ee561-f789-4d23-918a-da3957f5e2a5\") " pod="calico-system/calico-node-tdxtq" Feb 9 12:39:25.457137 kubelet[1890]: I0209 12:39:25.457088 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/993ee561-f789-4d23-918a-da3957f5e2a5-flexvol-driver-host\") pod \"calico-node-tdxtq\" (UID: \"993ee561-f789-4d23-918a-da3957f5e2a5\") " pod="calico-system/calico-node-tdxtq" Feb 9 12:39:25.457552 kubelet[1890]: I0209 12:39:25.457157 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/7db31f02-8920-4cff-9d23-8db5b7550166-varrun\") pod \"csi-node-driver-5hr4k\" (UID: \"7db31f02-8920-4cff-9d23-8db5b7550166\") " pod="calico-system/csi-node-driver-5hr4k" Feb 9 12:39:25.457552 kubelet[1890]: I0209 12:39:25.457300 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/7db31f02-8920-4cff-9d23-8db5b7550166-socket-dir\") pod \"csi-node-driver-5hr4k\" (UID: \"7db31f02-8920-4cff-9d23-8db5b7550166\") " pod="calico-system/csi-node-driver-5hr4k" Feb 9 12:39:25.457552 kubelet[1890]: I0209 12:39:25.457387 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/993ee561-f789-4d23-918a-da3957f5e2a5-var-run-calico\") pod \"calico-node-tdxtq\" (UID: \"993ee561-f789-4d23-918a-da3957f5e2a5\") " pod="calico-system/calico-node-tdxtq" Feb 9 12:39:25.457976 kubelet[1890]: I0209 12:39:25.457544 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/993ee561-f789-4d23-918a-da3957f5e2a5-cni-net-dir\") pod \"calico-node-tdxtq\" (UID: \"993ee561-f789-4d23-918a-da3957f5e2a5\") " pod="calico-system/calico-node-tdxtq" Feb 9 12:39:25.457976 kubelet[1890]: I0209 12:39:25.457686 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x6hb9\" (UniqueName: \"kubernetes.io/projected/993ee561-f789-4d23-918a-da3957f5e2a5-kube-api-access-x6hb9\") pod \"calico-node-tdxtq\" (UID: \"993ee561-f789-4d23-918a-da3957f5e2a5\") " pod="calico-system/calico-node-tdxtq" Feb 9 12:39:25.457976 kubelet[1890]: I0209 12:39:25.457794 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/7db31f02-8920-4cff-9d23-8db5b7550166-kubelet-dir\") pod \"csi-node-driver-5hr4k\" (UID: \"7db31f02-8920-4cff-9d23-8db5b7550166\") " pod="calico-system/csi-node-driver-5hr4k" Feb 9 12:39:25.457976 kubelet[1890]: I0209 12:39:25.457910 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/7db31f02-8920-4cff-9d23-8db5b7550166-registration-dir\") pod \"csi-node-driver-5hr4k\" (UID: \"7db31f02-8920-4cff-9d23-8db5b7550166\") " pod="calico-system/csi-node-driver-5hr4k" Feb 9 12:39:25.458493 kubelet[1890]: I0209 12:39:25.458018 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d5a471c8-a6d3-4e78-bb81-17686b39e8e4-xtables-lock\") pod \"kube-proxy-9lfq4\" (UID: \"d5a471c8-a6d3-4e78-bb81-17686b39e8e4\") " pod="kube-system/kube-proxy-9lfq4" Feb 9 12:39:25.458493 kubelet[1890]: I0209 12:39:25.458169 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/993ee561-f789-4d23-918a-da3957f5e2a5-lib-modules\") pod \"calico-node-tdxtq\" (UID: \"993ee561-f789-4d23-918a-da3957f5e2a5\") " pod="calico-system/calico-node-tdxtq" Feb 9 12:39:25.458493 kubelet[1890]: I0209 12:39:25.458276 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/993ee561-f789-4d23-918a-da3957f5e2a5-xtables-lock\") pod \"calico-node-tdxtq\" (UID: \"993ee561-f789-4d23-918a-da3957f5e2a5\") " pod="calico-system/calico-node-tdxtq" Feb 9 12:39:25.458493 kubelet[1890]: I0209 12:39:25.458380 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/993ee561-f789-4d23-918a-da3957f5e2a5-node-certs\") pod \"calico-node-tdxtq\" (UID: \"993ee561-f789-4d23-918a-da3957f5e2a5\") " pod="calico-system/calico-node-tdxtq" Feb 9 12:39:25.458493 kubelet[1890]: I0209 12:39:25.458447 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/993ee561-f789-4d23-918a-da3957f5e2a5-var-lib-calico\") pod \"calico-node-tdxtq\" (UID: \"993ee561-f789-4d23-918a-da3957f5e2a5\") " pod="calico-system/calico-node-tdxtq" Feb 9 12:39:25.459050 kubelet[1890]: I0209 12:39:25.458575 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/993ee561-f789-4d23-918a-da3957f5e2a5-cni-log-dir\") pod \"calico-node-tdxtq\" (UID: \"993ee561-f789-4d23-918a-da3957f5e2a5\") " pod="calico-system/calico-node-tdxtq" Feb 9 12:39:25.560866 kubelet[1890]: E0209 12:39:25.560805 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.560866 kubelet[1890]: W0209 12:39:25.560848 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.561195 kubelet[1890]: E0209 12:39:25.560907 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.561555 kubelet[1890]: E0209 12:39:25.561516 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.561555 kubelet[1890]: W0209 12:39:25.561551 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.561799 kubelet[1890]: E0209 12:39:25.561607 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.562216 kubelet[1890]: E0209 12:39:25.562179 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.562216 kubelet[1890]: W0209 12:39:25.562213 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.562424 kubelet[1890]: E0209 12:39:25.562262 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.562846 kubelet[1890]: E0209 12:39:25.562791 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.562846 kubelet[1890]: W0209 12:39:25.562818 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.563054 kubelet[1890]: E0209 12:39:25.562935 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.563439 kubelet[1890]: E0209 12:39:25.563376 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.563439 kubelet[1890]: W0209 12:39:25.563410 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.563628 kubelet[1890]: E0209 12:39:25.563531 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.563981 kubelet[1890]: E0209 12:39:25.563945 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.563981 kubelet[1890]: W0209 12:39:25.563980 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.564196 kubelet[1890]: E0209 12:39:25.564100 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.564532 kubelet[1890]: E0209 12:39:25.564496 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.564646 kubelet[1890]: W0209 12:39:25.564531 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.564646 kubelet[1890]: E0209 12:39:25.564631 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.565144 kubelet[1890]: E0209 12:39:25.565083 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.565144 kubelet[1890]: W0209 12:39:25.565118 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.565337 kubelet[1890]: E0209 12:39:25.565240 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.565681 kubelet[1890]: E0209 12:39:25.565628 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.565681 kubelet[1890]: W0209 12:39:25.565656 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.565917 kubelet[1890]: E0209 12:39:25.565774 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.566245 kubelet[1890]: E0209 12:39:25.566209 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.566368 kubelet[1890]: W0209 12:39:25.566244 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.566467 kubelet[1890]: E0209 12:39:25.566368 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.566829 kubelet[1890]: E0209 12:39:25.566772 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.566829 kubelet[1890]: W0209 12:39:25.566800 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.567085 kubelet[1890]: E0209 12:39:25.566923 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.567332 kubelet[1890]: E0209 12:39:25.567274 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.567332 kubelet[1890]: W0209 12:39:25.567309 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.567536 kubelet[1890]: E0209 12:39:25.567434 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.567834 kubelet[1890]: E0209 12:39:25.567785 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.567834 kubelet[1890]: W0209 12:39:25.567813 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.568031 kubelet[1890]: E0209 12:39:25.567933 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.568399 kubelet[1890]: E0209 12:39:25.568347 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.568399 kubelet[1890]: W0209 12:39:25.568381 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.568602 kubelet[1890]: E0209 12:39:25.568443 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.568944 kubelet[1890]: E0209 12:39:25.568889 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.568944 kubelet[1890]: W0209 12:39:25.568916 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.569155 kubelet[1890]: E0209 12:39:25.569043 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.569430 kubelet[1890]: E0209 12:39:25.569380 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.569430 kubelet[1890]: W0209 12:39:25.569412 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.569637 kubelet[1890]: E0209 12:39:25.569533 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.570004 kubelet[1890]: E0209 12:39:25.569970 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.570115 kubelet[1890]: W0209 12:39:25.570003 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.570214 kubelet[1890]: E0209 12:39:25.570126 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.570553 kubelet[1890]: E0209 12:39:25.570521 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.570553 kubelet[1890]: W0209 12:39:25.570548 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.570849 kubelet[1890]: E0209 12:39:25.570670 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.571051 kubelet[1890]: E0209 12:39:25.570997 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.571051 kubelet[1890]: W0209 12:39:25.571030 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.571244 kubelet[1890]: E0209 12:39:25.571151 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.571562 kubelet[1890]: E0209 12:39:25.571534 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.571664 kubelet[1890]: W0209 12:39:25.571562 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.571781 kubelet[1890]: E0209 12:39:25.571684 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.572043 kubelet[1890]: E0209 12:39:25.571990 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.572043 kubelet[1890]: W0209 12:39:25.572013 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.572245 kubelet[1890]: E0209 12:39:25.572131 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.572424 kubelet[1890]: E0209 12:39:25.572395 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.572529 kubelet[1890]: W0209 12:39:25.572429 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.572626 kubelet[1890]: E0209 12:39:25.572567 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.573146 kubelet[1890]: E0209 12:39:25.573103 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.573146 kubelet[1890]: W0209 12:39:25.573130 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.573487 kubelet[1890]: E0209 12:39:25.573253 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.573679 kubelet[1890]: E0209 12:39:25.573599 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.573679 kubelet[1890]: W0209 12:39:25.573621 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.573947 kubelet[1890]: E0209 12:39:25.573700 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.575551 kubelet[1890]: E0209 12:39:25.575462 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.575551 kubelet[1890]: W0209 12:39:25.575508 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.575850 kubelet[1890]: E0209 12:39:25.575648 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.576225 kubelet[1890]: E0209 12:39:25.576149 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.576225 kubelet[1890]: W0209 12:39:25.576188 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.576500 kubelet[1890]: E0209 12:39:25.576318 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.576764 kubelet[1890]: E0209 12:39:25.576712 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.576877 kubelet[1890]: W0209 12:39:25.576766 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.576978 kubelet[1890]: E0209 12:39:25.576896 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.577449 kubelet[1890]: E0209 12:39:25.577376 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.577449 kubelet[1890]: W0209 12:39:25.577413 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.577725 kubelet[1890]: E0209 12:39:25.577481 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.578181 kubelet[1890]: E0209 12:39:25.578100 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.578181 kubelet[1890]: W0209 12:39:25.578135 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.578181 kubelet[1890]: E0209 12:39:25.578186 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.579724 kubelet[1890]: E0209 12:39:25.579715 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.579724 kubelet[1890]: W0209 12:39:25.579721 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.579838 kubelet[1890]: E0209 12:39:25.579738 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.579967 kubelet[1890]: E0209 12:39:25.579931 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.579967 kubelet[1890]: W0209 12:39:25.579952 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.580035 kubelet[1890]: E0209 12:39:25.579986 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.580255 kubelet[1890]: E0209 12:39:25.580171 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.580255 kubelet[1890]: W0209 12:39:25.580177 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.580255 kubelet[1890]: E0209 12:39:25.580186 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.580362 kubelet[1890]: E0209 12:39:25.580338 1890 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 12:39:25.580362 kubelet[1890]: W0209 12:39:25.580346 1890 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 12:39:25.580362 kubelet[1890]: E0209 12:39:25.580357 1890 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 12:39:25.689107 sudo[1630]: pam_unix(sudo:session): session closed for user root Feb 9 12:39:25.688000 audit[1630]: USER_END pid=1630 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:39:25.688000 audit[1630]: CRED_DISP pid=1630 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 12:39:25.692035 sshd[1626]: pam_unix(sshd:session): session closed for user core Feb 9 12:39:25.693000 audit[1626]: USER_END pid=1626 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:39:25.694000 audit[1626]: CRED_DISP pid=1626 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 12:39:25.697995 systemd[1]: sshd@6-139.178.90.255:22-147.75.109.163:36626.service: Deactivated successfully. Feb 9 12:39:25.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.255:22-147.75.109.163:36626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:25.699833 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 12:39:25.701623 systemd-logind[1463]: Session 9 logged out. Waiting for processes to exit. Feb 9 12:39:25.703934 systemd-logind[1463]: Removed session 9. Feb 9 12:39:25.708172 env[1473]: time="2024-02-09T12:39:25.708046977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tdxtq,Uid:993ee561-f789-4d23-918a-da3957f5e2a5,Namespace:calico-system,Attempt:0,}" Feb 9 12:39:25.716962 env[1473]: time="2024-02-09T12:39:25.716855211Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9lfq4,Uid:d5a471c8-a6d3-4e78-bb81-17686b39e8e4,Namespace:kube-system,Attempt:0,}" Feb 9 12:39:26.351065 kubelet[1890]: E0209 12:39:26.350971 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:26.465954 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount399462194.mount: Deactivated successfully. Feb 9 12:39:26.467575 env[1473]: time="2024-02-09T12:39:26.467530537Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:26.468863 env[1473]: time="2024-02-09T12:39:26.468824281Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:26.469471 env[1473]: time="2024-02-09T12:39:26.469424644Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:26.470360 env[1473]: time="2024-02-09T12:39:26.470338431Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:26.471388 env[1473]: time="2024-02-09T12:39:26.471339166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:26.471772 env[1473]: time="2024-02-09T12:39:26.471733885Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:26.473062 env[1473]: time="2024-02-09T12:39:26.473026627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:26.474072 env[1473]: time="2024-02-09T12:39:26.474040111Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:26.480270 env[1473]: time="2024-02-09T12:39:26.480200040Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:39:26.480270 env[1473]: time="2024-02-09T12:39:26.480238847Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:39:26.480377 env[1473]: time="2024-02-09T12:39:26.480245697Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:39:26.480377 env[1473]: time="2024-02-09T12:39:26.480358277Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dd8154281648043d40e2bdbf1b67ce9aa2292648b954c2cfcc2455010319302f pid=1989 runtime=io.containerd.runc.v2 Feb 9 12:39:26.481340 env[1473]: time="2024-02-09T12:39:26.481316714Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:39:26.481340 env[1473]: time="2024-02-09T12:39:26.481331904Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:39:26.481340 env[1473]: time="2024-02-09T12:39:26.481338642Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:39:26.481418 env[1473]: time="2024-02-09T12:39:26.481387811Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0d3b3b8a285373eea385b31af3d42fcb743463e6f8daf4e2205f801578c70b7a pid=2000 runtime=io.containerd.runc.v2 Feb 9 12:39:26.487334 systemd[1]: Started cri-containerd-0d3b3b8a285373eea385b31af3d42fcb743463e6f8daf4e2205f801578c70b7a.scope. Feb 9 12:39:26.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.491000 audit: BPF prog-id=67 op=LOAD Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2000 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:26.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064336233623861323835333733656561333835623331616633643432 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2000 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:26.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064336233623861323835333733656561333835623331616633643432 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit: BPF prog-id=68 op=LOAD Feb 9 12:39:26.492000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028c1e0 items=0 ppid=2000 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:26.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064336233623861323835333733656561333835623331616633643432 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit: BPF prog-id=69 op=LOAD Feb 9 12:39:26.492000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028c228 items=0 ppid=2000 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:26.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064336233623861323835333733656561333835623331616633643432 Feb 9 12:39:26.492000 audit: BPF prog-id=69 op=UNLOAD Feb 9 12:39:26.492000 audit: BPF prog-id=68 op=UNLOAD Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.492000 audit: BPF prog-id=70 op=LOAD Feb 9 12:39:26.492000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028c638 items=0 ppid=2000 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:26.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064336233623861323835333733656561333835623331616633643432 Feb 9 12:39:26.497735 systemd[1]: Started cri-containerd-dd8154281648043d40e2bdbf1b67ce9aa2292648b954c2cfcc2455010319302f.scope. Feb 9 12:39:26.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit: BPF prog-id=71 op=LOAD Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1989 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:26.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383135343238313634383034336434306532626462663162363763 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1989 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:26.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383135343238313634383034336434306532626462663162363763 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit: BPF prog-id=72 op=LOAD Feb 9 12:39:26.502000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000b0a90 items=0 ppid=1989 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:26.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383135343238313634383034336434306532626462663162363763 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit: BPF prog-id=73 op=LOAD Feb 9 12:39:26.502000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000b0ad8 items=0 ppid=1989 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:26.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383135343238313634383034336434306532626462663162363763 Feb 9 12:39:26.502000 audit: BPF prog-id=73 op=UNLOAD Feb 9 12:39:26.502000 audit: BPF prog-id=72 op=UNLOAD Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:26.502000 audit: BPF prog-id=74 op=LOAD Feb 9 12:39:26.502000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000b0ee8 items=0 ppid=1989 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:26.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464383135343238313634383034336434306532626462663162363763 Feb 9 12:39:26.508608 env[1473]: time="2024-02-09T12:39:26.508583896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tdxtq,Uid:993ee561-f789-4d23-918a-da3957f5e2a5,Namespace:calico-system,Attempt:0,} returns sandbox id \"dd8154281648043d40e2bdbf1b67ce9aa2292648b954c2cfcc2455010319302f\"" Feb 9 12:39:26.509606 env[1473]: time="2024-02-09T12:39:26.509593679Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 12:39:26.510637 env[1473]: time="2024-02-09T12:39:26.510617536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9lfq4,Uid:d5a471c8-a6d3-4e78-bb81-17686b39e8e4,Namespace:kube-system,Attempt:0,} returns sandbox id \"0d3b3b8a285373eea385b31af3d42fcb743463e6f8daf4e2205f801578c70b7a\"" Feb 9 12:39:27.043720 kubelet[1890]: E0209 12:39:27.043631 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:27.351863 kubelet[1890]: E0209 12:39:27.351689 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:28.352111 kubelet[1890]: E0209 12:39:28.352035 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:29.043199 kubelet[1890]: E0209 12:39:29.043098 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:29.353520 kubelet[1890]: E0209 12:39:29.353320 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:29.896719 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount330035178.mount: Deactivated successfully. Feb 9 12:39:30.354686 kubelet[1890]: E0209 12:39:30.354507 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:31.042765 kubelet[1890]: E0209 12:39:31.042644 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:31.354709 kubelet[1890]: E0209 12:39:31.354626 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:32.355359 kubelet[1890]: E0209 12:39:32.355252 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:33.043620 kubelet[1890]: E0209 12:39:33.043517 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:33.356105 kubelet[1890]: E0209 12:39:33.355909 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:34.356631 kubelet[1890]: E0209 12:39:34.356564 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:34.727055 env[1473]: time="2024-02-09T12:39:34.727004028Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:34.727641 env[1473]: time="2024-02-09T12:39:34.727627237Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:34.728863 env[1473]: time="2024-02-09T12:39:34.728851708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:34.730046 env[1473]: time="2024-02-09T12:39:34.730033114Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:34.730580 env[1473]: time="2024-02-09T12:39:34.730567614Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 12:39:34.731227 env[1473]: time="2024-02-09T12:39:34.731212860Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 9 12:39:34.731915 env[1473]: time="2024-02-09T12:39:34.731902104Z" level=info msg="CreateContainer within sandbox \"dd8154281648043d40e2bdbf1b67ce9aa2292648b954c2cfcc2455010319302f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 12:39:34.737106 env[1473]: time="2024-02-09T12:39:34.737090378Z" level=info msg="CreateContainer within sandbox \"dd8154281648043d40e2bdbf1b67ce9aa2292648b954c2cfcc2455010319302f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7839b588f577dfcb655bfb0321ef33cd5cac4c1f933412195d39f5efe87ae1d2\"" Feb 9 12:39:34.737380 env[1473]: time="2024-02-09T12:39:34.737370132Z" level=info msg="StartContainer for \"7839b588f577dfcb655bfb0321ef33cd5cac4c1f933412195d39f5efe87ae1d2\"" Feb 9 12:39:34.764435 systemd[1]: Started cri-containerd-7839b588f577dfcb655bfb0321ef33cd5cac4c1f933412195d39f5efe87ae1d2.scope. Feb 9 12:39:34.771000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.799000 kernel: kauditd_printk_skb: 158 callbacks suppressed Feb 9 12:39:34.799107 kernel: audit: type=1400 audit(1707482374.771:601): avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.771000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1989 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:34.956076 kernel: audit: type=1300 audit(1707482374.771:601): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1989 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:34.956107 kernel: audit: type=1327 audit(1707482374.771:601): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738333962353838663537376466636236353562666230333231656633 Feb 9 12:39:34.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738333962353838663537376466636236353562666230333231656633 Feb 9 12:39:35.042621 kubelet[1890]: E0209 12:39:35.042588 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:35.047650 kernel: audit: type=1400 audit(1707482374.771:602): avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.771000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.109946 kernel: audit: type=1400 audit(1707482374.771:602): avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.771000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.172197 kernel: audit: type=1400 audit(1707482374.771:602): avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.771000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.234537 kernel: audit: type=1400 audit(1707482374.771:602): avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.771000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.297171 kernel: audit: type=1400 audit(1707482374.771:602): avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.771000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.357281 kubelet[1890]: E0209 12:39:35.357264 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:34.771000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.376190 env[1473]: time="2024-02-09T12:39:35.376155485Z" level=info msg="StartContainer for \"7839b588f577dfcb655bfb0321ef33cd5cac4c1f933412195d39f5efe87ae1d2\" returns successfully" Feb 9 12:39:35.422469 kernel: audit: type=1400 audit(1707482374.771:602): avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.422508 kernel: audit: type=1400 audit(1707482374.771:602): avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.771000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.422734 systemd[1]: cri-containerd-7839b588f577dfcb655bfb0321ef33cd5cac4c1f933412195d39f5efe87ae1d2.scope: Deactivated successfully. Feb 9 12:39:34.771000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.771000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.771000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.771000 audit: BPF prog-id=75 op=LOAD Feb 9 12:39:34.771000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003700f0 items=0 ppid=1989 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:34.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738333962353838663537376466636236353562666230333231656633 Feb 9 12:39:34.860000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.860000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.860000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.860000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.860000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.860000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.860000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.860000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.860000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:34.860000 audit: BPF prog-id=76 op=LOAD Feb 9 12:39:34.860000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000370138 items=0 ppid=1989 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:34.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738333962353838663537376466636236353562666230333231656633 Feb 9 12:39:35.046000 audit: BPF prog-id=76 op=UNLOAD Feb 9 12:39:35.046000 audit: BPF prog-id=75 op=UNLOAD Feb 9 12:39:35.046000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.046000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.046000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.046000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.046000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.046000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.046000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.046000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.046000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.046000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:35.046000 audit: BPF prog-id=77 op=LOAD Feb 9 12:39:35.046000 audit[2068]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003701c8 items=0 ppid=1989 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:35.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738333962353838663537376466636236353562666230333231656633 Feb 9 12:39:35.494000 audit: BPF prog-id=77 op=UNLOAD Feb 9 12:39:35.615554 env[1473]: time="2024-02-09T12:39:35.615496757Z" level=info msg="shim disconnected" id=7839b588f577dfcb655bfb0321ef33cd5cac4c1f933412195d39f5efe87ae1d2 Feb 9 12:39:35.615554 env[1473]: time="2024-02-09T12:39:35.615525199Z" level=warning msg="cleaning up after shim disconnected" id=7839b588f577dfcb655bfb0321ef33cd5cac4c1f933412195d39f5efe87ae1d2 namespace=k8s.io Feb 9 12:39:35.615554 env[1473]: time="2024-02-09T12:39:35.615531227Z" level=info msg="cleaning up dead shim" Feb 9 12:39:35.630585 env[1473]: time="2024-02-09T12:39:35.630538181Z" level=warning msg="cleanup warnings time=\"2024-02-09T12:39:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2105 runtime=io.containerd.runc.v2\n" Feb 9 12:39:35.735911 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1002014128.mount: Deactivated successfully. Feb 9 12:39:35.735966 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7839b588f577dfcb655bfb0321ef33cd5cac4c1f933412195d39f5efe87ae1d2-rootfs.mount: Deactivated successfully. Feb 9 12:39:36.062548 env[1473]: time="2024-02-09T12:39:36.062498966Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:36.063142 env[1473]: time="2024-02-09T12:39:36.063127467Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:36.063605 env[1473]: time="2024-02-09T12:39:36.063596937Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:36.064257 env[1473]: time="2024-02-09T12:39:36.064218273Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:36.064547 env[1473]: time="2024-02-09T12:39:36.064503322Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 9 12:39:36.065444 env[1473]: time="2024-02-09T12:39:36.065377659Z" level=info msg="CreateContainer within sandbox \"0d3b3b8a285373eea385b31af3d42fcb743463e6f8daf4e2205f801578c70b7a\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 12:39:36.069566 env[1473]: time="2024-02-09T12:39:36.069492927Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 12:39:36.072280 env[1473]: time="2024-02-09T12:39:36.072263944Z" level=info msg="CreateContainer within sandbox \"0d3b3b8a285373eea385b31af3d42fcb743463e6f8daf4e2205f801578c70b7a\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"81920de3a1f3823ef7c727a32484991185626b858baa034469f49e863f3d67de\"" Feb 9 12:39:36.072516 env[1473]: time="2024-02-09T12:39:36.072490599Z" level=info msg="StartContainer for \"81920de3a1f3823ef7c727a32484991185626b858baa034469f49e863f3d67de\"" Feb 9 12:39:36.102145 systemd[1]: Started cri-containerd-81920de3a1f3823ef7c727a32484991185626b858baa034469f49e863f3d67de.scope. Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2000 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831393230646533613166333832336566376337323761333234383439 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit: BPF prog-id=78 op=LOAD Feb 9 12:39:36.108000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000269be0 items=0 ppid=2000 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831393230646533613166333832336566376337323761333234383439 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.108000 audit: BPF prog-id=79 op=LOAD Feb 9 12:39:36.108000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000269c28 items=0 ppid=2000 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831393230646533613166333832336566376337323761333234383439 Feb 9 12:39:36.109000 audit: BPF prog-id=79 op=UNLOAD Feb 9 12:39:36.109000 audit: BPF prog-id=78 op=UNLOAD Feb 9 12:39:36.109000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.109000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.109000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.109000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.109000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.109000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.109000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.109000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.109000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.109000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:36.109000 audit: BPF prog-id=80 op=LOAD Feb 9 12:39:36.109000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000269cb8 items=0 ppid=2000 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831393230646533613166333832336566376337323761333234383439 Feb 9 12:39:36.128301 env[1473]: time="2024-02-09T12:39:36.128249330Z" level=info msg="StartContainer for \"81920de3a1f3823ef7c727a32484991185626b858baa034469f49e863f3d67de\" returns successfully" Feb 9 12:39:36.177000 audit[2193]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.177000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef31f9ea0 a2=0 a3=7ffef31f9e8c items=0 ppid=2135 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.177000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 12:39:36.177000 audit[2194]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.177000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe84709360 a2=0 a3=7ffe8470934c items=0 ppid=2135 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 12:39:36.178000 audit[2195]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.178000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0b171480 a2=0 a3=7ffe0b17146c items=0 ppid=2135 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 12:39:36.178000 audit[2196]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.178000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9b069990 a2=0 a3=7ffe9b06997c items=0 ppid=2135 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 12:39:36.179000 audit[2197]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.179000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7c9520d0 a2=0 a3=7ffd7c9520bc items=0 ppid=2135 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 12:39:36.179000 audit[2198]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.179000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd28f78fd0 a2=0 a3=7ffd28f78fbc items=0 ppid=2135 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 12:39:36.280000 audit[2199]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.280000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffda21c48c0 a2=0 a3=7ffda21c48ac items=0 ppid=2135 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 12:39:36.286000 audit[2201]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.286000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffba6743b0 a2=0 a3=7fffba67439c items=0 ppid=2135 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 12:39:36.295000 audit[2204]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.295000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdf4eb7ec0 a2=0 a3=7ffdf4eb7eac items=0 ppid=2135 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 12:39:36.298000 audit[2205]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.298000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf34d1ee0 a2=0 a3=7ffcf34d1ecc items=0 ppid=2135 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 12:39:36.304000 audit[2207]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.304000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffeec5e290 a2=0 a3=7fffeec5e27c items=0 ppid=2135 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 12:39:36.307000 audit[2208]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.307000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff27eebd50 a2=0 a3=7fff27eebd3c items=0 ppid=2135 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.307000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 12:39:36.313000 audit[2210]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.313000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff8f9eb380 a2=0 a3=7fff8f9eb36c items=0 ppid=2135 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 12:39:36.323000 audit[2213]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.323000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcc63f6500 a2=0 a3=7ffcc63f64ec items=0 ppid=2135 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 12:39:36.326000 audit[2214]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.326000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb21dcc20 a2=0 a3=7ffdb21dcc0c items=0 ppid=2135 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.326000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 12:39:36.332000 audit[2216]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.332000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe6c83f150 a2=0 a3=7ffe6c83f13c items=0 ppid=2135 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 12:39:36.334000 audit[2217]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.334000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebe977100 a2=0 a3=7ffebe9770ec items=0 ppid=2135 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 12:39:36.341000 audit[2219]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.341000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd575da600 a2=0 a3=7ffd575da5ec items=0 ppid=2135 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 12:39:36.350000 audit[2222]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.350000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffc7a56b40 a2=0 a3=7fffc7a56b2c items=0 ppid=2135 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 12:39:36.358093 kubelet[1890]: E0209 12:39:36.358005 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:36.359000 audit[2225]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.359000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd4fd0910 a2=0 a3=7ffdd4fd08fc items=0 ppid=2135 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 12:39:36.362000 audit[2226]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.362000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe9b905340 a2=0 a3=7ffe9b90532c items=0 ppid=2135 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 12:39:36.367000 audit[2228]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.367000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcd2b088e0 a2=0 a3=7ffcd2b088cc items=0 ppid=2135 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 12:39:36.426000 audit[2233]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.426000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffe9e247f0 a2=0 a3=7fffe9e247dc items=0 ppid=2135 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 12:39:36.427000 audit[2234]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.427000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff735f2ab0 a2=0 a3=7fff735f2a9c items=0 ppid=2135 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 12:39:36.430000 audit[2236]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 12:39:36.430000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd2f9415c0 a2=0 a3=7ffd2f9415ac items=0 ppid=2135 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 12:39:36.439000 audit[2242]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:39:36.439000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd70bce9a0 a2=0 a3=7ffd70bce98c items=0 ppid=2135 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:39:36.490000 audit[2242]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:39:36.490000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd70bce9a0 a2=0 a3=7ffd70bce98c items=0 ppid=2135 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.490000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:39:36.510000 audit[2250]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.510000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe2e2f6de0 a2=0 a3=7ffe2e2f6dcc items=0 ppid=2135 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 12:39:36.514000 audit[2252]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.514000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc7615eef0 a2=0 a3=7ffc7615eedc items=0 ppid=2135 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 12:39:36.519000 audit[2255]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.519000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdc6425660 a2=0 a3=7ffdc642564c items=0 ppid=2135 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 12:39:36.521000 audit[2256]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.521000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4e9aba10 a2=0 a3=7ffe4e9ab9fc items=0 ppid=2135 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 12:39:36.524000 audit[2258]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.524000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc34ff6370 a2=0 a3=7ffc34ff635c items=0 ppid=2135 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 12:39:36.525000 audit[2259]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.525000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1fb0ed30 a2=0 a3=7ffd1fb0ed1c items=0 ppid=2135 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 12:39:36.529000 audit[2261]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.529000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff1857b3c0 a2=0 a3=7fff1857b3ac items=0 ppid=2135 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 12:39:36.533000 audit[2264]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.533000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd285a1990 a2=0 a3=7ffd285a197c items=0 ppid=2135 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 12:39:36.535000 audit[2265]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.535000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd555d1120 a2=0 a3=7ffd555d110c items=0 ppid=2135 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.535000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 12:39:36.538000 audit[2267]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.538000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff33a932d0 a2=0 a3=7fff33a932bc items=0 ppid=2135 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 12:39:36.539000 audit[2268]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.539000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe6bb4240 a2=0 a3=7fffe6bb422c items=0 ppid=2135 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.539000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 12:39:36.543000 audit[2270]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.543000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9bc793a0 a2=0 a3=7fff9bc7938c items=0 ppid=2135 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 12:39:36.548000 audit[2273]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.548000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdf616280 a2=0 a3=7fffdf61626c items=0 ppid=2135 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 12:39:36.553000 audit[2276]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.553000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe11047db0 a2=0 a3=7ffe11047d9c items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 12:39:36.554000 audit[2277]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.554000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc3bc46130 a2=0 a3=7ffc3bc4611c items=0 ppid=2135 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.554000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 12:39:36.557000 audit[2279]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.557000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc437788c0 a2=0 a3=7ffc437788ac items=0 ppid=2135 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 12:39:36.562000 audit[2282]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.562000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd1ceb3700 a2=0 a3=7ffd1ceb36ec items=0 ppid=2135 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 12:39:36.563000 audit[2283]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.563000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe08a207d0 a2=0 a3=7ffe08a207bc items=0 ppid=2135 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.563000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 12:39:36.567000 audit[2285]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.567000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd2cf99b70 a2=0 a3=7ffd2cf99b5c items=0 ppid=2135 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 12:39:36.569000 audit[2286]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.569000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc86c44320 a2=0 a3=7ffc86c4430c items=0 ppid=2135 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 12:39:36.573000 audit[2288]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.573000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe585790b0 a2=0 a3=7ffe5857909c items=0 ppid=2135 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 12:39:36.580000 audit[2291]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 12:39:36.580000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe587a92b0 a2=0 a3=7ffe587a929c items=0 ppid=2135 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 12:39:36.586000 audit[2293]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 12:39:36.586000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffda5671690 a2=0 a3=7ffda567167c items=0 ppid=2135 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.586000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:39:36.587000 audit[2293]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 12:39:36.587000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffda5671690 a2=0 a3=7ffda567167c items=0 ppid=2135 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:36.587000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:39:37.042720 kubelet[1890]: E0209 12:39:37.042635 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:37.094148 kubelet[1890]: I0209 12:39:37.094075 1890 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-9lfq4" podStartSLOduration=3.540347466 podCreationTimestamp="2024-02-09 12:39:24 +0000 UTC" firstStartedPulling="2024-02-09 12:39:26.511038745 +0000 UTC m=+2.357998697" lastFinishedPulling="2024-02-09 12:39:36.064666791 +0000 UTC m=+11.911626740" observedRunningTime="2024-02-09 12:39:37.093497611 +0000 UTC m=+12.940457643" watchObservedRunningTime="2024-02-09 12:39:37.093975509 +0000 UTC m=+12.940935510" Feb 9 12:39:37.358380 kubelet[1890]: E0209 12:39:37.358202 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:38.358505 kubelet[1890]: E0209 12:39:38.358395 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:39.042792 kubelet[1890]: E0209 12:39:39.042690 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:39.359371 kubelet[1890]: E0209 12:39:39.359175 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:39.492229 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1067194124.mount: Deactivated successfully. Feb 9 12:39:40.359613 kubelet[1890]: E0209 12:39:40.359547 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:41.043566 kubelet[1890]: E0209 12:39:41.043499 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:41.360373 kubelet[1890]: E0209 12:39:41.360243 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:42.361122 kubelet[1890]: E0209 12:39:42.361018 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:43.043091 kubelet[1890]: E0209 12:39:43.042999 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:43.362016 kubelet[1890]: E0209 12:39:43.361802 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:44.350073 kubelet[1890]: E0209 12:39:44.350003 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:44.362559 kubelet[1890]: E0209 12:39:44.362496 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:44.730132 systemd[1]: Started sshd@9-139.178.90.255:22-92.114.19.110:36014.service. Feb 9 12:39:44.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.255:22-92.114.19.110:36014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:44.757687 kernel: kauditd_printk_skb: 230 callbacks suppressed Feb 9 12:39:44.757721 kernel: audit: type=1130 audit(1707482384.729:665): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.255:22-92.114.19.110:36014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:45.043437 kubelet[1890]: E0209 12:39:45.043270 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:45.363449 kubelet[1890]: E0209 12:39:45.363244 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:45.939829 sshd[2295]: Invalid user ukten from 92.114.19.110 port 36014 Feb 9 12:39:45.945873 sshd[2295]: pam_faillock(sshd:auth): User unknown Feb 9 12:39:45.946852 sshd[2295]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:39:45.946941 sshd[2295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.114.19.110 Feb 9 12:39:45.948042 sshd[2295]: pam_faillock(sshd:auth): User unknown Feb 9 12:39:45.947000 audit[2295]: USER_AUTH pid=2295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ukten" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:39:46.044818 kernel: audit: type=1100 audit(1707482385.947:666): pid=2295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ukten" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:39:46.364480 kubelet[1890]: E0209 12:39:46.364378 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:47.043121 kubelet[1890]: E0209 12:39:47.043053 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:47.365704 kubelet[1890]: E0209 12:39:47.365498 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:47.749120 sshd[2295]: Failed password for invalid user ukten from 92.114.19.110 port 36014 ssh2 Feb 9 12:39:48.365627 kubelet[1890]: E0209 12:39:48.365601 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:49.042813 kubelet[1890]: E0209 12:39:49.042722 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:49.366701 kubelet[1890]: E0209 12:39:49.366519 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:49.666795 sshd[2295]: Received disconnect from 92.114.19.110 port 36014:11: Bye Bye [preauth] Feb 9 12:39:49.666795 sshd[2295]: Disconnected from invalid user ukten 92.114.19.110 port 36014 [preauth] Feb 9 12:39:49.669164 systemd[1]: sshd@9-139.178.90.255:22-92.114.19.110:36014.service: Deactivated successfully. Feb 9 12:39:49.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.255:22-92.114.19.110:36014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:49.760947 kernel: audit: type=1131 audit(1707482389.668:667): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.255:22-92.114.19.110:36014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:50.367082 kubelet[1890]: E0209 12:39:50.367011 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:51.042953 kubelet[1890]: E0209 12:39:51.042893 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:51.367525 kubelet[1890]: E0209 12:39:51.367465 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:52.331170 env[1473]: time="2024-02-09T12:39:52.331132474Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:52.332056 env[1473]: time="2024-02-09T12:39:52.331976606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:52.333043 env[1473]: time="2024-02-09T12:39:52.332989848Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:52.334146 env[1473]: time="2024-02-09T12:39:52.334105301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:39:52.334538 env[1473]: time="2024-02-09T12:39:52.334488311Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 12:39:52.335626 env[1473]: time="2024-02-09T12:39:52.335580264Z" level=info msg="CreateContainer within sandbox \"dd8154281648043d40e2bdbf1b67ce9aa2292648b954c2cfcc2455010319302f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 12:39:52.340895 env[1473]: time="2024-02-09T12:39:52.340854235Z" level=info msg="CreateContainer within sandbox \"dd8154281648043d40e2bdbf1b67ce9aa2292648b954c2cfcc2455010319302f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a3120b1e1062422d1e38596d923d2f138053f99a0375a4f4a94194f20ad0f8b8\"" Feb 9 12:39:52.341086 env[1473]: time="2024-02-09T12:39:52.341046125Z" level=info msg="StartContainer for \"a3120b1e1062422d1e38596d923d2f138053f99a0375a4f4a94194f20ad0f8b8\"" Feb 9 12:39:52.362475 systemd[1]: Started cri-containerd-a3120b1e1062422d1e38596d923d2f138053f99a0375a4f4a94194f20ad0f8b8.scope. Feb 9 12:39:52.367741 kubelet[1890]: E0209 12:39:52.367698 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:52.369000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.369000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1989 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:52.530582 kernel: audit: type=1400 audit(1707482392.369:668): avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.530618 kernel: audit: type=1300 audit(1707482392.369:668): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1989 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:52.530633 kernel: audit: type=1327 audit(1707482392.369:668): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133313230623165313036323432326431653338353936643932336432 Feb 9 12:39:52.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133313230623165313036323432326431653338353936643932336432 Feb 9 12:39:52.623996 kernel: audit: type=1400 audit(1707482392.369:669): avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.369000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.687749 kernel: audit: type=1400 audit(1707482392.369:669): avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.369000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.369000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.815177 kernel: audit: type=1400 audit(1707482392.369:669): avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.815207 kernel: audit: type=1400 audit(1707482392.369:669): avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.369000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.369000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.945284 kernel: audit: type=1400 audit(1707482392.369:669): avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.945327 kernel: audit: type=1400 audit(1707482392.369:669): avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.369000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.948145 env[1473]: time="2024-02-09T12:39:52.948123588Z" level=info msg="StartContainer for \"a3120b1e1062422d1e38596d923d2f138053f99a0375a4f4a94194f20ad0f8b8\" returns successfully" Feb 9 12:39:53.009626 kernel: audit: type=1400 audit(1707482392.369:669): avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.369000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:53.042267 kubelet[1890]: E0209 12:39:53.042253 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:52.369000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.369000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.369000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.369000 audit: BPF prog-id=81 op=LOAD Feb 9 12:39:52.369000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002efc70 items=0 ppid=1989 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:52.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133313230623165313036323432326431653338353936643932336432 Feb 9 12:39:52.529000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.529000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.529000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.529000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.529000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.529000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.529000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.529000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.529000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.529000 audit: BPF prog-id=82 op=LOAD Feb 9 12:39:52.529000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002efcb8 items=0 ppid=1989 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:52.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133313230623165313036323432326431653338353936643932336432 Feb 9 12:39:52.686000 audit: BPF prog-id=82 op=UNLOAD Feb 9 12:39:52.686000 audit: BPF prog-id=81 op=UNLOAD Feb 9 12:39:52.686000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.686000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.686000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.686000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.686000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.686000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.686000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.686000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.686000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.686000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:39:52.686000 audit: BPF prog-id=83 op=LOAD Feb 9 12:39:52.686000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002efd48 items=0 ppid=1989 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:39:52.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133313230623165313036323432326431653338353936643932336432 Feb 9 12:39:53.367906 kubelet[1890]: E0209 12:39:53.367845 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:53.657515 env[1473]: time="2024-02-09T12:39:53.657211757Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 12:39:53.662992 systemd[1]: cri-containerd-a3120b1e1062422d1e38596d923d2f138053f99a0375a4f4a94194f20ad0f8b8.scope: Deactivated successfully. Feb 9 12:39:53.676078 kubelet[1890]: I0209 12:39:53.675994 1890 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 12:39:53.676000 audit: BPF prog-id=83 op=UNLOAD Feb 9 12:39:53.715256 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a3120b1e1062422d1e38596d923d2f138053f99a0375a4f4a94194f20ad0f8b8-rootfs.mount: Deactivated successfully. Feb 9 12:39:54.368943 kubelet[1890]: E0209 12:39:54.368842 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:54.413924 env[1473]: time="2024-02-09T12:39:54.413814734Z" level=info msg="shim disconnected" id=a3120b1e1062422d1e38596d923d2f138053f99a0375a4f4a94194f20ad0f8b8 Feb 9 12:39:54.413924 env[1473]: time="2024-02-09T12:39:54.413921675Z" level=warning msg="cleaning up after shim disconnected" id=a3120b1e1062422d1e38596d923d2f138053f99a0375a4f4a94194f20ad0f8b8 namespace=k8s.io Feb 9 12:39:54.414327 env[1473]: time="2024-02-09T12:39:54.413950994Z" level=info msg="cleaning up dead shim" Feb 9 12:39:54.426248 env[1473]: time="2024-02-09T12:39:54.426234683Z" level=warning msg="cleanup warnings time=\"2024-02-09T12:39:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2368 runtime=io.containerd.runc.v2\n" Feb 9 12:39:55.056029 systemd[1]: Created slice kubepods-besteffort-pod7db31f02_8920_4cff_9d23_8db5b7550166.slice. Feb 9 12:39:55.060975 env[1473]: time="2024-02-09T12:39:55.060845455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5hr4k,Uid:7db31f02-8920-4cff-9d23-8db5b7550166,Namespace:calico-system,Attempt:0,}" Feb 9 12:39:55.098635 env[1473]: time="2024-02-09T12:39:55.098595172Z" level=error msg="Failed to destroy network for sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:39:55.098822 env[1473]: time="2024-02-09T12:39:55.098804773Z" level=error msg="encountered an error cleaning up failed sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:39:55.098859 env[1473]: time="2024-02-09T12:39:55.098836696Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5hr4k,Uid:7db31f02-8920-4cff-9d23-8db5b7550166,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:39:55.099000 kubelet[1890]: E0209 12:39:55.098986 1890 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:39:55.099055 kubelet[1890]: E0209 12:39:55.099037 1890 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5hr4k" Feb 9 12:39:55.099094 kubelet[1890]: E0209 12:39:55.099060 1890 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5hr4k" Feb 9 12:39:55.099130 kubelet[1890]: E0209 12:39:55.099115 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5hr4k_calico-system(7db31f02-8920-4cff-9d23-8db5b7550166)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5hr4k_calico-system(7db31f02-8920-4cff-9d23-8db5b7550166)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:55.099534 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894-shm.mount: Deactivated successfully. Feb 9 12:39:55.129336 kubelet[1890]: I0209 12:39:55.129267 1890 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:39:55.129778 env[1473]: time="2024-02-09T12:39:55.129674870Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 12:39:55.130832 env[1473]: time="2024-02-09T12:39:55.130751154Z" level=info msg="StopPodSandbox for \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\"" Feb 9 12:39:55.177979 env[1473]: time="2024-02-09T12:39:55.177887808Z" level=error msg="StopPodSandbox for \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\" failed" error="failed to destroy network for sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:39:55.178222 kubelet[1890]: E0209 12:39:55.178156 1890 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:39:55.178312 kubelet[1890]: E0209 12:39:55.178241 1890 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894"} Feb 9 12:39:55.178312 kubelet[1890]: E0209 12:39:55.178280 1890 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7db31f02-8920-4cff-9d23-8db5b7550166\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:39:55.178312 kubelet[1890]: E0209 12:39:55.178309 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7db31f02-8920-4cff-9d23-8db5b7550166\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:39:55.369378 kubelet[1890]: E0209 12:39:55.369171 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:56.204607 systemd[1]: Started sshd@10-139.178.90.255:22-49.232.242.40:37806.service. Feb 9 12:39:56.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.255:22-49.232.242.40:37806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:39:56.330792 update_engine[1465]: I0209 12:39:56.330683 1465 update_attempter.cc:509] Updating boot flags... Feb 9 12:39:56.369296 kubelet[1890]: E0209 12:39:56.369255 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:57.246704 sshd[2454]: Invalid user hstudent from 49.232.242.40 port 37806 Feb 9 12:39:57.252725 sshd[2454]: pam_faillock(sshd:auth): User unknown Feb 9 12:39:57.253718 sshd[2454]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:39:57.253827 sshd[2454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.242.40 Feb 9 12:39:57.254715 sshd[2454]: pam_faillock(sshd:auth): User unknown Feb 9 12:39:57.254000 audit[2454]: USER_AUTH pid=2454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hstudent" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:39:57.369537 kubelet[1890]: E0209 12:39:57.369459 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:57.750522 kubelet[1890]: I0209 12:39:57.750421 1890 topology_manager.go:215] "Topology Admit Handler" podUID="47b8a95f-9169-4615-879e-9681ec65e3c9" podNamespace="default" podName="nginx-deployment-6d5f899847-hxjmc" Feb 9 12:39:57.763716 systemd[1]: Created slice kubepods-besteffort-pod47b8a95f_9169_4615_879e_9681ec65e3c9.slice. Feb 9 12:39:57.799630 kubelet[1890]: I0209 12:39:57.799573 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wpchn\" (UniqueName: \"kubernetes.io/projected/47b8a95f-9169-4615-879e-9681ec65e3c9-kube-api-access-wpchn\") pod \"nginx-deployment-6d5f899847-hxjmc\" (UID: \"47b8a95f-9169-4615-879e-9681ec65e3c9\") " pod="default/nginx-deployment-6d5f899847-hxjmc" Feb 9 12:39:58.066717 env[1473]: time="2024-02-09T12:39:58.066487238Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-hxjmc,Uid:47b8a95f-9169-4615-879e-9681ec65e3c9,Namespace:default,Attempt:0,}" Feb 9 12:39:58.112846 env[1473]: time="2024-02-09T12:39:58.112764114Z" level=error msg="Failed to destroy network for sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:39:58.112976 env[1473]: time="2024-02-09T12:39:58.112959928Z" level=error msg="encountered an error cleaning up failed sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:39:58.113029 env[1473]: time="2024-02-09T12:39:58.112989450Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-hxjmc,Uid:47b8a95f-9169-4615-879e-9681ec65e3c9,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:39:58.113178 kubelet[1890]: E0209 12:39:58.113165 1890 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:39:58.113226 kubelet[1890]: E0209 12:39:58.113203 1890 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-hxjmc" Feb 9 12:39:58.113226 kubelet[1890]: E0209 12:39:58.113219 1890 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-hxjmc" Feb 9 12:39:58.113288 kubelet[1890]: E0209 12:39:58.113255 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-hxjmc_default(47b8a95f-9169-4615-879e-9681ec65e3c9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-hxjmc_default(47b8a95f-9169-4615-879e-9681ec65e3c9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-hxjmc" podUID="47b8a95f-9169-4615-879e-9681ec65e3c9" Feb 9 12:39:58.113745 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58-shm.mount: Deactivated successfully. Feb 9 12:39:58.138791 kubelet[1890]: I0209 12:39:58.138685 1890 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:39:58.139783 env[1473]: time="2024-02-09T12:39:58.139690616Z" level=info msg="StopPodSandbox for \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\"" Feb 9 12:39:58.192150 env[1473]: time="2024-02-09T12:39:58.192080811Z" level=error msg="StopPodSandbox for \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\" failed" error="failed to destroy network for sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:39:58.192417 kubelet[1890]: E0209 12:39:58.192365 1890 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:39:58.192417 kubelet[1890]: E0209 12:39:58.192416 1890 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58"} Feb 9 12:39:58.192542 kubelet[1890]: E0209 12:39:58.192463 1890 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"47b8a95f-9169-4615-879e-9681ec65e3c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:39:58.192542 kubelet[1890]: E0209 12:39:58.192500 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"47b8a95f-9169-4615-879e-9681ec65e3c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-hxjmc" podUID="47b8a95f-9169-4615-879e-9681ec65e3c9" Feb 9 12:39:58.370140 kubelet[1890]: E0209 12:39:58.369931 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:39:59.035813 sshd[2454]: Failed password for invalid user hstudent from 49.232.242.40 port 37806 ssh2 Feb 9 12:39:59.371263 kubelet[1890]: E0209 12:39:59.371051 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:00.037781 sshd[2454]: Received disconnect from 49.232.242.40 port 37806:11: Bye Bye [preauth] Feb 9 12:40:00.037781 sshd[2454]: Disconnected from invalid user hstudent 49.232.242.40 port 37806 [preauth] Feb 9 12:40:00.040505 systemd[1]: sshd@10-139.178.90.255:22-49.232.242.40:37806.service: Deactivated successfully. Feb 9 12:40:00.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.255:22-49.232.242.40:37806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:00.069160 kernel: kauditd_printk_skb: 36 callbacks suppressed Feb 9 12:40:00.069229 kernel: audit: type=1131 audit(1707482400.040:677): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.255:22-49.232.242.40:37806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:00.372114 kubelet[1890]: E0209 12:40:00.371916 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:01.372967 kubelet[1890]: E0209 12:40:01.372867 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:02.373466 kubelet[1890]: E0209 12:40:02.373362 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:03.374505 kubelet[1890]: E0209 12:40:03.374451 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:04.350026 kubelet[1890]: E0209 12:40:04.349917 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:04.374917 kubelet[1890]: E0209 12:40:04.374813 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:05.375784 kubelet[1890]: E0209 12:40:05.375681 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:06.376050 kubelet[1890]: E0209 12:40:06.375941 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:07.044305 env[1473]: time="2024-02-09T12:40:07.044154904Z" level=info msg="StopPodSandbox for \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\"" Feb 9 12:40:07.070463 env[1473]: time="2024-02-09T12:40:07.070429306Z" level=error msg="StopPodSandbox for \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\" failed" error="failed to destroy network for sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:40:07.070625 kubelet[1890]: E0209 12:40:07.070615 1890 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:40:07.070656 kubelet[1890]: E0209 12:40:07.070642 1890 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894"} Feb 9 12:40:07.070676 kubelet[1890]: E0209 12:40:07.070663 1890 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7db31f02-8920-4cff-9d23-8db5b7550166\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:40:07.070717 kubelet[1890]: E0209 12:40:07.070682 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7db31f02-8920-4cff-9d23-8db5b7550166\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5hr4k" podUID="7db31f02-8920-4cff-9d23-8db5b7550166" Feb 9 12:40:07.376816 kubelet[1890]: E0209 12:40:07.376551 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:08.376905 kubelet[1890]: E0209 12:40:08.376801 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:09.377791 kubelet[1890]: E0209 12:40:09.377693 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:10.043115 env[1473]: time="2024-02-09T12:40:10.043050659Z" level=info msg="StopPodSandbox for \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\"" Feb 9 12:40:10.057257 env[1473]: time="2024-02-09T12:40:10.057191458Z" level=error msg="StopPodSandbox for \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\" failed" error="failed to destroy network for sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 12:40:10.057403 kubelet[1890]: E0209 12:40:10.057360 1890 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:40:10.057403 kubelet[1890]: E0209 12:40:10.057390 1890 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58"} Feb 9 12:40:10.057496 kubelet[1890]: E0209 12:40:10.057419 1890 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"47b8a95f-9169-4615-879e-9681ec65e3c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 12:40:10.057496 kubelet[1890]: E0209 12:40:10.057441 1890 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"47b8a95f-9169-4615-879e-9681ec65e3c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-hxjmc" podUID="47b8a95f-9169-4615-879e-9681ec65e3c9" Feb 9 12:40:10.379078 kubelet[1890]: E0209 12:40:10.378881 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:11.379267 kubelet[1890]: E0209 12:40:11.379224 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:12.380351 kubelet[1890]: E0209 12:40:12.380307 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:12.679027 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount877743090.mount: Deactivated successfully. Feb 9 12:40:12.722287 env[1473]: time="2024-02-09T12:40:12.722200182Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:40:12.723960 env[1473]: time="2024-02-09T12:40:12.723889537Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:40:12.726982 env[1473]: time="2024-02-09T12:40:12.726905130Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:40:12.729829 env[1473]: time="2024-02-09T12:40:12.729740242Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:40:12.731393 env[1473]: time="2024-02-09T12:40:12.731277781Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 12:40:12.743206 env[1473]: time="2024-02-09T12:40:12.743189012Z" level=info msg="CreateContainer within sandbox \"dd8154281648043d40e2bdbf1b67ce9aa2292648b954c2cfcc2455010319302f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 12:40:12.749487 env[1473]: time="2024-02-09T12:40:12.749466809Z" level=info msg="CreateContainer within sandbox \"dd8154281648043d40e2bdbf1b67ce9aa2292648b954c2cfcc2455010319302f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1d82dd8772c18e0a6efb182fa0f75f979d3d19a5ace102d80a0e645f54ebf15d\"" Feb 9 12:40:12.749731 env[1473]: time="2024-02-09T12:40:12.749716771Z" level=info msg="StartContainer for \"1d82dd8772c18e0a6efb182fa0f75f979d3d19a5ace102d80a0e645f54ebf15d\"" Feb 9 12:40:12.770138 systemd[1]: Started cri-containerd-1d82dd8772c18e0a6efb182fa0f75f979d3d19a5ace102d80a0e645f54ebf15d.scope. Feb 9 12:40:12.778000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.778000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1989 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:12.940878 kernel: audit: type=1400 audit(1707482412.778:678): avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.940959 kernel: audit: type=1300 audit(1707482412.778:678): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1989 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:12.940981 kernel: audit: type=1327 audit(1707482412.778:678): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383264643837373263313865306136656662313832666130663735 Feb 9 12:40:12.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383264643837373263313865306136656662313832666130663735 Feb 9 12:40:12.778000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.099502 kernel: audit: type=1400 audit(1707482412.778:679): avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.099535 kernel: audit: type=1400 audit(1707482412.778:679): avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.778000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.163200 kernel: audit: type=1400 audit(1707482412.778:679): avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.778000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.227070 kernel: audit: type=1400 audit(1707482412.778:679): avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.778000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.778000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.355496 kernel: audit: type=1400 audit(1707482412.778:679): avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.355537 kernel: audit: type=1400 audit(1707482412.778:679): avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.778000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.380655 kubelet[1890]: E0209 12:40:13.380608 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:13.419742 kernel: audit: type=1400 audit(1707482412.778:679): avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.778000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.422712 env[1473]: time="2024-02-09T12:40:13.422693795Z" level=info msg="StartContainer for \"1d82dd8772c18e0a6efb182fa0f75f979d3d19a5ace102d80a0e645f54ebf15d\" returns successfully" Feb 9 12:40:12.778000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.778000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.778000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.778000 audit: BPF prog-id=84 op=LOAD Feb 9 12:40:12.778000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000380430 items=0 ppid=1989 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:12.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383264643837373263313865306136656662313832666130663735 Feb 9 12:40:12.940000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.940000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.940000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.940000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.940000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.940000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.940000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.940000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.940000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:12.940000 audit: BPF prog-id=85 op=LOAD Feb 9 12:40:12.940000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000380478 items=0 ppid=1989 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:12.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383264643837373263313865306136656662313832666130663735 Feb 9 12:40:13.098000 audit: BPF prog-id=85 op=UNLOAD Feb 9 12:40:13.098000 audit: BPF prog-id=84 op=UNLOAD Feb 9 12:40:13.098000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.098000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.098000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.098000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.098000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.098000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.098000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.098000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.098000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.098000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:13.098000 audit: BPF prog-id=86 op=LOAD Feb 9 12:40:13.098000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000380508 items=0 ppid=1989 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:13.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164383264643837373263313865306136656662313832666130663735 Feb 9 12:40:13.585333 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 12:40:13.585364 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 12:40:14.186274 kubelet[1890]: I0209 12:40:14.186229 1890 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-tdxtq" podStartSLOduration=3.963832585 podCreationTimestamp="2024-02-09 12:39:24 +0000 UTC" firstStartedPulling="2024-02-09 12:39:26.509363951 +0000 UTC m=+2.356323901" lastFinishedPulling="2024-02-09 12:40:12.731718329 +0000 UTC m=+48.578678323" observedRunningTime="2024-02-09 12:40:14.185946247 +0000 UTC m=+50.032906197" watchObservedRunningTime="2024-02-09 12:40:14.186187007 +0000 UTC m=+50.033146957" Feb 9 12:40:14.380970 kubelet[1890]: E0209 12:40:14.380860 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:15.382156 kubelet[1890]: E0209 12:40:15.382042 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:15.686000 audit[2790]: AVC avc: denied { write } for pid=2790 comm="tee" name="fd" dev="proc" ino=34003 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:40:15.686000 audit[2790]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0ad7696e a2=241 a3=1b6 items=1 ppid=2754 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:15.686000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 12:40:15.686000 audit: PATH item=0 name="/dev/fd/63" inode=34000 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:40:15.686000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:40:15.686000 audit[2797]: AVC avc: denied { write } for pid=2797 comm="tee" name="fd" dev="proc" ino=26331 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:40:15.686000 audit[2799]: AVC avc: denied { write } for pid=2799 comm="tee" name="fd" dev="proc" ino=33111 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:40:15.686000 audit[2797]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5a774980 a2=241 a3=1b6 items=1 ppid=2753 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:15.686000 audit[2787]: AVC avc: denied { write } for pid=2787 comm="tee" name="fd" dev="proc" ino=28906 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:40:15.686000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 12:40:15.686000 audit: PATH item=0 name="/dev/fd/63" inode=26328 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:40:15.686000 audit[2799]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc7c9997f a2=241 a3=1b6 items=1 ppid=2759 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:15.686000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:40:15.686000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 12:40:15.686000 audit: PATH item=0 name="/dev/fd/63" inode=33108 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:40:15.686000 audit[2787]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe66c6196f a2=241 a3=1b6 items=1 ppid=2755 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:15.686000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:40:15.686000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 12:40:15.686000 audit: PATH item=0 name="/dev/fd/63" inode=30029 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:40:15.686000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:40:15.686000 audit[2788]: AVC avc: denied { write } for pid=2788 comm="tee" name="fd" dev="proc" ino=14923 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:40:15.686000 audit[2788]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1d50e97e a2=241 a3=1b6 items=1 ppid=2756 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:15.686000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 12:40:15.686000 audit: PATH item=0 name="/dev/fd/63" inode=28903 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:40:15.686000 audit[2798]: AVC avc: denied { write } for pid=2798 comm="tee" name="fd" dev="proc" ino=18267 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:40:15.686000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:40:15.686000 audit[2798]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffda92e97e a2=241 a3=1b6 items=1 ppid=2752 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:15.686000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 12:40:15.686000 audit: PATH item=0 name="/dev/fd/63" inode=18264 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:40:15.686000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:40:15.687000 audit[2793]: AVC avc: denied { write } for pid=2793 comm="tee" name="fd" dev="proc" ino=30032 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 12:40:15.687000 audit[2793]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcfe16697e a2=241 a3=1b6 items=1 ppid=2757 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:15.687000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 12:40:15.687000 audit: PATH item=0 name="/dev/fd/63" inode=31964 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 12:40:15.687000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 12:40:15.774772 kernel: Initializing XFRM netlink socket Feb 9 12:40:16.383188 kubelet[1890]: E0209 12:40:16.383113 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:17.383703 kubelet[1890]: E0209 12:40:17.383592 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:18.383877 kubelet[1890]: E0209 12:40:18.383766 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:19.384879 kubelet[1890]: E0209 12:40:19.384776 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:20.385871 kubelet[1890]: E0209 12:40:20.385763 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:21.043679 env[1473]: time="2024-02-09T12:40:21.043590852Z" level=info msg="StopPodSandbox for \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\"" Feb 9 12:40:21.137955 env[1473]: 2024-02-09 12:40:21.105 [INFO][2922] k8s.go 578: Cleaning up netns ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:40:21.137955 env[1473]: 2024-02-09 12:40:21.105 [INFO][2922] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" iface="eth0" netns="/var/run/netns/cni-e280538f-889a-798e-3de3-bd1a251310eb" Feb 9 12:40:21.137955 env[1473]: 2024-02-09 12:40:21.106 [INFO][2922] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" iface="eth0" netns="/var/run/netns/cni-e280538f-889a-798e-3de3-bd1a251310eb" Feb 9 12:40:21.137955 env[1473]: 2024-02-09 12:40:21.106 [INFO][2922] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" iface="eth0" netns="/var/run/netns/cni-e280538f-889a-798e-3de3-bd1a251310eb" Feb 9 12:40:21.137955 env[1473]: 2024-02-09 12:40:21.106 [INFO][2922] k8s.go 585: Releasing IP address(es) ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:40:21.137955 env[1473]: 2024-02-09 12:40:21.106 [INFO][2922] utils.go 188: Calico CNI releasing IP address ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:40:21.137955 env[1473]: 2024-02-09 12:40:21.121 [INFO][2936] ipam_plugin.go 415: Releasing address using handleID ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" HandleID="k8s-pod-network.1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Workload="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:21.137955 env[1473]: 2024-02-09 12:40:21.121 [INFO][2936] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:40:21.137955 env[1473]: 2024-02-09 12:40:21.121 [INFO][2936] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:40:21.137955 env[1473]: 2024-02-09 12:40:21.133 [WARNING][2936] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" HandleID="k8s-pod-network.1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Workload="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:21.137955 env[1473]: 2024-02-09 12:40:21.133 [INFO][2936] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" HandleID="k8s-pod-network.1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Workload="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:21.137955 env[1473]: 2024-02-09 12:40:21.136 [INFO][2936] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:40:21.137955 env[1473]: 2024-02-09 12:40:21.137 [INFO][2922] k8s.go 591: Teardown processing complete. ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:40:21.138351 env[1473]: time="2024-02-09T12:40:21.138064630Z" level=info msg="TearDown network for sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\" successfully" Feb 9 12:40:21.138351 env[1473]: time="2024-02-09T12:40:21.138088053Z" level=info msg="StopPodSandbox for \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\" returns successfully" Feb 9 12:40:21.138618 env[1473]: time="2024-02-09T12:40:21.138600302Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5hr4k,Uid:7db31f02-8920-4cff-9d23-8db5b7550166,Namespace:calico-system,Attempt:1,}" Feb 9 12:40:21.139365 systemd[1]: run-netns-cni\x2de280538f\x2d889a\x2d798e\x2d3de3\x2dbd1a251310eb.mount: Deactivated successfully. Feb 9 12:40:21.291709 systemd-networkd[1310]: calife3ad14651a: Link UP Feb 9 12:40:21.348615 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 12:40:21.348657 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calife3ad14651a: link becomes ready Feb 9 12:40:21.348663 systemd-networkd[1310]: calife3ad14651a: Gained carrier Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.172 [INFO][2951] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.17-k8s-csi--node--driver--5hr4k-eth0 csi-node-driver- calico-system 7db31f02-8920-4cff-9d23-8db5b7550166 1673 0 2024-02-09 12:39:24 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.17 csi-node-driver-5hr4k eth0 default [] [] [kns.calico-system ksa.calico-system.default] calife3ad14651a [] []}} ContainerID="2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" Namespace="calico-system" Pod="csi-node-driver-5hr4k" WorkloadEndpoint="10.67.80.17-k8s-csi--node--driver--5hr4k-" Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.173 [INFO][2951] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" Namespace="calico-system" Pod="csi-node-driver-5hr4k" WorkloadEndpoint="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.201 [INFO][2973] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" HandleID="k8s-pod-network.2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" Workload="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.224 [INFO][2973] ipam_plugin.go 268: Auto assigning IP ContainerID="2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" HandleID="k8s-pod-network.2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" Workload="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b9c80), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.80.17", "pod":"csi-node-driver-5hr4k", "timestamp":"2024-02-09 12:40:21.201960724 +0000 UTC"}, Hostname:"10.67.80.17", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.224 [INFO][2973] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.224 [INFO][2973] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.224 [INFO][2973] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.17' Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.228 [INFO][2973] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" host="10.67.80.17" Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.235 [INFO][2973] ipam.go 372: Looking up existing affinities for host host="10.67.80.17" Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.243 [INFO][2973] ipam.go 489: Trying affinity for 192.168.21.128/26 host="10.67.80.17" Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.246 [INFO][2973] ipam.go 155: Attempting to load block cidr=192.168.21.128/26 host="10.67.80.17" Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.251 [INFO][2973] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.128/26 host="10.67.80.17" Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.251 [INFO][2973] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.128/26 handle="k8s-pod-network.2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" host="10.67.80.17" Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.254 [INFO][2973] ipam.go 1682: Creating new handle: k8s-pod-network.2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.260 [INFO][2973] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.128/26 handle="k8s-pod-network.2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" host="10.67.80.17" Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.268 [INFO][2973] ipam.go 1216: Successfully claimed IPs: [192.168.21.129/26] block=192.168.21.128/26 handle="k8s-pod-network.2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" host="10.67.80.17" Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.268 [INFO][2973] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.129/26] handle="k8s-pod-network.2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" host="10.67.80.17" Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.268 [INFO][2973] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:40:21.361301 env[1473]: 2024-02-09 12:40:21.269 [INFO][2973] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.129/26] IPv6=[] ContainerID="2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" HandleID="k8s-pod-network.2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" Workload="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:21.362373 env[1473]: 2024-02-09 12:40:21.276 [INFO][2951] k8s.go 385: Populated endpoint ContainerID="2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" Namespace="calico-system" Pod="csi-node-driver-5hr4k" WorkloadEndpoint="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.17-k8s-csi--node--driver--5hr4k-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7db31f02-8920-4cff-9d23-8db5b7550166", ResourceVersion:"1673", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 39, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.17", ContainerID:"", Pod:"csi-node-driver-5hr4k", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calife3ad14651a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:40:21.362373 env[1473]: 2024-02-09 12:40:21.276 [INFO][2951] k8s.go 386: Calico CNI using IPs: [192.168.21.129/32] ContainerID="2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" Namespace="calico-system" Pod="csi-node-driver-5hr4k" WorkloadEndpoint="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:21.362373 env[1473]: 2024-02-09 12:40:21.276 [INFO][2951] dataplane_linux.go 68: Setting the host side veth name to calife3ad14651a ContainerID="2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" Namespace="calico-system" Pod="csi-node-driver-5hr4k" WorkloadEndpoint="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:21.362373 env[1473]: 2024-02-09 12:40:21.348 [INFO][2951] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" Namespace="calico-system" Pod="csi-node-driver-5hr4k" WorkloadEndpoint="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:21.362373 env[1473]: 2024-02-09 12:40:21.348 [INFO][2951] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" Namespace="calico-system" Pod="csi-node-driver-5hr4k" WorkloadEndpoint="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.17-k8s-csi--node--driver--5hr4k-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7db31f02-8920-4cff-9d23-8db5b7550166", ResourceVersion:"1673", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 39, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.17", ContainerID:"2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b", Pod:"csi-node-driver-5hr4k", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calife3ad14651a", MAC:"6e:03:ff:3b:3e:1b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:40:21.362373 env[1473]: 2024-02-09 12:40:21.359 [INFO][2951] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b" Namespace="calico-system" Pod="csi-node-driver-5hr4k" WorkloadEndpoint="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:21.374547 env[1473]: time="2024-02-09T12:40:21.374427933Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:40:21.374547 env[1473]: time="2024-02-09T12:40:21.374481257Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:40:21.374547 env[1473]: time="2024-02-09T12:40:21.374501350Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:40:21.374802 env[1473]: time="2024-02-09T12:40:21.374692686Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b pid=3011 runtime=io.containerd.runc.v2 Feb 9 12:40:21.385957 kubelet[1890]: E0209 12:40:21.385897 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:21.403345 systemd[1]: Started cri-containerd-2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b.scope. Feb 9 12:40:21.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.442752 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 12:40:21.442803 kernel: audit: type=1400 audit(1707482421.413:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.506537 systemd[1]: Started sshd@11-139.178.90.255:22-43.134.226.170:55174.service. Feb 9 12:40:21.566146 kernel: audit: type=1400 audit(1707482421.413:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.566175 kernel: audit: type=1400 audit(1707482421.413:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.689967 kernel: audit: type=1400 audit(1707482421.413:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.689997 kernel: audit: type=1400 audit(1707482421.413:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.751992 kernel: audit: type=1400 audit(1707482421.414:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.814044 kernel: audit: type=1400 audit(1707482421.414:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.876100 kernel: audit: type=1400 audit(1707482421.414:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.938182 kernel: audit: type=1400 audit(1707482421.414:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:22.000105 kernel: audit: type=1400 audit(1707482421.503:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.503000 audit: BPF prog-id=87 op=LOAD Feb 9 12:40:21.503000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.503000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3011 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:21.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261396432336363323334643030646336636438363635313065326366 Feb 9 12:40:21.503000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.503000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3011 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:21.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261396432336363323334643030646336636438363635313065326366 Feb 9 12:40:21.503000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.503000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.503000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.503000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.503000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.503000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.503000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.503000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.503000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.255:22-43.134.226.170:55174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:21.503000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.503000 audit: BPF prog-id=88 op=LOAD Feb 9 12:40:21.503000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000b9560 items=0 ppid=3011 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:21.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261396432336363323334643030646336636438363635313065326366 Feb 9 12:40:21.627000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.627000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.627000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.627000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.627000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.627000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.627000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.627000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.627000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.627000 audit: BPF prog-id=89 op=LOAD Feb 9 12:40:21.627000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000b95a8 items=0 ppid=3011 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:21.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261396432336363323334643030646336636438363635313065326366 Feb 9 12:40:21.751000 audit: BPF prog-id=89 op=UNLOAD Feb 9 12:40:21.751000 audit: BPF prog-id=88 op=UNLOAD Feb 9 12:40:21.751000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.751000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.751000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.751000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.751000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.751000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.751000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.751000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.751000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.751000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:21.751000 audit: BPF prog-id=90 op=LOAD Feb 9 12:40:21.751000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000b99b8 items=0 ppid=3011 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:21.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261396432336363323334643030646336636438363635313065326366 Feb 9 12:40:22.078610 env[1473]: time="2024-02-09T12:40:22.078563232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5hr4k,Uid:7db31f02-8920-4cff-9d23-8db5b7550166,Namespace:calico-system,Attempt:1,} returns sandbox id \"2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b\"" Feb 9 12:40:22.079288 env[1473]: time="2024-02-09T12:40:22.079274156Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 12:40:22.386822 kubelet[1890]: E0209 12:40:22.386590 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:22.543172 sshd[3039]: Invalid user pemi from 43.134.226.170 port 55174 Feb 9 12:40:22.549533 sshd[3039]: pam_faillock(sshd:auth): User unknown Feb 9 12:40:22.550532 sshd[3039]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:40:22.550622 sshd[3039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.226.170 Feb 9 12:40:22.551603 sshd[3039]: pam_faillock(sshd:auth): User unknown Feb 9 12:40:22.551000 audit[3039]: USER_AUTH pid=3039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pemi" exe="/usr/sbin/sshd" hostname=43.134.226.170 addr=43.134.226.170 terminal=ssh res=failed' Feb 9 12:40:23.387267 kubelet[1890]: E0209 12:40:23.387151 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:23.387999 systemd-networkd[1310]: calife3ad14651a: Gained IPv6LL Feb 9 12:40:24.350187 kubelet[1890]: E0209 12:40:24.350122 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:24.355088 env[1473]: time="2024-02-09T12:40:24.355006030Z" level=info msg="StopPodSandbox for \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\"" Feb 9 12:40:24.387358 kubelet[1890]: E0209 12:40:24.387299 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:24.408439 env[1473]: 2024-02-09 12:40:24.387 [WARNING][3068] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.17-k8s-csi--node--driver--5hr4k-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7db31f02-8920-4cff-9d23-8db5b7550166", ResourceVersion:"1677", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 39, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.17", ContainerID:"2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b", Pod:"csi-node-driver-5hr4k", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calife3ad14651a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:40:24.408439 env[1473]: 2024-02-09 12:40:24.388 [INFO][3068] k8s.go 578: Cleaning up netns ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:40:24.408439 env[1473]: 2024-02-09 12:40:24.388 [INFO][3068] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" iface="eth0" netns="" Feb 9 12:40:24.408439 env[1473]: 2024-02-09 12:40:24.388 [INFO][3068] k8s.go 585: Releasing IP address(es) ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:40:24.408439 env[1473]: 2024-02-09 12:40:24.388 [INFO][3068] utils.go 188: Calico CNI releasing IP address ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:40:24.408439 env[1473]: 2024-02-09 12:40:24.399 [INFO][3082] ipam_plugin.go 415: Releasing address using handleID ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" HandleID="k8s-pod-network.1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Workload="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:24.408439 env[1473]: 2024-02-09 12:40:24.399 [INFO][3082] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:40:24.408439 env[1473]: 2024-02-09 12:40:24.399 [INFO][3082] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:40:24.408439 env[1473]: 2024-02-09 12:40:24.405 [WARNING][3082] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" HandleID="k8s-pod-network.1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Workload="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:24.408439 env[1473]: 2024-02-09 12:40:24.405 [INFO][3082] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" HandleID="k8s-pod-network.1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Workload="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:24.408439 env[1473]: 2024-02-09 12:40:24.406 [INFO][3082] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:40:24.408439 env[1473]: 2024-02-09 12:40:24.407 [INFO][3068] k8s.go 591: Teardown processing complete. ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:40:24.408439 env[1473]: time="2024-02-09T12:40:24.408424633Z" level=info msg="TearDown network for sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\" successfully" Feb 9 12:40:24.409011 env[1473]: time="2024-02-09T12:40:24.408452310Z" level=info msg="StopPodSandbox for \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\" returns successfully" Feb 9 12:40:24.409011 env[1473]: time="2024-02-09T12:40:24.408886053Z" level=info msg="RemovePodSandbox for \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\"" Feb 9 12:40:24.409011 env[1473]: time="2024-02-09T12:40:24.408922825Z" level=info msg="Forcibly stopping sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\"" Feb 9 12:40:24.431806 sshd[3039]: Failed password for invalid user pemi from 43.134.226.170 port 55174 ssh2 Feb 9 12:40:24.698594 env[1473]: 2024-02-09 12:40:24.433 [WARNING][3111] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.17-k8s-csi--node--driver--5hr4k-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7db31f02-8920-4cff-9d23-8db5b7550166", ResourceVersion:"1677", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 39, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.17", ContainerID:"2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b", Pod:"csi-node-driver-5hr4k", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calife3ad14651a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:40:24.698594 env[1473]: 2024-02-09 12:40:24.433 [INFO][3111] k8s.go 578: Cleaning up netns ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:40:24.698594 env[1473]: 2024-02-09 12:40:24.433 [INFO][3111] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" iface="eth0" netns="" Feb 9 12:40:24.698594 env[1473]: 2024-02-09 12:40:24.433 [INFO][3111] k8s.go 585: Releasing IP address(es) ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:40:24.698594 env[1473]: 2024-02-09 12:40:24.433 [INFO][3111] utils.go 188: Calico CNI releasing IP address ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:40:24.698594 env[1473]: 2024-02-09 12:40:24.444 [INFO][3128] ipam_plugin.go 415: Releasing address using handleID ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" HandleID="k8s-pod-network.1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Workload="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:24.698594 env[1473]: 2024-02-09 12:40:24.444 [INFO][3128] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:40:24.698594 env[1473]: 2024-02-09 12:40:24.444 [INFO][3128] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:40:24.698594 env[1473]: 2024-02-09 12:40:24.601 [WARNING][3128] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" HandleID="k8s-pod-network.1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Workload="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:24.698594 env[1473]: 2024-02-09 12:40:24.601 [INFO][3128] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" HandleID="k8s-pod-network.1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Workload="10.67.80.17-k8s-csi--node--driver--5hr4k-eth0" Feb 9 12:40:24.698594 env[1473]: 2024-02-09 12:40:24.693 [INFO][3128] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:40:24.698594 env[1473]: 2024-02-09 12:40:24.696 [INFO][3111] k8s.go 591: Teardown processing complete. ContainerID="1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894" Feb 9 12:40:24.698594 env[1473]: time="2024-02-09T12:40:24.698553416Z" level=info msg="TearDown network for sandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\" successfully" Feb 9 12:40:24.715812 env[1473]: time="2024-02-09T12:40:24.715718807Z" level=info msg="RemovePodSandbox \"1ac26ad9d3cf1695bbc274dd89c6021a0d2b9a2b89120fef0ed4e013e3574894\" returns successfully" Feb 9 12:40:24.930172 sshd[3039]: Received disconnect from 43.134.226.170 port 55174:11: Bye Bye [preauth] Feb 9 12:40:24.930172 sshd[3039]: Disconnected from invalid user pemi 43.134.226.170 port 55174 [preauth] Feb 9 12:40:24.932792 systemd[1]: sshd@11-139.178.90.255:22-43.134.226.170:55174.service: Deactivated successfully. Feb 9 12:40:24.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.255:22-43.134.226.170:55174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:25.044026 env[1473]: time="2024-02-09T12:40:25.043903358Z" level=info msg="StopPodSandbox for \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\"" Feb 9 12:40:25.114200 env[1473]: 2024-02-09 12:40:25.080 [INFO][3162] k8s.go 578: Cleaning up netns ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:40:25.114200 env[1473]: 2024-02-09 12:40:25.080 [INFO][3162] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" iface="eth0" netns="/var/run/netns/cni-2347a111-4b88-5469-5a33-3485f452bf35" Feb 9 12:40:25.114200 env[1473]: 2024-02-09 12:40:25.080 [INFO][3162] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" iface="eth0" netns="/var/run/netns/cni-2347a111-4b88-5469-5a33-3485f452bf35" Feb 9 12:40:25.114200 env[1473]: 2024-02-09 12:40:25.081 [INFO][3162] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" iface="eth0" netns="/var/run/netns/cni-2347a111-4b88-5469-5a33-3485f452bf35" Feb 9 12:40:25.114200 env[1473]: 2024-02-09 12:40:25.081 [INFO][3162] k8s.go 585: Releasing IP address(es) ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:40:25.114200 env[1473]: 2024-02-09 12:40:25.081 [INFO][3162] utils.go 188: Calico CNI releasing IP address ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:40:25.114200 env[1473]: 2024-02-09 12:40:25.091 [INFO][3177] ipam_plugin.go 415: Releasing address using handleID ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" HandleID="k8s-pod-network.ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Workload="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:40:25.114200 env[1473]: 2024-02-09 12:40:25.091 [INFO][3177] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:40:25.114200 env[1473]: 2024-02-09 12:40:25.091 [INFO][3177] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:40:25.114200 env[1473]: 2024-02-09 12:40:25.104 [WARNING][3177] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" HandleID="k8s-pod-network.ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Workload="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:40:25.114200 env[1473]: 2024-02-09 12:40:25.104 [INFO][3177] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" HandleID="k8s-pod-network.ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Workload="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:40:25.114200 env[1473]: 2024-02-09 12:40:25.108 [INFO][3177] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:40:25.114200 env[1473]: 2024-02-09 12:40:25.111 [INFO][3162] k8s.go 591: Teardown processing complete. ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:40:25.115780 env[1473]: time="2024-02-09T12:40:25.114522751Z" level=info msg="TearDown network for sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\" successfully" Feb 9 12:40:25.115780 env[1473]: time="2024-02-09T12:40:25.114607910Z" level=info msg="StopPodSandbox for \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\" returns successfully" Feb 9 12:40:25.116037 env[1473]: time="2024-02-09T12:40:25.115906819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-hxjmc,Uid:47b8a95f-9169-4615-879e-9681ec65e3c9,Namespace:default,Attempt:1,}" Feb 9 12:40:25.119496 systemd[1]: run-netns-cni\x2d2347a111\x2d4b88\x2d5469\x2d5a33\x2d3485f452bf35.mount: Deactivated successfully. Feb 9 12:40:25.259396 systemd-networkd[1310]: cali64d20d9894e: Link UP Feb 9 12:40:25.327824 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 12:40:25.327868 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali64d20d9894e: link becomes ready Feb 9 12:40:25.327929 systemd-networkd[1310]: cali64d20d9894e: Gained carrier Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.153 [INFO][3193] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0 nginx-deployment-6d5f899847- default 47b8a95f-9169-4615-879e-9681ec65e3c9 1688 0 2024-02-09 12:39:57 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.17 nginx-deployment-6d5f899847-hxjmc eth0 default [] [] [kns.default ksa.default.default] cali64d20d9894e [] []}} ContainerID="b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" Namespace="default" Pod="nginx-deployment-6d5f899847-hxjmc" WorkloadEndpoint="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-" Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.153 [INFO][3193] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" Namespace="default" Pod="nginx-deployment-6d5f899847-hxjmc" WorkloadEndpoint="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.183 [INFO][3211] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" HandleID="k8s-pod-network.b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" Workload="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.198 [INFO][3211] ipam_plugin.go 268: Auto assigning IP ContainerID="b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" HandleID="k8s-pod-network.b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" Workload="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00032bc90), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.17", "pod":"nginx-deployment-6d5f899847-hxjmc", "timestamp":"2024-02-09 12:40:25.183962603 +0000 UTC"}, Hostname:"10.67.80.17", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.198 [INFO][3211] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.198 [INFO][3211] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.198 [INFO][3211] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.17' Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.201 [INFO][3211] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" host="10.67.80.17" Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.210 [INFO][3211] ipam.go 372: Looking up existing affinities for host host="10.67.80.17" Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.220 [INFO][3211] ipam.go 489: Trying affinity for 192.168.21.128/26 host="10.67.80.17" Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.224 [INFO][3211] ipam.go 155: Attempting to load block cidr=192.168.21.128/26 host="10.67.80.17" Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.229 [INFO][3211] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.128/26 host="10.67.80.17" Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.230 [INFO][3211] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.128/26 handle="k8s-pod-network.b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" host="10.67.80.17" Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.233 [INFO][3211] ipam.go 1682: Creating new handle: k8s-pod-network.b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580 Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.241 [INFO][3211] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.128/26 handle="k8s-pod-network.b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" host="10.67.80.17" Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.252 [INFO][3211] ipam.go 1216: Successfully claimed IPs: [192.168.21.130/26] block=192.168.21.128/26 handle="k8s-pod-network.b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" host="10.67.80.17" Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.252 [INFO][3211] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.130/26] handle="k8s-pod-network.b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" host="10.67.80.17" Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.252 [INFO][3211] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:40:25.337951 env[1473]: 2024-02-09 12:40:25.252 [INFO][3211] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.130/26] IPv6=[] ContainerID="b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" HandleID="k8s-pod-network.b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" Workload="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:40:25.339019 env[1473]: 2024-02-09 12:40:25.256 [INFO][3193] k8s.go 385: Populated endpoint ContainerID="b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" Namespace="default" Pod="nginx-deployment-6d5f899847-hxjmc" WorkloadEndpoint="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"47b8a95f-9169-4615-879e-9681ec65e3c9", ResourceVersion:"1688", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 39, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.17", ContainerID:"", Pod:"nginx-deployment-6d5f899847-hxjmc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali64d20d9894e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:40:25.339019 env[1473]: 2024-02-09 12:40:25.256 [INFO][3193] k8s.go 386: Calico CNI using IPs: [192.168.21.130/32] ContainerID="b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" Namespace="default" Pod="nginx-deployment-6d5f899847-hxjmc" WorkloadEndpoint="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:40:25.339019 env[1473]: 2024-02-09 12:40:25.256 [INFO][3193] dataplane_linux.go 68: Setting the host side veth name to cali64d20d9894e ContainerID="b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" Namespace="default" Pod="nginx-deployment-6d5f899847-hxjmc" WorkloadEndpoint="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:40:25.339019 env[1473]: 2024-02-09 12:40:25.327 [INFO][3193] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" Namespace="default" Pod="nginx-deployment-6d5f899847-hxjmc" WorkloadEndpoint="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:40:25.339019 env[1473]: 2024-02-09 12:40:25.328 [INFO][3193] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" Namespace="default" Pod="nginx-deployment-6d5f899847-hxjmc" WorkloadEndpoint="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"47b8a95f-9169-4615-879e-9681ec65e3c9", ResourceVersion:"1688", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 39, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.17", ContainerID:"b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580", Pod:"nginx-deployment-6d5f899847-hxjmc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali64d20d9894e", MAC:"22:b2:7f:de:8c:97", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:40:25.339019 env[1473]: 2024-02-09 12:40:25.336 [INFO][3193] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580" Namespace="default" Pod="nginx-deployment-6d5f899847-hxjmc" WorkloadEndpoint="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:40:25.350464 env[1473]: time="2024-02-09T12:40:25.350390161Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:40:25.350464 env[1473]: time="2024-02-09T12:40:25.350426499Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:40:25.350464 env[1473]: time="2024-02-09T12:40:25.350441945Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:40:25.350648 env[1473]: time="2024-02-09T12:40:25.350568927Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580 pid=3249 runtime=io.containerd.runc.v2 Feb 9 12:40:25.373268 systemd[1]: Started cri-containerd-b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580.scope. Feb 9 12:40:25.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit: BPF prog-id=91 op=LOAD Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3249 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:25.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230336466366530643133386235626164386231336433656238346539 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3249 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:25.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230336466366530643133386235626164386231336433656238346539 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit: BPF prog-id=92 op=LOAD Feb 9 12:40:25.381000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000236860 items=0 ppid=3249 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:25.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230336466366530643133386235626164386231336433656238346539 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.381000 audit: BPF prog-id=93 op=LOAD Feb 9 12:40:25.381000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002368a8 items=0 ppid=3249 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:25.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230336466366530643133386235626164386231336433656238346539 Feb 9 12:40:25.381000 audit: BPF prog-id=93 op=UNLOAD Feb 9 12:40:25.382000 audit: BPF prog-id=92 op=UNLOAD Feb 9 12:40:25.382000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.382000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.382000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.382000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.382000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.382000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.382000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.382000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.382000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.382000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:25.382000 audit: BPF prog-id=94 op=LOAD Feb 9 12:40:25.382000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000236cb8 items=0 ppid=3249 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:25.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230336466366530643133386235626164386231336433656238346539 Feb 9 12:40:25.388125 kubelet[1890]: E0209 12:40:25.388074 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:25.431024 env[1473]: time="2024-02-09T12:40:25.430928678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-hxjmc,Uid:47b8a95f-9169-4615-879e-9681ec65e3c9,Namespace:default,Attempt:1,} returns sandbox id \"b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580\"" Feb 9 12:40:26.389050 kubelet[1890]: E0209 12:40:26.388976 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:27.351733 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1416347191.mount: Deactivated successfully. Feb 9 12:40:27.355880 systemd-networkd[1310]: cali64d20d9894e: Gained IPv6LL Feb 9 12:40:27.390143 kubelet[1890]: E0209 12:40:27.390036 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:28.390582 kubelet[1890]: E0209 12:40:28.390484 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:29.391026 kubelet[1890]: E0209 12:40:29.390924 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:30.391319 kubelet[1890]: E0209 12:40:30.391217 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:31.391564 kubelet[1890]: E0209 12:40:31.391461 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:32.392846 kubelet[1890]: E0209 12:40:32.392720 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:32.891609 systemd[1]: Started sshd@12-139.178.90.255:22-2.57.122.87:48252.service. Feb 9 12:40:32.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.255:22-2.57.122.87:48252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:32.917935 kernel: kauditd_printk_skb: 107 callbacks suppressed Feb 9 12:40:32.918017 kernel: audit: type=1130 audit(1707482432.890:730): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.255:22-2.57.122.87:48252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:33.201370 systemd[1]: Started sshd@13-139.178.90.255:22-49.232.242.40:47156.service. Feb 9 12:40:33.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.255:22-49.232.242.40:47156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:33.289961 kernel: audit: type=1130 audit(1707482433.201:731): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.255:22-49.232.242.40:47156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:33.393635 kubelet[1890]: E0209 12:40:33.393524 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:33.810226 sshd[3368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 user=root Feb 9 12:40:33.809000 audit[3368]: USER_AUTH pid=3368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 9 12:40:33.896931 kernel: audit: type=1100 audit(1707482433.809:732): pid=3368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 9 12:40:34.136914 sshd[3371]: Invalid user hongj from 49.232.242.40 port 47156 Feb 9 12:40:34.143054 sshd[3371]: pam_faillock(sshd:auth): User unknown Feb 9 12:40:34.144030 sshd[3371]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:40:34.144122 sshd[3371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.242.40 Feb 9 12:40:34.145063 sshd[3371]: pam_faillock(sshd:auth): User unknown Feb 9 12:40:34.144000 audit[3371]: USER_AUTH pid=3371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hongj" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:40:34.239838 kernel: audit: type=1100 audit(1707482434.144:733): pid=3371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hongj" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:40:34.394225 kubelet[1890]: E0209 12:40:34.394020 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:35.395009 kubelet[1890]: E0209 12:40:35.394904 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:35.866922 sshd[3368]: Failed password for root from 2.57.122.87 port 48252 ssh2 Feb 9 12:40:36.005848 sshd[3371]: Failed password for invalid user hongj from 49.232.242.40 port 47156 ssh2 Feb 9 12:40:36.395953 kubelet[1890]: E0209 12:40:36.395847 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:37.397177 kubelet[1890]: E0209 12:40:37.397063 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:37.794644 sshd[3368]: Connection closed by authenticating user root 2.57.122.87 port 48252 [preauth] Feb 9 12:40:37.796970 systemd[1]: sshd@12-139.178.90.255:22-2.57.122.87:48252.service: Deactivated successfully. Feb 9 12:40:37.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.255:22-2.57.122.87:48252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:37.884792 kernel: audit: type=1131 audit(1707482437.796:734): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.255:22-2.57.122.87:48252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:37.982195 sshd[3371]: Received disconnect from 49.232.242.40 port 47156:11: Bye Bye [preauth] Feb 9 12:40:37.982195 sshd[3371]: Disconnected from invalid user hongj 49.232.242.40 port 47156 [preauth] Feb 9 12:40:37.984716 systemd[1]: sshd@13-139.178.90.255:22-49.232.242.40:47156.service: Deactivated successfully. Feb 9 12:40:37.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.255:22-49.232.242.40:47156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:38.072967 kernel: audit: type=1131 audit(1707482437.984:735): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.255:22-49.232.242.40:47156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:38.398504 kubelet[1890]: E0209 12:40:38.398389 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:39.398753 kubelet[1890]: E0209 12:40:39.398635 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:40.399800 kubelet[1890]: E0209 12:40:40.399682 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:41.400110 kubelet[1890]: E0209 12:40:41.400007 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:42.401280 kubelet[1890]: E0209 12:40:42.401176 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:43.080665 systemd[1]: Started sshd@14-139.178.90.255:22-92.114.19.110:47140.service. Feb 9 12:40:43.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.255:22-92.114.19.110:47140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:43.168928 kernel: audit: type=1130 audit(1707482443.080:736): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.255:22-92.114.19.110:47140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:43.402108 kubelet[1890]: E0209 12:40:43.401890 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:44.258625 sshd[3440]: Invalid user security from 92.114.19.110 port 47140 Feb 9 12:40:44.264686 sshd[3440]: pam_faillock(sshd:auth): User unknown Feb 9 12:40:44.265664 sshd[3440]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:40:44.265776 sshd[3440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.114.19.110 Feb 9 12:40:44.266705 sshd[3440]: pam_faillock(sshd:auth): User unknown Feb 9 12:40:44.266000 audit[3440]: USER_AUTH pid=3440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="security" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:40:44.349694 kubelet[1890]: E0209 12:40:44.349655 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:44.357945 kernel: audit: type=1100 audit(1707482444.266:737): pid=3440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="security" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:40:44.402283 kubelet[1890]: E0209 12:40:44.402233 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:45.403209 kubelet[1890]: E0209 12:40:45.403103 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:46.167833 sshd[3440]: Failed password for invalid user security from 92.114.19.110 port 47140 ssh2 Feb 9 12:40:46.181000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.181000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.341721 kernel: audit: type=1400 audit(1707482446.181:738): avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.341758 kernel: audit: type=1300 audit(1707482446.181:738): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.341775 kernel: audit: type=1327 audit(1707482446.181:738): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.373528 kernel: audit: type=1400 audit(1707482446.181:739): avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.181000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.403796 kubelet[1890]: E0209 12:40:46.403747 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:46.436568 kernel: audit: type=1300 audit(1707482446.181:739): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.181000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.531411 kernel: audit: type=1327 audit(1707482446.181:739): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.563011 kernel: audit: type=1400 audit(1707482446.181:740): avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.181000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.625693 kernel: audit: type=1300 audit(1707482446.181:740): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.181000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.181000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.181000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.181000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.181000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.181000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.181000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.181000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.181000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.181000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.181000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.181000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.181000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.181000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.181000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.181000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.181000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.181000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.181000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.182000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.182000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.182000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.182000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.182000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.182000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.182000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.182000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.182000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.182000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.372000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.372000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.372000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.719000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.719000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.719000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.719000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.719000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.719000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.719000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.719000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.719000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.719000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.719000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.719000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.719000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.719000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.719000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.719000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.719000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.719000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:46.719000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:40:46.719000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe45615c60 a2=70 a3=7ffe45615d80 items=0 ppid=3451 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:40:46.719000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:40:47.246334 sshd[3440]: Received disconnect from 92.114.19.110 port 47140:11: Bye Bye [preauth] Feb 9 12:40:47.246334 sshd[3440]: Disconnected from invalid user security 92.114.19.110 port 47140 [preauth] Feb 9 12:40:47.248920 systemd[1]: sshd@14-139.178.90.255:22-92.114.19.110:47140.service: Deactivated successfully. Feb 9 12:40:47.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.255:22-92.114.19.110:47140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:40:47.404557 kubelet[1890]: E0209 12:40:47.404441 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:48.405320 kubelet[1890]: E0209 12:40:48.405199 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:49.406462 kubelet[1890]: E0209 12:40:49.406342 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:50.407578 kubelet[1890]: E0209 12:40:50.407472 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:51.408622 kubelet[1890]: E0209 12:40:51.408512 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:52.409465 kubelet[1890]: E0209 12:40:52.409357 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:53.410387 kubelet[1890]: E0209 12:40:53.410263 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:54.410709 kubelet[1890]: E0209 12:40:54.410625 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:55.411522 kubelet[1890]: E0209 12:40:55.411416 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:56.412480 kubelet[1890]: E0209 12:40:56.412371 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:57.412814 kubelet[1890]: E0209 12:40:57.412658 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:58.413635 kubelet[1890]: E0209 12:40:58.413527 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:40:59.414709 kubelet[1890]: E0209 12:40:59.414638 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:00.415759 kubelet[1890]: E0209 12:41:00.415631 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:00.893196 systemd[1]: Started sshd@15-139.178.90.255:22-218.92.0.55:42388.service. Feb 9 12:41:00.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.255:22-218.92.0.55:42388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:00.920101 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 12:41:00.920167 kernel: audit: type=1130 audit(1707482460.892:764): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.255:22-218.92.0.55:42388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:01.068389 sshd[3612]: Unable to negotiate with 218.92.0.55 port 42388: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 12:41:01.070258 systemd[1]: sshd@15-139.178.90.255:22-218.92.0.55:42388.service: Deactivated successfully. Feb 9 12:41:01.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.255:22-218.92.0.55:42388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:01.166834 kernel: audit: type=1131 audit(1707482461.070:765): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.255:22-218.92.0.55:42388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:01.416719 kubelet[1890]: E0209 12:41:01.416605 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:02.416994 kubelet[1890]: E0209 12:41:02.416880 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:03.417907 kubelet[1890]: E0209 12:41:03.417800 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:04.350608 kubelet[1890]: E0209 12:41:04.350530 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:04.419128 kubelet[1890]: E0209 12:41:04.419051 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:05.419887 kubelet[1890]: E0209 12:41:05.419780 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:06.421053 kubelet[1890]: E0209 12:41:06.420941 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:07.421530 kubelet[1890]: E0209 12:41:07.421421 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:08.421967 kubelet[1890]: E0209 12:41:08.421863 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:09.422472 kubelet[1890]: E0209 12:41:09.422394 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:10.423145 kubelet[1890]: E0209 12:41:10.423034 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:11.424025 kubelet[1890]: E0209 12:41:11.423923 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:12.424394 kubelet[1890]: E0209 12:41:12.424291 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:13.222635 systemd[1]: Started sshd@16-139.178.90.255:22-49.232.242.40:56220.service. Feb 9 12:41:13.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.255:22-49.232.242.40:56220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:13.314949 kernel: audit: type=1130 audit(1707482473.221:766): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.255:22-49.232.242.40:56220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:13.424916 kubelet[1890]: E0209 12:41:13.424800 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:14.170865 sshd[3680]: Invalid user enigma from 49.232.242.40 port 56220 Feb 9 12:41:14.176888 sshd[3680]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:14.177862 sshd[3680]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:41:14.177951 sshd[3680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.242.40 Feb 9 12:41:14.178982 sshd[3680]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:14.178000 audit[3680]: USER_AUTH pid=3680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="enigma" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:41:14.270947 kernel: audit: type=1100 audit(1707482474.178:767): pid=3680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="enigma" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:41:14.425809 kubelet[1890]: E0209 12:41:14.425554 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:15.426325 kubelet[1890]: E0209 12:41:15.426244 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:16.427012 kubelet[1890]: E0209 12:41:16.426928 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:16.532177 sshd[3680]: Failed password for invalid user enigma from 49.232.242.40 port 56220 ssh2 Feb 9 12:41:16.701192 sshd[3680]: Received disconnect from 49.232.242.40 port 56220:11: Bye Bye [preauth] Feb 9 12:41:16.701192 sshd[3680]: Disconnected from invalid user enigma 49.232.242.40 port 56220 [preauth] Feb 9 12:41:16.702491 systemd[1]: sshd@16-139.178.90.255:22-49.232.242.40:56220.service: Deactivated successfully. Feb 9 12:41:16.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.255:22-49.232.242.40:56220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:16.793911 kernel: audit: type=1131 audit(1707482476.702:768): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.255:22-49.232.242.40:56220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:17.169000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.169000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.335892 kernel: audit: type=1400 audit(1707482477.169:769): avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.335963 kernel: audit: type=1300 audit(1707482477.169:769): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.335986 kernel: audit: type=1327 audit(1707482477.169:769): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.169000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.367787 kernel: audit: type=1400 audit(1707482477.170:770): avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.170000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.427339 kubelet[1890]: E0209 12:41:17.427280 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:17.431001 kernel: audit: type=1300 audit(1707482477.170:770): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.170000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.526197 kernel: audit: type=1327 audit(1707482477.170:770): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.557873 kernel: audit: type=1400 audit(1707482477.170:771): avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.170000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.170000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.170000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.170000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.171000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.171000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.171000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.171000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.171000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.171000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.171000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.171000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.171000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.171000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.171000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.171000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.171000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.171000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.171000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.172000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.172000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.172000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.172000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.172000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.172000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.172000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.172000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.172000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.172000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.172000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.172000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.172000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.172000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.172000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.173000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.173000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.173000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.173000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.173000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.173000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.367000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.367000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.367000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.620000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.620000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.620000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.620000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.620000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.620000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.620000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.620000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.620000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.620000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.620000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.620000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.620000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.620000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.620000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.620000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.620000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.620000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:17.620000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:17.620000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff04bd890 a2=70 a3=7ffff04bd9b0 items=0 ppid=3726 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:17.620000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:18.428644 kubelet[1890]: E0209 12:41:18.428545 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:19.429819 kubelet[1890]: E0209 12:41:19.429704 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:20.430988 kubelet[1890]: E0209 12:41:20.430881 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:21.431230 kubelet[1890]: E0209 12:41:21.431127 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:22.431505 kubelet[1890]: E0209 12:41:22.431377 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:23.432415 kubelet[1890]: E0209 12:41:23.432313 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:24.350199 kubelet[1890]: E0209 12:41:24.350090 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:24.433625 kubelet[1890]: E0209 12:41:24.433522 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:24.721119 env[1473]: time="2024-02-09T12:41:24.720928873Z" level=info msg="StopPodSandbox for \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\"" Feb 9 12:41:24.778261 env[1473]: 2024-02-09 12:41:24.760 [WARNING][3797] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"47b8a95f-9169-4615-879e-9681ec65e3c9", ResourceVersion:"1692", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 39, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.17", ContainerID:"b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580", Pod:"nginx-deployment-6d5f899847-hxjmc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali64d20d9894e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:41:24.778261 env[1473]: 2024-02-09 12:41:24.760 [INFO][3797] k8s.go 578: Cleaning up netns ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:41:24.778261 env[1473]: 2024-02-09 12:41:24.760 [INFO][3797] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" iface="eth0" netns="" Feb 9 12:41:24.778261 env[1473]: 2024-02-09 12:41:24.760 [INFO][3797] k8s.go 585: Releasing IP address(es) ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:41:24.778261 env[1473]: 2024-02-09 12:41:24.760 [INFO][3797] utils.go 188: Calico CNI releasing IP address ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:41:24.778261 env[1473]: 2024-02-09 12:41:24.770 [INFO][3811] ipam_plugin.go 415: Releasing address using handleID ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" HandleID="k8s-pod-network.ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Workload="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:41:24.778261 env[1473]: 2024-02-09 12:41:24.770 [INFO][3811] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:41:24.778261 env[1473]: 2024-02-09 12:41:24.770 [INFO][3811] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:41:24.778261 env[1473]: 2024-02-09 12:41:24.775 [WARNING][3811] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" HandleID="k8s-pod-network.ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Workload="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:41:24.778261 env[1473]: 2024-02-09 12:41:24.775 [INFO][3811] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" HandleID="k8s-pod-network.ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Workload="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:41:24.778261 env[1473]: 2024-02-09 12:41:24.777 [INFO][3811] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:41:24.778261 env[1473]: 2024-02-09 12:41:24.777 [INFO][3797] k8s.go 591: Teardown processing complete. ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:41:24.778261 env[1473]: time="2024-02-09T12:41:24.778247247Z" level=info msg="TearDown network for sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\" successfully" Feb 9 12:41:24.778710 env[1473]: time="2024-02-09T12:41:24.778268608Z" level=info msg="StopPodSandbox for \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\" returns successfully" Feb 9 12:41:24.778710 env[1473]: time="2024-02-09T12:41:24.778533049Z" level=info msg="RemovePodSandbox for \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\"" Feb 9 12:41:24.778710 env[1473]: time="2024-02-09T12:41:24.778559131Z" level=info msg="Forcibly stopping sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\"" Feb 9 12:41:24.824286 env[1473]: 2024-02-09 12:41:24.800 [WARNING][3839] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"47b8a95f-9169-4615-879e-9681ec65e3c9", ResourceVersion:"1692", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 39, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.17", ContainerID:"b03df6e0d138b5bad8b13d3eb84e9b63221eb25e49d3d51cb6c6752dcd74f580", Pod:"nginx-deployment-6d5f899847-hxjmc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali64d20d9894e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:41:24.824286 env[1473]: 2024-02-09 12:41:24.800 [INFO][3839] k8s.go 578: Cleaning up netns ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:41:24.824286 env[1473]: 2024-02-09 12:41:24.800 [INFO][3839] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" iface="eth0" netns="" Feb 9 12:41:24.824286 env[1473]: 2024-02-09 12:41:24.800 [INFO][3839] k8s.go 585: Releasing IP address(es) ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:41:24.824286 env[1473]: 2024-02-09 12:41:24.800 [INFO][3839] utils.go 188: Calico CNI releasing IP address ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:41:24.824286 env[1473]: 2024-02-09 12:41:24.812 [INFO][3855] ipam_plugin.go 415: Releasing address using handleID ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" HandleID="k8s-pod-network.ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Workload="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:41:24.824286 env[1473]: 2024-02-09 12:41:24.812 [INFO][3855] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:41:24.824286 env[1473]: 2024-02-09 12:41:24.812 [INFO][3855] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:41:24.824286 env[1473]: 2024-02-09 12:41:24.821 [WARNING][3855] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" HandleID="k8s-pod-network.ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Workload="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:41:24.824286 env[1473]: 2024-02-09 12:41:24.821 [INFO][3855] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" HandleID="k8s-pod-network.ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Workload="10.67.80.17-k8s-nginx--deployment--6d5f899847--hxjmc-eth0" Feb 9 12:41:24.824286 env[1473]: 2024-02-09 12:41:24.823 [INFO][3855] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:41:24.824286 env[1473]: 2024-02-09 12:41:24.823 [INFO][3839] k8s.go 591: Teardown processing complete. ContainerID="ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58" Feb 9 12:41:24.824286 env[1473]: time="2024-02-09T12:41:24.824271384Z" level=info msg="TearDown network for sandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\" successfully" Feb 9 12:41:24.825421 env[1473]: time="2024-02-09T12:41:24.825407047Z" level=info msg="RemovePodSandbox \"ed309fbe01e51b19da9914b663b8620cd630be3a1504707045480f1cac306e58\" returns successfully" Feb 9 12:41:25.433949 kubelet[1890]: E0209 12:41:25.433845 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:26.434405 kubelet[1890]: E0209 12:41:26.434275 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:27.388811 systemd[1]: Started sshd@17-139.178.90.255:22-43.134.226.170:57230.service. Feb 9 12:41:27.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.255:22-43.134.226.170:57230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:27.415550 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 12:41:27.415644 kernel: audit: type=1130 audit(1707482487.387:794): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.255:22-43.134.226.170:57230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:27.434720 kubelet[1890]: E0209 12:41:27.434679 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:28.435947 kubelet[1890]: E0209 12:41:28.435841 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:28.454218 sshd[3904]: Invalid user oteo from 43.134.226.170 port 57230 Feb 9 12:41:28.460362 sshd[3904]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:28.461437 sshd[3904]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:41:28.461528 sshd[3904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.226.170 Feb 9 12:41:28.462538 sshd[3904]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:28.461000 audit[3904]: USER_AUTH pid=3904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oteo" exe="/usr/sbin/sshd" hostname=43.134.226.170 addr=43.134.226.170 terminal=ssh res=failed' Feb 9 12:41:28.557813 kernel: audit: type=1100 audit(1707482488.461:795): pid=3904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oteo" exe="/usr/sbin/sshd" hostname=43.134.226.170 addr=43.134.226.170 terminal=ssh res=failed' Feb 9 12:41:29.436227 kubelet[1890]: E0209 12:41:29.436097 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:30.404114 sshd[3904]: Failed password for invalid user oteo from 43.134.226.170 port 57230 ssh2 Feb 9 12:41:30.437373 kubelet[1890]: E0209 12:41:30.437292 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:30.782114 sshd[3904]: Received disconnect from 43.134.226.170 port 57230:11: Bye Bye [preauth] Feb 9 12:41:30.782114 sshd[3904]: Disconnected from invalid user oteo 43.134.226.170 port 57230 [preauth] Feb 9 12:41:30.784708 systemd[1]: sshd@17-139.178.90.255:22-43.134.226.170:57230.service: Deactivated successfully. Feb 9 12:41:30.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.255:22-43.134.226.170:57230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:30.875939 kernel: audit: type=1131 audit(1707482490.783:796): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.255:22-43.134.226.170:57230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:31.438593 kubelet[1890]: E0209 12:41:31.438521 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:32.439264 kubelet[1890]: E0209 12:41:32.439186 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:33.439658 kubelet[1890]: E0209 12:41:33.439580 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:34.440657 kubelet[1890]: E0209 12:41:34.440588 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:35.441135 kubelet[1890]: E0209 12:41:35.441065 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:36.442175 kubelet[1890]: E0209 12:41:36.442106 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:37.443390 kubelet[1890]: E0209 12:41:37.443286 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:38.443861 kubelet[1890]: E0209 12:41:38.443782 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:39.445069 kubelet[1890]: E0209 12:41:39.444989 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:40.445317 kubelet[1890]: E0209 12:41:40.445201 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:41.359580 systemd[1]: Started sshd@18-139.178.90.255:22-92.114.19.110:60548.service. Feb 9 12:41:41.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.255:22-92.114.19.110:60548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:41.445872 kubelet[1890]: E0209 12:41:41.445830 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:41.450947 kernel: audit: type=1130 audit(1707482501.358:797): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.255:22-92.114.19.110:60548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:42.447165 kubelet[1890]: E0209 12:41:42.447046 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:42.546441 sshd[4022]: Invalid user sv from 92.114.19.110 port 60548 Feb 9 12:41:42.552590 sshd[4022]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:42.553361 sshd[4022]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:41:42.553379 sshd[4022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.114.19.110 Feb 9 12:41:42.553586 sshd[4022]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:42.552000 audit[4022]: USER_AUTH pid=4022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sv" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:41:42.645100 kernel: audit: type=1100 audit(1707482502.552:798): pid=4022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sv" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:41:43.448082 kubelet[1890]: E0209 12:41:43.448009 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:44.350188 kubelet[1890]: E0209 12:41:44.350080 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:44.449002 kubelet[1890]: E0209 12:41:44.448900 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:44.750123 sshd[4022]: Failed password for invalid user sv from 92.114.19.110 port 60548 ssh2 Feb 9 12:41:45.450161 kubelet[1890]: E0209 12:41:45.450059 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:46.184960 sshd[4022]: Received disconnect from 92.114.19.110 port 60548:11: Bye Bye [preauth] Feb 9 12:41:46.184960 sshd[4022]: Disconnected from invalid user sv 92.114.19.110 port 60548 [preauth] Feb 9 12:41:46.187535 systemd[1]: sshd@18-139.178.90.255:22-92.114.19.110:60548.service: Deactivated successfully. Feb 9 12:41:46.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.255:22-92.114.19.110:60548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:46.279806 kernel: audit: type=1131 audit(1707482506.187:799): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.255:22-92.114.19.110:60548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:46.450494 kubelet[1890]: E0209 12:41:46.450283 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:47.451584 kubelet[1890]: E0209 12:41:47.451475 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:48.063000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.121483 systemd[1]: Started sshd@19-139.178.90.255:22-49.232.242.40:37068.service. Feb 9 12:41:48.063000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.224968 kernel: audit: type=1400 audit(1707482508.063:800): avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.225013 kernel: audit: type=1300 audit(1707482508.063:800): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.225053 kernel: audit: type=1327 audit(1707482508.063:800): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.063000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.257827 kernel: audit: type=1400 audit(1707482508.063:801): avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.063000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.415528 kernel: audit: type=1300 audit(1707482508.063:801): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.415564 kernel: audit: type=1327 audit(1707482508.063:801): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.447335 kernel: audit: type=1400 audit(1707482508.063:802): avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.063000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.452583 kubelet[1890]: E0209 12:41:48.452544 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:48.510235 kernel: audit: type=1300 audit(1707482508.063:802): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.063000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.636576 kernel: audit: type=1327 audit(1707482508.063:802): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.636606 kernel: audit: type=1400 audit(1707482508.063:803): avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.063000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.063000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.063000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.063000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.063000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.063000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.064000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.064000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.064000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.064000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.064000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.064000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.064000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.064000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.064000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.064000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.064000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.064000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.064000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.064000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.064000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.064000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.064000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.064000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.064000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.064000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.064000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.064000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.255:22-49.232.242.40:37068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:48.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.256000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.256000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.256000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.698000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.698000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.698000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.698000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.698000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.698000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.698000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.698000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.698000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.698000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.698000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.698000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.698000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:41:48.698000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff222cb6c0 a2=70 a3=7fff222cb7e0 items=0 ppid=4072 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:41:48.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:41:48.998030 sshd[4102]: Invalid user church from 49.232.242.40 port 37068 Feb 9 12:41:49.004102 sshd[4102]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:49.005087 sshd[4102]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:41:49.005175 sshd[4102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.242.40 Feb 9 12:41:49.006069 sshd[4102]: pam_faillock(sshd:auth): User unknown Feb 9 12:41:49.005000 audit[4102]: USER_AUTH pid=4102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="church" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:41:49.453589 kubelet[1890]: E0209 12:41:49.453387 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:50.453726 kubelet[1890]: E0209 12:41:50.453622 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:51.163617 sshd[4102]: Failed password for invalid user church from 49.232.242.40 port 37068 ssh2 Feb 9 12:41:51.454596 kubelet[1890]: E0209 12:41:51.454378 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:51.729758 sshd[4102]: Received disconnect from 49.232.242.40 port 37068:11: Bye Bye [preauth] Feb 9 12:41:51.729758 sshd[4102]: Disconnected from invalid user church 49.232.242.40 port 37068 [preauth] Feb 9 12:41:51.732322 systemd[1]: sshd@19-139.178.90.255:22-49.232.242.40:37068.service: Deactivated successfully. Feb 9 12:41:51.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.255:22-49.232.242.40:37068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:41:52.455574 kubelet[1890]: E0209 12:41:52.455466 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:53.456348 kubelet[1890]: E0209 12:41:53.456242 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:54.457370 kubelet[1890]: E0209 12:41:54.457261 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:55.458173 kubelet[1890]: E0209 12:41:55.458058 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:56.458288 kubelet[1890]: E0209 12:41:56.458208 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:57.458841 kubelet[1890]: E0209 12:41:57.458698 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:58.459584 kubelet[1890]: E0209 12:41:58.459475 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:41:59.460876 kubelet[1890]: E0209 12:41:59.460764 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:00.461643 kubelet[1890]: E0209 12:42:00.461537 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:01.461805 kubelet[1890]: E0209 12:42:01.461684 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:02.463026 kubelet[1890]: E0209 12:42:02.462919 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:03.464074 kubelet[1890]: E0209 12:42:03.463976 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:04.350319 kubelet[1890]: E0209 12:42:04.350212 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:04.465348 kubelet[1890]: E0209 12:42:04.465223 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:05.465937 kubelet[1890]: E0209 12:42:05.465883 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:06.466091 kubelet[1890]: E0209 12:42:06.466030 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:07.466342 kubelet[1890]: E0209 12:42:07.466238 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:08.466713 kubelet[1890]: E0209 12:42:08.466529 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:09.467400 kubelet[1890]: E0209 12:42:09.467296 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:10.468032 kubelet[1890]: E0209 12:42:10.467932 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:11.468229 kubelet[1890]: E0209 12:42:11.468112 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:11.575736 systemd[1]: Started sshd@20-139.178.90.255:22-180.101.88.237:30314.service. Feb 9 12:42:11.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.255:22-180.101.88.237:30314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:11.602457 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 12:42:11.602523 kernel: audit: type=1130 audit(1707482531.575:828): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.255:22-180.101.88.237:30314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:12.469123 kubelet[1890]: E0209 12:42:12.469020 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:12.592647 sshd[4266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.237 user=root Feb 9 12:42:12.592000 audit[4266]: USER_AUTH pid=4266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.237 addr=180.101.88.237 terminal=ssh res=failed' Feb 9 12:42:12.688950 kernel: audit: type=1100 audit(1707482532.592:829): pid=4266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.237 addr=180.101.88.237 terminal=ssh res=failed' Feb 9 12:42:13.469448 kubelet[1890]: E0209 12:42:13.469337 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:14.470577 kubelet[1890]: E0209 12:42:14.470501 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:14.574620 sshd[4266]: Failed password for root from 180.101.88.237 port 30314 ssh2 Feb 9 12:42:15.471397 kubelet[1890]: E0209 12:42:15.471322 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:16.472145 kubelet[1890]: E0209 12:42:16.472064 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:16.546000 audit[4266]: USER_AUTH pid=4266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.237 addr=180.101.88.237 terminal=ssh res=failed' Feb 9 12:42:16.636932 kernel: audit: type=1100 audit(1707482536.546:830): pid=4266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.237 addr=180.101.88.237 terminal=ssh res=failed' Feb 9 12:42:17.472801 kubelet[1890]: E0209 12:42:17.472693 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:18.473498 kubelet[1890]: E0209 12:42:18.473383 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:19.081013 sshd[4266]: Failed password for root from 180.101.88.237 port 30314 ssh2 Feb 9 12:42:19.193000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.193000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.361742 kernel: audit: type=1400 audit(1707482539.193:831): avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.361782 kernel: audit: type=1300 audit(1707482539.193:831): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.361798 kernel: audit: type=1327 audit(1707482539.193:831): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.393459 kernel: audit: type=1400 audit(1707482539.194:832): avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.194000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.457531 kernel: audit: type=1300 audit(1707482539.194:832): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.194000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.473931 kubelet[1890]: E0209 12:42:19.473889 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:19.554246 kernel: audit: type=1327 audit(1707482539.194:832): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.194000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.586430 kernel: audit: type=1400 audit(1707482539.194:833): avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.194000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.649052 kernel: audit: type=1300 audit(1707482539.194:833): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.194000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.742970 kernel: audit: type=1327 audit(1707482539.194:833): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.194000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.774301 kernel: audit: type=1400 audit(1707482539.194:834): avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.194000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.194000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.194000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.194000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.194000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.194000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.195000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.195000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.195000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.195000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.195000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.195000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.195000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.195000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.196000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.196000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.196000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.196000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.196000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.196000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.196000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.196000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.196000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.196000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.196000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.196000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.196000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.196000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.196000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.197000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.197000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.197000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.197000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.197000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.197000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.391000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.391000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.834000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.834000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.834000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.834000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.834000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.834000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.834000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.834000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.834000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.835000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.835000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.835000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.835000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.835000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.835000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.835000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.835000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.835000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:19.835000 audit[4345]: AVC avc: denied { bpf } for pid=4345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:19.835000 audit[4345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4680d370 a2=70 a3=7ffe4680d490 items=0 ppid=4317 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:19.835000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:20.474881 kubelet[1890]: E0209 12:42:20.474762 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:20.503000 audit[4266]: USER_AUTH pid=4266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.237 addr=180.101.88.237 terminal=ssh res=failed' Feb 9 12:42:21.475654 kubelet[1890]: E0209 12:42:21.475553 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:22.476049 kubelet[1890]: E0209 12:42:22.476028 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:22.918086 sshd[4266]: Failed password for root from 180.101.88.237 port 30314 ssh2 Feb 9 12:42:23.476292 kubelet[1890]: E0209 12:42:23.476220 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:24.306633 sshd[4266]: Connection closed by authenticating user root 180.101.88.237 port 30314 [preauth] Feb 9 12:42:24.307161 sshd[4266]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.237 user=root Feb 9 12:42:24.309181 systemd[1]: sshd@20-139.178.90.255:22-180.101.88.237:30314.service: Deactivated successfully. Feb 9 12:42:24.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.255:22-180.101.88.237:30314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:24.336194 kernel: kauditd_printk_skb: 66 callbacks suppressed Feb 9 12:42:24.336228 kernel: audit: type=1131 audit(1707482544.307:857): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.255:22-180.101.88.237:30314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:24.349493 kubelet[1890]: E0209 12:42:24.349458 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:24.477333 kubelet[1890]: E0209 12:42:24.477304 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:24.515799 systemd[1]: Started sshd@21-139.178.90.255:22-154.68.39.6:39151.service. Feb 9 12:42:24.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.255:22-154.68.39.6:39151 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:24.604766 kernel: audit: type=1130 audit(1707482544.514:858): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.255:22-154.68.39.6:39151 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:25.478527 kubelet[1890]: E0209 12:42:25.478452 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:25.864807 sshd[4373]: Invalid user diportofacile from 154.68.39.6 port 39151 Feb 9 12:42:25.870681 sshd[4373]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:25.871838 sshd[4373]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:42:25.871927 sshd[4373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 12:42:25.872797 sshd[4373]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:25.871000 audit[4373]: USER_AUTH pid=4373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="diportofacile" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 12:42:25.962948 kernel: audit: type=1100 audit(1707482545.871:859): pid=4373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="diportofacile" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 12:42:26.479345 kubelet[1890]: E0209 12:42:26.479237 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:27.479466 kubelet[1890]: E0209 12:42:27.479433 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:27.973813 sshd[4373]: Failed password for invalid user diportofacile from 154.68.39.6 port 39151 ssh2 Feb 9 12:42:28.480082 kubelet[1890]: E0209 12:42:28.480035 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:28.953402 systemd[1]: Started sshd@22-139.178.90.255:22-49.232.242.40:45960.service. Feb 9 12:42:28.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.255:22-49.232.242.40:45960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:29.043773 kernel: audit: type=1130 audit(1707482548.951:860): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.255:22-49.232.242.40:45960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:29.480953 kubelet[1890]: E0209 12:42:29.480842 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:29.958128 sshd[4427]: Invalid user ukten from 49.232.242.40 port 45960 Feb 9 12:42:29.964252 sshd[4427]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:29.965356 sshd[4427]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:42:29.965440 sshd[4427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.242.40 Feb 9 12:42:29.966318 sshd[4427]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:29.964000 audit[4427]: USER_AUTH pid=4427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ukten" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:42:30.056933 kernel: audit: type=1100 audit(1707482549.964:861): pid=4427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ukten" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:42:30.269836 sshd[4373]: Received disconnect from 154.68.39.6 port 39151:11: Bye Bye [preauth] Feb 9 12:42:30.269836 sshd[4373]: Disconnected from invalid user diportofacile 154.68.39.6 port 39151 [preauth] Feb 9 12:42:30.272407 systemd[1]: sshd@21-139.178.90.255:22-154.68.39.6:39151.service: Deactivated successfully. Feb 9 12:42:30.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.255:22-154.68.39.6:39151 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:30.363941 kernel: audit: type=1131 audit(1707482550.271:862): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.255:22-154.68.39.6:39151 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:30.481611 kubelet[1890]: E0209 12:42:30.481505 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:31.481908 kubelet[1890]: E0209 12:42:31.481782 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:31.493473 systemd[1]: Started sshd@23-139.178.90.255:22-43.134.226.170:43992.service. Feb 9 12:42:31.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.255:22-43.134.226.170:43992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:31.584791 kernel: audit: type=1130 audit(1707482551.491:863): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.255:22-43.134.226.170:43992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:31.948144 sshd[4427]: Failed password for invalid user ukten from 49.232.242.40 port 45960 ssh2 Feb 9 12:42:32.482934 kubelet[1890]: E0209 12:42:32.482810 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:32.526585 sshd[4462]: Invalid user microsoft from 43.134.226.170 port 43992 Feb 9 12:42:32.532612 sshd[4462]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:32.533675 sshd[4462]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:42:32.533796 sshd[4462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.226.170 Feb 9 12:42:32.534842 sshd[4462]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:32.533000 audit[4462]: USER_AUTH pid=4462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="microsoft" exe="/usr/sbin/sshd" hostname=43.134.226.170 addr=43.134.226.170 terminal=ssh res=failed' Feb 9 12:42:32.625957 kernel: audit: type=1100 audit(1707482552.533:864): pid=4462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="microsoft" exe="/usr/sbin/sshd" hostname=43.134.226.170 addr=43.134.226.170 terminal=ssh res=failed' Feb 9 12:42:33.484079 kubelet[1890]: E0209 12:42:33.483979 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:33.645845 sshd[4427]: Received disconnect from 49.232.242.40 port 45960:11: Bye Bye [preauth] Feb 9 12:42:33.645845 sshd[4427]: Disconnected from invalid user ukten 49.232.242.40 port 45960 [preauth] Feb 9 12:42:33.648378 systemd[1]: sshd@22-139.178.90.255:22-49.232.242.40:45960.service: Deactivated successfully. Feb 9 12:42:33.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.255:22-49.232.242.40:45960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:33.739797 kernel: audit: type=1131 audit(1707482553.648:865): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.255:22-49.232.242.40:45960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:34.484511 kubelet[1890]: E0209 12:42:34.484414 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:34.595962 sshd[4462]: Failed password for invalid user microsoft from 43.134.226.170 port 43992 ssh2 Feb 9 12:42:35.485163 kubelet[1890]: E0209 12:42:35.485095 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:35.701239 sshd[4462]: Received disconnect from 43.134.226.170 port 43992:11: Bye Bye [preauth] Feb 9 12:42:35.701239 sshd[4462]: Disconnected from invalid user microsoft 43.134.226.170 port 43992 [preauth] Feb 9 12:42:35.703797 systemd[1]: sshd@23-139.178.90.255:22-43.134.226.170:43992.service: Deactivated successfully. Feb 9 12:42:35.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.255:22-43.134.226.170:43992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:35.795922 kernel: audit: type=1131 audit(1707482555.703:866): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.255:22-43.134.226.170:43992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:36.485392 kubelet[1890]: E0209 12:42:36.485283 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:37.486137 kubelet[1890]: E0209 12:42:37.486033 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:38.486753 kubelet[1890]: E0209 12:42:38.486619 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:39.486947 kubelet[1890]: E0209 12:42:39.486835 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:40.488156 kubelet[1890]: E0209 12:42:40.488041 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:41.488950 kubelet[1890]: E0209 12:42:41.488850 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:41.799681 systemd[1]: Started sshd@24-139.178.90.255:22-92.114.19.110:60906.service. Feb 9 12:42:41.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.255:22-92.114.19.110:60906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:41.891945 kernel: audit: type=1130 audit(1707482561.799:867): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.255:22-92.114.19.110:60906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:42.489906 kubelet[1890]: E0209 12:42:42.489804 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:43.080530 sshd[4556]: Invalid user ash from 92.114.19.110 port 60906 Feb 9 12:42:43.086441 sshd[4556]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:43.087575 sshd[4556]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:42:43.087663 sshd[4556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.114.19.110 Feb 9 12:42:43.088560 sshd[4556]: pam_faillock(sshd:auth): User unknown Feb 9 12:42:43.087000 audit[4556]: USER_AUTH pid=4556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ash" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:42:43.180924 kernel: audit: type=1100 audit(1707482563.087:868): pid=4556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ash" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:42:43.490329 kubelet[1890]: E0209 12:42:43.490231 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:44.349828 kubelet[1890]: E0209 12:42:44.349700 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:44.491442 kubelet[1890]: E0209 12:42:44.491322 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:45.326345 sshd[4556]: Failed password for invalid user ash from 92.114.19.110 port 60906 ssh2 Feb 9 12:42:45.492519 kubelet[1890]: E0209 12:42:45.492479 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:45.590688 sshd[4556]: Received disconnect from 92.114.19.110 port 60906:11: Bye Bye [preauth] Feb 9 12:42:45.590688 sshd[4556]: Disconnected from invalid user ash 92.114.19.110 port 60906 [preauth] Feb 9 12:42:45.593394 systemd[1]: sshd@24-139.178.90.255:22-92.114.19.110:60906.service: Deactivated successfully. Feb 9 12:42:45.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.255:22-92.114.19.110:60906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:45.685951 kernel: audit: type=1131 audit(1707482565.593:869): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.255:22-92.114.19.110:60906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:42:46.492915 kubelet[1890]: E0209 12:42:46.492841 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:47.493953 kubelet[1890]: E0209 12:42:47.493853 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:48.495161 kubelet[1890]: E0209 12:42:48.495041 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:49.495887 kubelet[1890]: E0209 12:42:49.495784 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:50.291000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.291000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.453280 kernel: audit: type=1400 audit(1707482570.291:870): avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.453317 kernel: audit: type=1300 audit(1707482570.291:870): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.453333 kernel: audit: type=1327 audit(1707482570.291:870): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.291000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.485726 kernel: audit: type=1400 audit(1707482570.291:871): avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.291000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.496096 kubelet[1890]: E0209 12:42:50.496054 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:50.550004 kernel: audit: type=1300 audit(1707482570.291:871): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.291000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.646964 kernel: audit: type=1327 audit(1707482570.291:871): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.291000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.679307 kernel: audit: type=1400 audit(1707482570.291:872): avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.291000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.743542 kernel: audit: type=1300 audit(1707482570.291:872): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.291000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.840193 kernel: audit: type=1327 audit(1707482570.291:872): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.291000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.872351 kernel: audit: type=1400 audit(1707482570.291:873): avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.291000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.291000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.291000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.291000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.291000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.291000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.292000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.292000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.292000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.292000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.292000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.292000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.292000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.292000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.292000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.292000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.292000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.292000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.292000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.292000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.292000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.292000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.292000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.292000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.292000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.292000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.292000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.292000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.292000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.292000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.292000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.292000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.292000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.292000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.292000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.292000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.292000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.292000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.292000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.292000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.292000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.292000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.935000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.935000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.935000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.935000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.935000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.935000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.935000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.935000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.935000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.935000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.935000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.935000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.935000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.935000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.935000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.935000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.935000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.935000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.935000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.935000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.935000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:50.935000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:50.935000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0248d720 a2=70 a3=7ffe0248d840 items=0 ppid=4611 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:50.935000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:42:51.496764 kubelet[1890]: E0209 12:42:51.496644 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:52.498110 kubelet[1890]: E0209 12:42:52.498006 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:53.498242 kubelet[1890]: E0209 12:42:53.498148 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:54.498486 kubelet[1890]: E0209 12:42:54.498365 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:55.499504 kubelet[1890]: E0209 12:42:55.499444 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:56.032340 env[1473]: time="2024-02-09T12:42:56.032314261Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:42:56.032973 env[1473]: time="2024-02-09T12:42:56.032960544Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:42:56.033721 env[1473]: time="2024-02-09T12:42:56.033709219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:42:56.034569 env[1473]: time="2024-02-09T12:42:56.034558748Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 12:42:56.034927 env[1473]: time="2024-02-09T12:42:56.034899192Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 12:42:56.035532 env[1473]: time="2024-02-09T12:42:56.035521600Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 12:42:56.036189 env[1473]: time="2024-02-09T12:42:56.036175477Z" level=info msg="CreateContainer within sandbox \"2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 12:42:56.041170 env[1473]: time="2024-02-09T12:42:56.041156254Z" level=info msg="CreateContainer within sandbox \"2a9d23cc234d00dc6cd866510e2cf499f91fe076253763a5c35a8048813c169b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3ea57331016d40dbb2a2ab03f7a3c2ce210c706f4a51899a2e20206dee4f101b\"" Feb 9 12:42:56.041494 env[1473]: time="2024-02-09T12:42:56.041466922Z" level=info msg="StartContainer for \"3ea57331016d40dbb2a2ab03f7a3c2ce210c706f4a51899a2e20206dee4f101b\"" Feb 9 12:42:56.063514 systemd[1]: Started cri-containerd-3ea57331016d40dbb2a2ab03f7a3c2ce210c706f4a51899a2e20206dee4f101b.scope. Feb 9 12:42:56.069000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.098030 kernel: kauditd_printk_skb: 65 callbacks suppressed Feb 9 12:42:56.098131 kernel: audit: type=1400 audit(1707482576.069:895): avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.069000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3011 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:56.257063 kernel: audit: type=1300 audit(1707482576.069:895): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3011 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:56.257097 kernel: audit: type=1327 audit(1707482576.069:895): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613537333331303136643430646262326132616230336637613363 Feb 9 12:42:56.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613537333331303136643430646262326132616230336637613363 Feb 9 12:42:56.069000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.412997 kernel: audit: type=1400 audit(1707482576.069:896): avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.413044 kernel: audit: type=1400 audit(1707482576.069:896): avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.069000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.476036 kernel: audit: type=1400 audit(1707482576.069:896): avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.069000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.500196 kubelet[1890]: E0209 12:42:56.500172 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:56.540260 kernel: audit: type=1400 audit(1707482576.069:896): avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.069000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.604681 kernel: audit: type=1400 audit(1707482576.069:896): avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.069000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.607546 env[1473]: time="2024-02-09T12:42:56.607528402Z" level=info msg="StartContainer for \"3ea57331016d40dbb2a2ab03f7a3c2ce210c706f4a51899a2e20206dee4f101b\" returns successfully" Feb 9 12:42:56.069000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.731066 kernel: audit: type=1400 audit(1707482576.069:896): avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.731099 kernel: audit: type=1400 audit(1707482576.069:896): avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.069000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.069000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.069000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.069000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.069000 audit: BPF prog-id=95 op=LOAD Feb 9 12:42:56.069000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002efc70 items=0 ppid=3011 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:56.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613537333331303136643430646262326132616230336637613363 Feb 9 12:42:56.160000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.160000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.160000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.160000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.160000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.160000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.160000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.160000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.160000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.160000 audit: BPF prog-id=96 op=LOAD Feb 9 12:42:56.160000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002efcb8 items=0 ppid=3011 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:56.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613537333331303136643430646262326132616230336637613363 Feb 9 12:42:56.349000 audit: BPF prog-id=96 op=UNLOAD Feb 9 12:42:56.349000 audit: BPF prog-id=95 op=UNLOAD Feb 9 12:42:56.349000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.349000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.349000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.349000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.349000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.349000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.349000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.349000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.349000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.349000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:42:56.349000 audit: BPF prog-id=97 op=LOAD Feb 9 12:42:56.349000 audit[4672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002efd48 items=0 ppid=3011 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:42:56.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613537333331303136643430646262326132616230336637613363 Feb 9 12:42:57.500977 kubelet[1890]: E0209 12:42:57.500907 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:58.501271 kubelet[1890]: E0209 12:42:58.501228 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:42:59.502067 kubelet[1890]: E0209 12:42:59.501984 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:00.503108 kubelet[1890]: E0209 12:43:00.503032 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:01.504041 kubelet[1890]: E0209 12:43:01.503931 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:02.504896 kubelet[1890]: E0209 12:43:02.504820 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:03.505980 kubelet[1890]: E0209 12:43:03.505902 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:04.093000 audit[4777]: NETFILTER_CFG table=filter:65 family=2 entries=20 op=nft_register_rule pid=4777 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:43:04.101260 kubelet[1890]: I0209 12:43:04.101229 1890 topology_manager.go:215] "Topology Admit Handler" podUID="71707a0b-f3bd-4b75-a10e-340eafd9fc7b" podNamespace="default" podName="nfs-server-provisioner-0" Feb 9 12:43:04.104364 systemd[1]: Created slice kubepods-besteffort-pod71707a0b_f3bd_4b75_a10e_340eafd9fc7b.slice. Feb 9 12:43:04.120530 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 12:43:04.120572 kernel: audit: type=1325 audit(1707482584.093:901): table=filter:65 family=2 entries=20 op=nft_register_rule pid=4777 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:43:04.093000 audit[4777]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd8ffe4170 a2=0 a3=7ffd8ffe415c items=0 ppid=2135 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:04.196453 kubelet[1890]: I0209 12:43:04.196405 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/71707a0b-f3bd-4b75-a10e-340eafd9fc7b-data\") pod \"nfs-server-provisioner-0\" (UID: \"71707a0b-f3bd-4b75-a10e-340eafd9fc7b\") " pod="default/nfs-server-provisioner-0" Feb 9 12:43:04.196453 kubelet[1890]: I0209 12:43:04.196450 1890 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j84jv\" (UniqueName: \"kubernetes.io/projected/71707a0b-f3bd-4b75-a10e-340eafd9fc7b-kube-api-access-j84jv\") pod \"nfs-server-provisioner-0\" (UID: \"71707a0b-f3bd-4b75-a10e-340eafd9fc7b\") " pod="default/nfs-server-provisioner-0" Feb 9 12:43:04.276612 kernel: audit: type=1300 audit(1707482584.093:901): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd8ffe4170 a2=0 a3=7ffd8ffe415c items=0 ppid=2135 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:04.276641 kernel: audit: type=1327 audit(1707482584.093:901): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:43:04.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:43:04.093000 audit[4777]: NETFILTER_CFG table=nat:66 family=2 entries=20 op=nft_register_rule pid=4777 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:43:04.350014 kubelet[1890]: E0209 12:43:04.349955 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:04.093000 audit[4777]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd8ffe4170 a2=0 a3=31030 items=0 ppid=2135 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:04.405923 env[1473]: time="2024-02-09T12:43:04.405863936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:71707a0b-f3bd-4b75-a10e-340eafd9fc7b,Namespace:default,Attempt:0,}" Feb 9 12:43:04.492534 kernel: audit: type=1325 audit(1707482584.093:902): table=nat:66 family=2 entries=20 op=nft_register_rule pid=4777 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:43:04.492607 kernel: audit: type=1300 audit(1707482584.093:902): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd8ffe4170 a2=0 a3=31030 items=0 ppid=2135 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:04.492625 kernel: audit: type=1327 audit(1707482584.093:902): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:43:04.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:43:04.499146 systemd-networkd[1310]: cali60e51b789ff: Link UP Feb 9 12:43:04.506882 kubelet[1890]: E0209 12:43:04.506836 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:04.550469 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 12:43:04.577804 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 12:43:04.606024 systemd-networkd[1310]: cali60e51b789ff: Gained carrier Feb 9 12:43:04.605000 audit[4817]: NETFILTER_CFG table=filter:67 family=2 entries=32 op=nft_register_rule pid=4817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:43:04.606735 kernel: audit: type=1325 audit(1707482584.605:903): table=filter:67 family=2 entries=32 op=nft_register_rule pid=4817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.429 [INFO][4783] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.17-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 71707a0b-f3bd-4b75-a10e-340eafd9fc7b 2042 0 2024-02-09 12:43:04 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.80.17 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.17-k8s-nfs--server--provisioner--0-" Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.429 [INFO][4783] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.17-k8s-nfs--server--provisioner--0-eth0" Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.444 [INFO][4803] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" HandleID="k8s-pod-network.a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" Workload="10.67.80.17-k8s-nfs--server--provisioner--0-eth0" Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.454 [INFO][4803] ipam_plugin.go 268: Auto assigning IP ContainerID="a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" HandleID="k8s-pod-network.a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" Workload="10.67.80.17-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c1460), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.17", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 12:43:04.444039802 +0000 UTC"}, Hostname:"10.67.80.17", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.454 [INFO][4803] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.455 [INFO][4803] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.455 [INFO][4803] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.17' Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.457 [INFO][4803] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" host="10.67.80.17" Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.463 [INFO][4803] ipam.go 372: Looking up existing affinities for host host="10.67.80.17" Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.471 [INFO][4803] ipam.go 489: Trying affinity for 192.168.21.128/26 host="10.67.80.17" Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.474 [INFO][4803] ipam.go 155: Attempting to load block cidr=192.168.21.128/26 host="10.67.80.17" Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.478 [INFO][4803] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.128/26 host="10.67.80.17" Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.478 [INFO][4803] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.128/26 handle="k8s-pod-network.a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" host="10.67.80.17" Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.481 [INFO][4803] ipam.go 1682: Creating new handle: k8s-pod-network.a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.487 [INFO][4803] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.128/26 handle="k8s-pod-network.a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" host="10.67.80.17" Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.497 [INFO][4803] ipam.go 1216: Successfully claimed IPs: [192.168.21.131/26] block=192.168.21.128/26 handle="k8s-pod-network.a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" host="10.67.80.17" Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.497 [INFO][4803] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.131/26] handle="k8s-pod-network.a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" host="10.67.80.17" Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.497 [INFO][4803] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 12:43:04.618683 env[1473]: 2024-02-09 12:43:04.497 [INFO][4803] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.131/26] IPv6=[] ContainerID="a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" HandleID="k8s-pod-network.a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" Workload="10.67.80.17-k8s-nfs--server--provisioner--0-eth0" Feb 9 12:43:04.619082 env[1473]: 2024-02-09 12:43:04.498 [INFO][4783] k8s.go 385: Populated endpoint ContainerID="a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.17-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.17-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"71707a0b-f3bd-4b75-a10e-340eafd9fc7b", ResourceVersion:"2042", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 43, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.17", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.21.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:43:04.619082 env[1473]: 2024-02-09 12:43:04.498 [INFO][4783] k8s.go 386: Calico CNI using IPs: [192.168.21.131/32] ContainerID="a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.17-k8s-nfs--server--provisioner--0-eth0" Feb 9 12:43:04.619082 env[1473]: 2024-02-09 12:43:04.498 [INFO][4783] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.17-k8s-nfs--server--provisioner--0-eth0" Feb 9 12:43:04.619082 env[1473]: 2024-02-09 12:43:04.606 [INFO][4783] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.17-k8s-nfs--server--provisioner--0-eth0" Feb 9 12:43:04.619197 env[1473]: 2024-02-09 12:43:04.606 [INFO][4783] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.17-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.17-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"71707a0b-f3bd-4b75-a10e-340eafd9fc7b", ResourceVersion:"2042", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 12, 43, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.17", ContainerID:"a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.21.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ca:89:52:69:72:d1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 12:43:04.619197 env[1473]: 2024-02-09 12:43:04.618 [INFO][4783] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.17-k8s-nfs--server--provisioner--0-eth0" Feb 9 12:43:04.624411 env[1473]: time="2024-02-09T12:43:04.624350137Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 12:43:04.624411 env[1473]: time="2024-02-09T12:43:04.624370766Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 12:43:04.624411 env[1473]: time="2024-02-09T12:43:04.624377754Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 12:43:04.624537 env[1473]: time="2024-02-09T12:43:04.624452092Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e pid=4836 runtime=io.containerd.runc.v2 Feb 9 12:43:04.605000 audit[4817]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffdebd5c610 a2=0 a3=7ffdebd5c5fc items=0 ppid=2135 pid=4817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:04.679517 systemd[1]: Started cri-containerd-a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e.scope. Feb 9 12:43:04.760523 kernel: audit: type=1300 audit(1707482584.605:903): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffdebd5c610 a2=0 a3=7ffdebd5c5fc items=0 ppid=2135 pid=4817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:04.760558 kernel: audit: type=1327 audit(1707482584.605:903): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:43:04.605000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:43:04.817992 kernel: audit: type=1400 audit(1707482584.767:904): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit: BPF prog-id=98 op=LOAD Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4836 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:04.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373231393937363063353835653963366362396163666132363331 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4836 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:04.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373231393937363063353835653963366362396163666132363331 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit: BPF prog-id=99 op=LOAD Feb 9 12:43:04.880000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003a3230 items=0 ppid=4836 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:04.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373231393937363063353835653963366362396163666132363331 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit: BPF prog-id=100 op=LOAD Feb 9 12:43:04.880000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003a3278 items=0 ppid=4836 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:04.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373231393937363063353835653963366362396163666132363331 Feb 9 12:43:04.880000 audit: BPF prog-id=100 op=UNLOAD Feb 9 12:43:04.880000 audit: BPF prog-id=99 op=UNLOAD Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { perfmon } for pid=4845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit[4845]: AVC avc: denied { bpf } for pid=4845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:04.880000 audit: BPF prog-id=101 op=LOAD Feb 9 12:43:04.880000 audit[4845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003a3688 items=0 ppid=4836 pid=4845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:04.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373231393937363063353835653963366362396163666132363331 Feb 9 12:43:04.606000 audit[4817]: NETFILTER_CFG table=nat:68 family=2 entries=20 op=nft_register_rule pid=4817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 12:43:04.606000 audit[4817]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffdebd5c610 a2=0 a3=31030 items=0 ppid=2135 pid=4817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:04.606000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 12:43:04.909223 env[1473]: time="2024-02-09T12:43:04.909170225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:71707a0b-f3bd-4b75-a10e-340eafd9fc7b,Namespace:default,Attempt:0,} returns sandbox id \"a572199760c585e9c6cb9acfa26310adf4c7438369301d410b69c4e1813fb23e\"" Feb 9 12:43:05.507985 kubelet[1890]: E0209 12:43:05.507926 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:05.884019 systemd-networkd[1310]: cali60e51b789ff: Gained IPv6LL Feb 9 12:43:06.509112 kubelet[1890]: E0209 12:43:06.509044 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:07.510121 kubelet[1890]: E0209 12:43:07.510021 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:08.511188 kubelet[1890]: E0209 12:43:08.511112 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:09.512020 kubelet[1890]: E0209 12:43:09.511922 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:09.943542 systemd[1]: Started sshd@25-139.178.90.255:22-49.232.242.40:54770.service. Feb 9 12:43:09.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.255:22-49.232.242.40:54770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:09.970517 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 9 12:43:09.970569 kernel: audit: type=1130 audit(1707482589.942:923): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.255:22-49.232.242.40:54770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:10.513172 kubelet[1890]: E0209 12:43:10.513065 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:10.893284 sshd[4929]: Invalid user security from 49.232.242.40 port 54770 Feb 9 12:43:10.899194 sshd[4929]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:10.900333 sshd[4929]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:43:10.900425 sshd[4929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.242.40 Feb 9 12:43:10.901444 sshd[4929]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:10.900000 audit[4929]: USER_AUTH pid=4929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="security" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:43:10.992960 kernel: audit: type=1100 audit(1707482590.900:924): pid=4929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="security" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:43:11.513708 kubelet[1890]: E0209 12:43:11.513591 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:12.514800 kubelet[1890]: E0209 12:43:12.514683 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:12.847209 sshd[4929]: Failed password for invalid user security from 49.232.242.40 port 54770 ssh2 Feb 9 12:43:13.515996 kubelet[1890]: E0209 12:43:13.515895 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:13.827144 sshd[4929]: Received disconnect from 49.232.242.40 port 54770:11: Bye Bye [preauth] Feb 9 12:43:13.827144 sshd[4929]: Disconnected from invalid user security 49.232.242.40 port 54770 [preauth] Feb 9 12:43:13.829535 systemd[1]: sshd@25-139.178.90.255:22-49.232.242.40:54770.service: Deactivated successfully. Feb 9 12:43:13.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.255:22-49.232.242.40:54770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:13.920940 kernel: audit: type=1131 audit(1707482593.829:925): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.255:22-49.232.242.40:54770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:14.516378 kubelet[1890]: E0209 12:43:14.516271 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:15.517032 kubelet[1890]: E0209 12:43:15.516969 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:16.518192 kubelet[1890]: E0209 12:43:16.518073 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:17.519302 kubelet[1890]: E0209 12:43:17.519194 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:18.520130 kubelet[1890]: E0209 12:43:18.520058 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:19.520830 kubelet[1890]: E0209 12:43:19.520701 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:20.521637 kubelet[1890]: E0209 12:43:20.521537 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:21.413000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.413000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.522529 kubelet[1890]: E0209 12:43:21.522487 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:21.573817 kernel: audit: type=1400 audit(1707482601.413:926): avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.573860 kernel: audit: type=1300 audit(1707482601.413:926): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.573878 kernel: audit: type=1327 audit(1707482601.413:926): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.413000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.605390 kernel: audit: type=1400 audit(1707482601.413:927): avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.413000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.668158 kernel: audit: type=1300 audit(1707482601.413:927): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.413000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.762373 kernel: audit: type=1327 audit(1707482601.413:927): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.413000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.793865 kernel: audit: type=1400 audit(1707482601.413:928): avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.413000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.856413 kernel: audit: type=1300 audit(1707482601.413:928): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.413000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.950503 kernel: audit: type=1327 audit(1707482601.413:928): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.413000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.981897 kernel: audit: type=1400 audit(1707482601.413:929): avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.413000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.413000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.413000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.413000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.413000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.413000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.413000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.413000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.413000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.414000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.414000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.414000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.414000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.414000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.414000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.414000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.414000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.414000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.414000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.414000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.414000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.414000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.414000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.414000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.414000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.414000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.414000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.414000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.414000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.414000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.414000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.414000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.414000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.414000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.414000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.414000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.414000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.414000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.414000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:21.414000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:21.414000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:21.414000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:22.043000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:22.043000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:22.043000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:22.043000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:22.043000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:22.043000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:22.043000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:22.043000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:22.043000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:22.043000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:22.043000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:22.043000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:22.043000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:22.043000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:22.043000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:22.043000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:22.043000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:22.043000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:22.043000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:22.043000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:22.043000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:22.043000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:22.043000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:22.043000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:22.043000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:22.043000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:22.043000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:22.043000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:22.043000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:22.043000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:22.043000 audit[5018]: AVC avc: denied { bpf } for pid=5018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:22.043000 audit[5018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb79eda70 a2=70 a3=7ffcb79edb90 items=0 ppid=4989 pid=5018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:22.043000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:22.522873 kubelet[1890]: E0209 12:43:22.522766 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:23.523163 kubelet[1890]: E0209 12:43:23.523061 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:24.350450 kubelet[1890]: E0209 12:43:24.350345 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:24.524276 kubelet[1890]: E0209 12:43:24.524174 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:25.524580 kubelet[1890]: E0209 12:43:25.524461 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:26.525340 kubelet[1890]: E0209 12:43:26.525238 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:27.526040 kubelet[1890]: E0209 12:43:27.525916 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:28.526932 kubelet[1890]: E0209 12:43:28.526823 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:29.527779 kubelet[1890]: E0209 12:43:29.527654 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:29.748400 systemd[1]: Started sshd@26-139.178.90.255:22-180.101.88.237:62776.service. Feb 9 12:43:29.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.255:22-180.101.88.237:62776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:29.774877 kernel: kauditd_printk_skb: 74 callbacks suppressed Feb 9 12:43:29.774941 kernel: audit: type=1130 audit(1707482609.747:954): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.255:22-180.101.88.237:62776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:30.528757 kubelet[1890]: E0209 12:43:30.528633 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:30.770095 sshd[5116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.237 user=root Feb 9 12:43:30.769000 audit[5116]: USER_AUTH pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.237 addr=180.101.88.237 terminal=ssh res=failed' Feb 9 12:43:30.858944 kernel: audit: type=1100 audit(1707482610.769:955): pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.237 addr=180.101.88.237 terminal=ssh res=failed' Feb 9 12:43:31.528904 kubelet[1890]: E0209 12:43:31.528830 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:32.530123 kubelet[1890]: E0209 12:43:32.530049 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:32.792201 sshd[5116]: Failed password for root from 180.101.88.237 port 62776 ssh2 Feb 9 12:43:33.530991 kubelet[1890]: E0209 12:43:33.530917 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:34.532016 kubelet[1890]: E0209 12:43:34.531916 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:34.725000 audit[5116]: ANOM_LOGIN_FAILURES pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:34.726444 sshd[5116]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 12:43:34.725000 audit[5116]: USER_AUTH pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.237 addr=180.101.88.237 terminal=ssh res=failed' Feb 9 12:43:34.879274 kernel: audit: type=2100 audit(1707482614.725:956): pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:34.879339 kernel: audit: type=1100 audit(1707482614.725:957): pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.237 addr=180.101.88.237 terminal=ssh res=failed' Feb 9 12:43:35.532908 kubelet[1890]: E0209 12:43:35.532798 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:36.031364 systemd[1]: Started sshd@27-139.178.90.255:22-43.134.226.170:60662.service. Feb 9 12:43:36.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.255:22-43.134.226.170:60662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:36.121734 kernel: audit: type=1130 audit(1707482616.030:958): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.255:22-43.134.226.170:60662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:36.533008 kubelet[1890]: E0209 12:43:36.532920 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:36.632851 sshd[5116]: Failed password for root from 180.101.88.237 port 62776 ssh2 Feb 9 12:43:37.055632 sshd[5133]: Invalid user zandieh from 43.134.226.170 port 60662 Feb 9 12:43:37.056885 sshd[5133]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:37.057129 sshd[5133]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:43:37.057148 sshd[5133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.226.170 Feb 9 12:43:37.057362 sshd[5133]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:37.056000 audit[5133]: USER_AUTH pid=5133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zandieh" exe="/usr/sbin/sshd" hostname=43.134.226.170 addr=43.134.226.170 terminal=ssh res=failed' Feb 9 12:43:37.148946 kernel: audit: type=1100 audit(1707482617.056:959): pid=5133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zandieh" exe="/usr/sbin/sshd" hostname=43.134.226.170 addr=43.134.226.170 terminal=ssh res=failed' Feb 9 12:43:37.533216 kubelet[1890]: E0209 12:43:37.533098 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:38.533547 kubelet[1890]: E0209 12:43:38.533441 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:38.681000 audit[5116]: USER_AUTH pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.237 addr=180.101.88.237 terminal=ssh res=failed' Feb 9 12:43:38.774938 kernel: audit: type=1100 audit(1707482618.681:960): pid=5116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.237 addr=180.101.88.237 terminal=ssh res=failed' Feb 9 12:43:39.375228 sshd[5133]: Failed password for invalid user zandieh from 43.134.226.170 port 60662 ssh2 Feb 9 12:43:39.534780 kubelet[1890]: E0209 12:43:39.534662 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:40.121425 systemd[1]: Started sshd@28-139.178.90.255:22-92.114.19.110:37772.service. Feb 9 12:43:40.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.255:22-92.114.19.110:37772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:40.212942 kernel: audit: type=1130 audit(1707482620.120:961): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.255:22-92.114.19.110:37772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:40.535540 kubelet[1890]: E0209 12:43:40.535425 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:40.804660 sshd[5116]: Failed password for root from 180.101.88.237 port 62776 ssh2 Feb 9 12:43:40.921291 sshd[5133]: Received disconnect from 43.134.226.170 port 60662:11: Bye Bye [preauth] Feb 9 12:43:40.921291 sshd[5133]: Disconnected from invalid user zandieh 43.134.226.170 port 60662 [preauth] Feb 9 12:43:40.921904 systemd[1]: sshd@27-139.178.90.255:22-43.134.226.170:60662.service: Deactivated successfully. Feb 9 12:43:40.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.255:22-43.134.226.170:60662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:41.013959 kernel: audit: type=1131 audit(1707482620.921:962): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.255:22-43.134.226.170:60662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:41.535709 kubelet[1890]: E0209 12:43:41.535594 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:41.774050 sshd[5182]: Invalid user salmansasha from 92.114.19.110 port 37772 Feb 9 12:43:41.780070 sshd[5182]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:41.781270 sshd[5182]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:43:41.781360 sshd[5182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.114.19.110 Feb 9 12:43:41.782396 sshd[5182]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:41.781000 audit[5182]: USER_AUTH pid=5182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="salmansasha" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:43:41.874858 kernel: audit: type=1100 audit(1707482621.781:963): pid=5182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="salmansasha" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:43:42.536374 kubelet[1890]: E0209 12:43:42.536296 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:42.637869 sshd[5116]: Received disconnect from 180.101.88.237 port 62776:11: [preauth] Feb 9 12:43:42.637869 sshd[5116]: Disconnected from authenticating user root 180.101.88.237 port 62776 [preauth] Feb 9 12:43:42.638444 sshd[5116]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.237 user=root Feb 9 12:43:42.640416 systemd[1]: sshd@26-139.178.90.255:22-180.101.88.237:62776.service: Deactivated successfully. Feb 9 12:43:42.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.255:22-180.101.88.237:62776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:42.732942 kernel: audit: type=1131 audit(1707482622.640:964): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.255:22-180.101.88.237:62776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:43.537576 kubelet[1890]: E0209 12:43:43.537473 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:43.648901 sshd[5182]: Failed password for invalid user salmansasha from 92.114.19.110 port 37772 ssh2 Feb 9 12:43:44.198508 sshd[5182]: Received disconnect from 92.114.19.110 port 37772:11: Bye Bye [preauth] Feb 9 12:43:44.198508 sshd[5182]: Disconnected from invalid user salmansasha 92.114.19.110 port 37772 [preauth] Feb 9 12:43:44.201093 systemd[1]: sshd@28-139.178.90.255:22-92.114.19.110:37772.service: Deactivated successfully. Feb 9 12:43:44.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.255:22-92.114.19.110:37772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:44.293945 kernel: audit: type=1131 audit(1707482624.200:965): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.255:22-92.114.19.110:37772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:44.350425 kubelet[1890]: E0209 12:43:44.350356 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:44.484021 systemd[1]: Started sshd@29-139.178.90.255:22-49.232.242.40:35630.service. Feb 9 12:43:44.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.255:22-49.232.242.40:35630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:44.537853 kubelet[1890]: E0209 12:43:44.537837 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:44.576954 kernel: audit: type=1130 audit(1707482624.483:966): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.255:22-49.232.242.40:35630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:45.405257 sshd[5196]: Invalid user nick from 49.232.242.40 port 35630 Feb 9 12:43:45.411345 sshd[5196]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:45.412402 sshd[5196]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:43:45.412491 sshd[5196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.242.40 Feb 9 12:43:45.413544 sshd[5196]: pam_faillock(sshd:auth): User unknown Feb 9 12:43:45.413000 audit[5196]: USER_AUTH pid=5196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nick" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:43:45.505735 kernel: audit: type=1100 audit(1707482625.413:967): pid=5196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nick" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:43:45.538365 kubelet[1890]: E0209 12:43:45.538255 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:46.538606 kubelet[1890]: E0209 12:43:46.538488 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:47.164365 sshd[5196]: Failed password for invalid user nick from 49.232.242.40 port 35630 ssh2 Feb 9 12:43:47.432594 sshd[5196]: Received disconnect from 49.232.242.40 port 35630:11: Bye Bye [preauth] Feb 9 12:43:47.432594 sshd[5196]: Disconnected from invalid user nick 49.232.242.40 port 35630 [preauth] Feb 9 12:43:47.435082 systemd[1]: sshd@29-139.178.90.255:22-49.232.242.40:35630.service: Deactivated successfully. Feb 9 12:43:47.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.255:22-49.232.242.40:35630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:47.527940 kernel: audit: type=1131 audit(1707482627.434:968): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.255:22-49.232.242.40:35630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:43:47.539330 kubelet[1890]: E0209 12:43:47.539290 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:48.540475 kubelet[1890]: E0209 12:43:48.540367 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:49.541559 kubelet[1890]: E0209 12:43:49.541480 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:50.542217 kubelet[1890]: E0209 12:43:50.542141 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:51.543108 kubelet[1890]: E0209 12:43:51.543026 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:52.486000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.544009 kubelet[1890]: E0209 12:43:52.543993 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:52.486000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.649242 kernel: audit: type=1400 audit(1707482632.486:969): avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.649282 kernel: audit: type=1300 audit(1707482632.486:969): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.649301 kernel: audit: type=1327 audit(1707482632.486:969): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.681741 kernel: audit: type=1400 audit(1707482632.486:970): avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.486000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.746224 kernel: audit: type=1300 audit(1707482632.486:970): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.486000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.843329 kernel: audit: type=1327 audit(1707482632.486:970): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.875657 kernel: audit: type=1400 audit(1707482632.486:971): avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.486000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.940154 kernel: audit: type=1300 audit(1707482632.486:971): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.486000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:53.036872 kernel: audit: type=1327 audit(1707482632.486:971): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:53.069644 kernel: audit: type=1400 audit(1707482632.486:972): avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.486000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.486000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.486000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.486000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.486000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.486000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.486000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.486000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.486000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.486000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.486000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.486000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.487000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.487000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.487000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.487000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.487000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.487000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.487000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.487000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.487000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.487000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.487000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.487000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.487000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.487000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.487000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.487000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.487000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.487000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.487000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.487000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.487000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.487000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.487000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.487000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:52.681000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:52.681000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:52.681000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:53.133000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:53.133000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:53.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:53.133000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:53.133000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:53.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:53.133000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:53.133000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:53.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:53.133000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:53.133000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:53.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:53.133000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:53.133000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:53.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:53.133000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:53.133000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:53.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:53.133000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:53.133000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:53.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:53.133000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:53.133000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:53.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:53.133000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:53.133000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:53.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:53.133000 audit[5279]: AVC avc: denied { bpf } for pid=5279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:43:53.133000 audit[5279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde31089f0 a2=70 a3=7ffde3108b10 items=0 ppid=5251 pid=5279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:43:53.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:43:53.545231 kubelet[1890]: E0209 12:43:53.545155 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:54.546086 kubelet[1890]: E0209 12:43:54.546013 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:55.546597 kubelet[1890]: E0209 12:43:55.546563 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:56.547550 kubelet[1890]: E0209 12:43:56.547464 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:57.548659 kubelet[1890]: E0209 12:43:57.548575 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:58.549603 kubelet[1890]: E0209 12:43:58.549501 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:43:59.549832 kubelet[1890]: E0209 12:43:59.549757 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:00.550854 kubelet[1890]: E0209 12:44:00.550755 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:01.552152 kubelet[1890]: E0209 12:44:01.552045 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:02.553392 kubelet[1890]: E0209 12:44:02.553289 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:03.553879 kubelet[1890]: E0209 12:44:03.553812 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:04.350590 kubelet[1890]: E0209 12:44:04.350485 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:04.555041 kubelet[1890]: E0209 12:44:04.554938 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:05.555631 kubelet[1890]: E0209 12:44:05.555576 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:06.556525 kubelet[1890]: E0209 12:44:06.556421 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:07.557727 kubelet[1890]: E0209 12:44:07.557623 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:08.558483 kubelet[1890]: E0209 12:44:08.558371 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:09.558881 kubelet[1890]: E0209 12:44:09.558778 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:10.559879 kubelet[1890]: E0209 12:44:10.559754 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:11.560960 kubelet[1890]: E0209 12:44:11.560849 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:12.561159 kubelet[1890]: E0209 12:44:12.561051 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:13.561444 kubelet[1890]: E0209 12:44:13.561328 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:14.562461 kubelet[1890]: E0209 12:44:14.562355 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:15.562710 kubelet[1890]: E0209 12:44:15.562648 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:16.563864 kubelet[1890]: E0209 12:44:16.563804 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:17.565013 kubelet[1890]: E0209 12:44:17.564910 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:18.565942 kubelet[1890]: E0209 12:44:18.565832 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:19.567100 kubelet[1890]: E0209 12:44:19.566990 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:20.568133 kubelet[1890]: E0209 12:44:20.568030 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:20.844343 systemd[1]: Started sshd@30-139.178.90.255:22-49.232.242.40:44776.service. Feb 9 12:44:20.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.255:22-49.232.242.40:44776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:20.871490 kernel: kauditd_printk_skb: 74 callbacks suppressed Feb 9 12:44:20.871525 kernel: audit: type=1130 audit(1707482660.842:997): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.255:22-49.232.242.40:44776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:21.568777 kubelet[1890]: E0209 12:44:21.568677 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:21.758494 sshd[5523]: Invalid user chengw from 49.232.242.40 port 44776 Feb 9 12:44:21.764602 sshd[5523]: pam_faillock(sshd:auth): User unknown Feb 9 12:44:21.765827 sshd[5523]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:44:21.765917 sshd[5523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.242.40 Feb 9 12:44:21.766794 sshd[5523]: pam_faillock(sshd:auth): User unknown Feb 9 12:44:21.765000 audit[5523]: USER_AUTH pid=5523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="chengw" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:44:21.857942 kernel: audit: type=1100 audit(1707482661.765:998): pid=5523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="chengw" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:44:22.570008 kubelet[1890]: E0209 12:44:22.569905 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:23.457552 sshd[5523]: Failed password for invalid user chengw from 49.232.242.40 port 44776 ssh2 Feb 9 12:44:23.570879 kubelet[1890]: E0209 12:44:23.570776 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.910120 kernel: audit: type=1400 audit(1707482663.749:999): avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.910155 kernel: audit: type=1300 audit(1707482663.749:999): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.910172 kernel: audit: type=1327 audit(1707482663.749:999): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.941817 kernel: audit: type=1400 audit(1707482663.749:1000): avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:24.004869 kernel: audit: type=1300 audit(1707482663.749:1000): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:24.073222 sshd[5523]: Received disconnect from 49.232.242.40 port 44776:11: Bye Bye [preauth] Feb 9 12:44:24.073222 sshd[5523]: Disconnected from invalid user chengw 49.232.242.40 port 44776 [preauth] Feb 9 12:44:24.073821 systemd[1]: sshd@30-139.178.90.255:22-49.232.242.40:44776.service: Deactivated successfully. Feb 9 12:44:24.100429 kernel: audit: type=1327 audit(1707482663.749:1000): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:24.132773 kernel: audit: type=1400 audit(1707482663.749:1001): avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:24.196651 kernel: audit: type=1300 audit(1707482663.749:1001): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.749000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.749000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:23.749000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:23.940000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:23.940000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:24.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.255:22-49.232.242.40:44776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:23.940000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:24.290000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:24.290000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:24.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:24.290000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:24.290000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:24.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:24.290000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:24.290000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:24.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:24.290000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:24.290000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:24.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:24.290000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:24.290000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:24.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:24.290000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:24.290000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:24.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:24.290000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:24.290000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:24.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:24.290000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:24.290000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:24.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:24.290000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:24.290000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:24.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:24.290000 audit[5559]: AVC avc: denied { bpf } for pid=5559 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:24.290000 audit[5559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeba42d820 a2=70 a3=7ffeba42d940 items=0 ppid=5531 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:24.290000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:24.350286 kubelet[1890]: E0209 12:44:24.350194 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:24.572163 kubelet[1890]: E0209 12:44:24.571949 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:25.572571 kubelet[1890]: E0209 12:44:25.572450 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:26.573061 kubelet[1890]: E0209 12:44:26.572942 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:27.574146 kubelet[1890]: E0209 12:44:27.574040 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:28.574875 kubelet[1890]: E0209 12:44:28.574745 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:29.575268 kubelet[1890]: E0209 12:44:29.575197 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:30.576539 kubelet[1890]: E0209 12:44:30.576435 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:31.577681 kubelet[1890]: E0209 12:44:31.577574 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:32.578313 kubelet[1890]: E0209 12:44:32.578192 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:33.579196 kubelet[1890]: E0209 12:44:33.579095 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:34.579997 kubelet[1890]: E0209 12:44:34.579890 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:35.580791 kubelet[1890]: E0209 12:44:35.580734 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:36.581598 kubelet[1890]: E0209 12:44:36.581494 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:37.582864 kubelet[1890]: E0209 12:44:37.582746 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:38.520810 systemd[1]: Started sshd@31-139.178.90.255:22-43.134.226.170:58748.service. Feb 9 12:44:38.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.255:22-43.134.226.170:58748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:38.547539 kernel: kauditd_printk_skb: 77 callbacks suppressed Feb 9 12:44:38.547622 kernel: audit: type=1130 audit(1707482678.520:1028): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.255:22-43.134.226.170:58748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:38.583844 kubelet[1890]: E0209 12:44:38.583832 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:38.835629 systemd[1]: Started sshd@32-139.178.90.255:22-92.114.19.110:55852.service. Feb 9 12:44:38.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.255:22-92.114.19.110:55852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:38.925946 kernel: audit: type=1130 audit(1707482678.835:1029): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.255:22-92.114.19.110:55852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:39.566615 sshd[5674]: Invalid user florijan from 43.134.226.170 port 58748 Feb 9 12:44:39.572763 sshd[5674]: pam_faillock(sshd:auth): User unknown Feb 9 12:44:39.573778 sshd[5674]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:44:39.573868 sshd[5674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.226.170 Feb 9 12:44:39.574776 sshd[5674]: pam_faillock(sshd:auth): User unknown Feb 9 12:44:39.574000 audit[5674]: USER_AUTH pid=5674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="florijan" exe="/usr/sbin/sshd" hostname=43.134.226.170 addr=43.134.226.170 terminal=ssh res=failed' Feb 9 12:44:39.584545 kubelet[1890]: E0209 12:44:39.584502 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:39.665828 kernel: audit: type=1100 audit(1707482679.574:1030): pid=5674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="florijan" exe="/usr/sbin/sshd" hostname=43.134.226.170 addr=43.134.226.170 terminal=ssh res=failed' Feb 9 12:44:40.140475 sshd[5677]: Invalid user azita from 92.114.19.110 port 55852 Feb 9 12:44:40.141653 sshd[5677]: pam_faillock(sshd:auth): User unknown Feb 9 12:44:40.141882 sshd[5677]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:44:40.141899 sshd[5677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.114.19.110 Feb 9 12:44:40.142059 sshd[5677]: pam_faillock(sshd:auth): User unknown Feb 9 12:44:40.141000 audit[5677]: USER_AUTH pid=5677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="azita" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:44:40.231941 kernel: audit: type=1100 audit(1707482680.141:1031): pid=5677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="azita" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:44:40.585553 kubelet[1890]: E0209 12:44:40.585453 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:41.405835 sshd[5674]: Failed password for invalid user florijan from 43.134.226.170 port 58748 ssh2 Feb 9 12:44:41.586540 kubelet[1890]: E0209 12:44:41.586443 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:42.108520 sshd[5677]: Failed password for invalid user azita from 92.114.19.110 port 55852 ssh2 Feb 9 12:44:42.561839 sshd[5674]: Received disconnect from 43.134.226.170 port 58748:11: Bye Bye [preauth] Feb 9 12:44:42.561839 sshd[5674]: Disconnected from invalid user florijan 43.134.226.170 port 58748 [preauth] Feb 9 12:44:42.564346 systemd[1]: sshd@31-139.178.90.255:22-43.134.226.170:58748.service: Deactivated successfully. Feb 9 12:44:42.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.255:22-43.134.226.170:58748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:42.655520 kubelet[1890]: E0209 12:44:42.655471 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:42.655827 kernel: audit: type=1131 audit(1707482682.564:1032): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.255:22-43.134.226.170:58748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:43.656834 kubelet[1890]: E0209 12:44:43.656703 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:44.100884 sshd[5677]: Received disconnect from 92.114.19.110 port 55852:11: Bye Bye [preauth] Feb 9 12:44:44.100884 sshd[5677]: Disconnected from invalid user azita 92.114.19.110 port 55852 [preauth] Feb 9 12:44:44.103392 systemd[1]: sshd@32-139.178.90.255:22-92.114.19.110:55852.service: Deactivated successfully. Feb 9 12:44:44.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.255:22-92.114.19.110:55852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:44.195910 kernel: audit: type=1131 audit(1707482684.103:1033): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.255:22-92.114.19.110:55852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:44.350519 kubelet[1890]: E0209 12:44:44.350394 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:44.657602 kubelet[1890]: E0209 12:44:44.657489 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:45.658583 kubelet[1890]: E0209 12:44:45.658481 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:46.659807 kubelet[1890]: E0209 12:44:46.659684 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:47.660794 kubelet[1890]: E0209 12:44:47.660674 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:48.661521 kubelet[1890]: E0209 12:44:48.661399 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:49.661781 kubelet[1890]: E0209 12:44:49.661658 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:50.662971 kubelet[1890]: E0209 12:44:50.662856 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:51.663774 kubelet[1890]: E0209 12:44:51.663672 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:52.664633 kubelet[1890]: E0209 12:44:52.664535 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:53.665132 kubelet[1890]: E0209 12:44:53.665014 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:54.061268 systemd[1]: Started sshd@33-139.178.90.255:22-154.68.39.6:41829.service. Feb 9 12:44:54.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.255:22-154.68.39.6:41829 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:54.152842 kernel: audit: type=1130 audit(1707482694.060:1034): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.255:22-154.68.39.6:41829 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:54.666266 kubelet[1890]: E0209 12:44:54.666214 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:54.696000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.696000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.806413 systemd[1]: Started sshd@34-139.178.90.255:22-49.232.242.40:54042.service. Feb 9 12:44:54.856758 kernel: audit: type=1400 audit(1707482694.696:1035): avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.856793 kernel: audit: type=1300 audit(1707482694.696:1035): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.856811 kernel: audit: type=1327 audit(1707482694.696:1035): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.888699 kernel: audit: type=1400 audit(1707482694.696:1036): avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.696000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.951894 kernel: audit: type=1300 audit(1707482694.696:1036): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.696000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:55.047144 kernel: audit: type=1327 audit(1707482694.696:1036): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:55.078959 kernel: audit: type=1400 audit(1707482694.696:1037): avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.696000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:55.141921 kernel: audit: type=1300 audit(1707482694.696:1037): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.696000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:55.237144 kernel: audit: type=1327 audit(1707482694.696:1037): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.696000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.696000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.696000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.696000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.696000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.696000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.696000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.696000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.696000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.696000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.697000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.697000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.697000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.697000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.697000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.697000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.697000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.697000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.697000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.697000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.697000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.697000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.697000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.697000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.697000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.697000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.697000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.697000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.255:22-49.232.242.40:54042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:54.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:54.888000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:54.888000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:54.888000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:55.268000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:55.268000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:55.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:55.268000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:55.268000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:55.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:55.268000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:55.268000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:55.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:55.268000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:55.268000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:55.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:55.268000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:55.268000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:55.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:55.268000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:55.268000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:55.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:55.268000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:55.268000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:55.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:55.268000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:55.268000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:55.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:55.268000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:55.268000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:55.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:55.268000 audit[5816]: AVC avc: denied { bpf } for pid=5816 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:44:55.268000 audit[5816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff160069a0 a2=70 a3=7fff16006ac0 items=0 ppid=5788 pid=5816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:44:55.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:44:55.623607 sshd[5818]: Invalid user shishkina from 49.232.242.40 port 54042 Feb 9 12:44:55.625749 sshd[5818]: pam_faillock(sshd:auth): User unknown Feb 9 12:44:55.626031 sshd[5818]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:44:55.626056 sshd[5818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.242.40 Feb 9 12:44:55.626304 sshd[5818]: pam_faillock(sshd:auth): User unknown Feb 9 12:44:55.625000 audit[5818]: USER_AUTH pid=5818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="shishkina" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:44:55.666795 kubelet[1890]: E0209 12:44:55.666675 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:56.195766 sshd[5784]: Invalid user asancar from 154.68.39.6 port 41829 Feb 9 12:44:56.201834 sshd[5784]: pam_faillock(sshd:auth): User unknown Feb 9 12:44:56.202801 sshd[5784]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:44:56.202883 sshd[5784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 12:44:56.203764 sshd[5784]: pam_faillock(sshd:auth): User unknown Feb 9 12:44:56.203000 audit[5784]: USER_AUTH pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="asancar" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 12:44:56.667693 kubelet[1890]: E0209 12:44:56.667574 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:57.317114 sshd[5818]: Failed password for invalid user shishkina from 49.232.242.40 port 54042 ssh2 Feb 9 12:44:57.668814 kubelet[1890]: E0209 12:44:57.668581 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:57.698797 sshd[5784]: Failed password for invalid user asancar from 154.68.39.6 port 41829 ssh2 Feb 9 12:44:58.669472 kubelet[1890]: E0209 12:44:58.669360 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:44:58.762635 sshd[5784]: Received disconnect from 154.68.39.6 port 41829:11: Bye Bye [preauth] Feb 9 12:44:58.762635 sshd[5784]: Disconnected from invalid user asancar 154.68.39.6 port 41829 [preauth] Feb 9 12:44:58.765158 systemd[1]: sshd@33-139.178.90.255:22-154.68.39.6:41829.service: Deactivated successfully. Feb 9 12:44:58.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.255:22-154.68.39.6:41829 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:58.960812 sshd[5818]: Received disconnect from 49.232.242.40 port 54042:11: Bye Bye [preauth] Feb 9 12:44:58.960812 sshd[5818]: Disconnected from invalid user shishkina 49.232.242.40 port 54042 [preauth] Feb 9 12:44:58.963418 systemd[1]: sshd@34-139.178.90.255:22-49.232.242.40:54042.service: Deactivated successfully. Feb 9 12:44:58.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.255:22-49.232.242.40:54042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:44:59.670128 kubelet[1890]: E0209 12:44:59.669993 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:00.671185 kubelet[1890]: E0209 12:45:00.671076 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:01.671953 kubelet[1890]: E0209 12:45:01.671845 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:02.672629 kubelet[1890]: E0209 12:45:02.672521 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:03.672876 kubelet[1890]: E0209 12:45:03.672807 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:04.350201 kubelet[1890]: E0209 12:45:04.350096 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:04.673496 kubelet[1890]: E0209 12:45:04.673290 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:05.673978 kubelet[1890]: E0209 12:45:05.673906 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:06.674665 kubelet[1890]: E0209 12:45:06.674552 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:07.675913 kubelet[1890]: E0209 12:45:07.675783 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:08.676829 kubelet[1890]: E0209 12:45:08.676753 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:09.677134 kubelet[1890]: E0209 12:45:09.677030 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:10.678008 kubelet[1890]: E0209 12:45:10.677900 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:11.679144 kubelet[1890]: E0209 12:45:11.679034 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:12.679783 kubelet[1890]: E0209 12:45:12.679624 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:13.681067 kubelet[1890]: E0209 12:45:13.680953 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:14.682142 kubelet[1890]: E0209 12:45:14.682025 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:15.682461 kubelet[1890]: E0209 12:45:15.682354 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:16.683541 kubelet[1890]: E0209 12:45:16.683454 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:17.683982 kubelet[1890]: E0209 12:45:17.683904 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:18.684834 kubelet[1890]: E0209 12:45:18.684698 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:19.685610 kubelet[1890]: E0209 12:45:19.685529 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:20.686189 kubelet[1890]: E0209 12:45:20.686107 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:21.687457 kubelet[1890]: E0209 12:45:21.687343 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:22.688415 kubelet[1890]: E0209 12:45:22.688306 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:23.689157 kubelet[1890]: E0209 12:45:23.689073 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:24.350170 kubelet[1890]: E0209 12:45:24.350094 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:24.690357 kubelet[1890]: E0209 12:45:24.690171 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:25.690776 kubelet[1890]: E0209 12:45:25.690746 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:25.691000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.719628 kernel: kauditd_printk_skb: 80 callbacks suppressed Feb 9 12:45:25.719666 kernel: audit: type=1400 audit(1707482725.691:1068): avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.691000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.878113 kernel: audit: type=1300 audit(1707482725.691:1068): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.878145 kernel: audit: type=1327 audit(1707482725.691:1068): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.691000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.909914 kernel: audit: type=1400 audit(1707482725.692:1069): avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.692000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.973109 kernel: audit: type=1300 audit(1707482725.692:1069): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.692000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:26.068191 kernel: audit: type=1327 audit(1707482725.692:1069): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.692000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:26.100074 kernel: audit: type=1400 audit(1707482725.692:1070): avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.692000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:26.162912 kernel: audit: type=1300 audit(1707482725.692:1070): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.692000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:26.257442 kernel: audit: type=1327 audit(1707482725.692:1070): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.692000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:26.289006 kernel: audit: type=1400 audit(1707482725.692:1071): avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.692000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.692000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.692000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.692000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.692000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.692000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.692000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.692000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.692000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.692000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.692000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.692000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.692000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.692000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.692000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.692000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.692000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.692000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.692000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.692000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.692000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.692000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.692000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.692000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.693000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.693000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.693000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.693000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.693000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.693000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.693000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.693000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.693000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.693000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.693000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.693000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:25.909000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:25.909000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:25.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:26.350000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:26.350000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:26.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:26.350000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:26.350000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:26.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:26.350000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:26.350000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:26.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:26.350000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:26.350000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:26.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:26.350000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:26.350000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:26.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:26.351000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:26.351000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:26.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:26.351000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:26.351000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:26.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:26.351000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:26.351000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:26.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:26.351000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:26.351000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:26.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:26.351000 audit[6091]: AVC avc: denied { bpf } for pid=6091 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:26.351000 audit[6091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff722aa390 a2=70 a3=7fff722aa4b0 items=0 ppid=6063 pid=6091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:26.351000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:26.692037 kubelet[1890]: E0209 12:45:26.691828 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:27.693057 kubelet[1890]: E0209 12:45:27.692938 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:28.694213 kubelet[1890]: E0209 12:45:28.694106 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:29.694581 kubelet[1890]: E0209 12:45:29.694475 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:30.256792 systemd[1]: Started sshd@35-139.178.90.255:22-49.232.242.40:34932.service. Feb 9 12:45:30.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.255:22-49.232.242.40:34932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:30.695247 kubelet[1890]: E0209 12:45:30.695025 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:31.106429 sshd[6141]: Invalid user vida from 49.232.242.40 port 34932 Feb 9 12:45:31.112553 sshd[6141]: pam_faillock(sshd:auth): User unknown Feb 9 12:45:31.113536 sshd[6141]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:45:31.113624 sshd[6141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.242.40 Feb 9 12:45:31.114528 sshd[6141]: pam_faillock(sshd:auth): User unknown Feb 9 12:45:31.113000 audit[6141]: USER_AUTH pid=6141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="vida" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:45:31.141999 kernel: kauditd_printk_skb: 75 callbacks suppressed Feb 9 12:45:31.142078 kernel: audit: type=1100 audit(1707482731.113:1097): pid=6141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="vida" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:45:31.696127 kubelet[1890]: E0209 12:45:31.696024 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:32.414118 sshd[6141]: Failed password for invalid user vida from 49.232.242.40 port 34932 ssh2 Feb 9 12:45:32.613647 sshd[6141]: Received disconnect from 49.232.242.40 port 34932:11: Bye Bye [preauth] Feb 9 12:45:32.613647 sshd[6141]: Disconnected from invalid user vida 49.232.242.40 port 34932 [preauth] Feb 9 12:45:32.616161 systemd[1]: sshd@35-139.178.90.255:22-49.232.242.40:34932.service: Deactivated successfully. Feb 9 12:45:32.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.255:22-49.232.242.40:34932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:32.696969 kubelet[1890]: E0209 12:45:32.696900 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:32.705944 kernel: audit: type=1131 audit(1707482732.615:1098): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.255:22-49.232.242.40:34932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:33.698159 kubelet[1890]: E0209 12:45:33.698052 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:34.698886 kubelet[1890]: E0209 12:45:34.698775 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:35.293696 systemd[1]: Started sshd@36-139.178.90.255:22-92.114.19.110:41294.service. Feb 9 12:45:35.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.255:22-92.114.19.110:41294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:35.382942 kernel: audit: type=1130 audit(1707482735.293:1099): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.255:22-92.114.19.110:41294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:35.700027 kubelet[1890]: E0209 12:45:35.699815 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:36.523635 sshd[6191]: Invalid user heli from 92.114.19.110 port 41294 Feb 9 12:45:36.525895 sshd[6191]: pam_faillock(sshd:auth): User unknown Feb 9 12:45:36.526261 sshd[6191]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:45:36.526293 sshd[6191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.114.19.110 Feb 9 12:45:36.526591 sshd[6191]: pam_faillock(sshd:auth): User unknown Feb 9 12:45:36.525000 audit[6191]: USER_AUTH pid=6191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="heli" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:45:36.615952 kernel: audit: type=1100 audit(1707482736.525:1100): pid=6191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="heli" exe="/usr/sbin/sshd" hostname=92.114.19.110 addr=92.114.19.110 terminal=ssh res=failed' Feb 9 12:45:36.700917 kubelet[1890]: E0209 12:45:36.700846 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:37.702102 kubelet[1890]: E0209 12:45:37.701978 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:38.181892 sshd[6191]: Failed password for invalid user heli from 92.114.19.110 port 41294 ssh2 Feb 9 12:45:38.702370 kubelet[1890]: E0209 12:45:38.702250 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:39.360383 sshd[6191]: Received disconnect from 92.114.19.110 port 41294:11: Bye Bye [preauth] Feb 9 12:45:39.360383 sshd[6191]: Disconnected from invalid user heli 92.114.19.110 port 41294 [preauth] Feb 9 12:45:39.362980 systemd[1]: sshd@36-139.178.90.255:22-92.114.19.110:41294.service: Deactivated successfully. Feb 9 12:45:39.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.255:22-92.114.19.110:41294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:39.452927 kernel: audit: type=1131 audit(1707482739.362:1101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.255:22-92.114.19.110:41294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:39.702662 kubelet[1890]: E0209 12:45:39.702564 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:40.703780 kubelet[1890]: E0209 12:45:40.703665 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:41.245070 systemd[1]: Started sshd@37-139.178.90.255:22-43.134.226.170:38686.service. Feb 9 12:45:41.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.255:22-43.134.226.170:38686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:41.335839 kernel: audit: type=1130 audit(1707482741.244:1102): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.255:22-43.134.226.170:38686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:41.704385 kubelet[1890]: E0209 12:45:41.704181 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:42.276801 sshd[6245]: Invalid user origin from 43.134.226.170 port 38686 Feb 9 12:45:42.282757 sshd[6245]: pam_faillock(sshd:auth): User unknown Feb 9 12:45:42.283696 sshd[6245]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:45:42.283818 sshd[6245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.226.170 Feb 9 12:45:42.284697 sshd[6245]: pam_faillock(sshd:auth): User unknown Feb 9 12:45:42.284000 audit[6245]: USER_AUTH pid=6245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="origin" exe="/usr/sbin/sshd" hostname=43.134.226.170 addr=43.134.226.170 terminal=ssh res=failed' Feb 9 12:45:42.375945 kernel: audit: type=1100 audit(1707482742.284:1103): pid=6245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="origin" exe="/usr/sbin/sshd" hostname=43.134.226.170 addr=43.134.226.170 terminal=ssh res=failed' Feb 9 12:45:42.705422 kubelet[1890]: E0209 12:45:42.705223 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:43.705624 kubelet[1890]: E0209 12:45:43.705564 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:44.095917 sshd[6245]: Failed password for invalid user origin from 43.134.226.170 port 38686 ssh2 Feb 9 12:45:44.350368 kubelet[1890]: E0209 12:45:44.350169 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:44.706723 kubelet[1890]: E0209 12:45:44.706520 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:45.119284 sshd[6245]: Received disconnect from 43.134.226.170 port 38686:11: Bye Bye [preauth] Feb 9 12:45:45.119284 sshd[6245]: Disconnected from invalid user origin 43.134.226.170 port 38686 [preauth] Feb 9 12:45:45.121832 systemd[1]: sshd@37-139.178.90.255:22-43.134.226.170:38686.service: Deactivated successfully. Feb 9 12:45:45.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.255:22-43.134.226.170:38686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:45.213832 kernel: audit: type=1131 audit(1707482745.121:1104): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.255:22-43.134.226.170:38686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:45:45.707261 kubelet[1890]: E0209 12:45:45.707187 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:46.708383 kubelet[1890]: E0209 12:45:46.708310 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:47.709110 kubelet[1890]: E0209 12:45:47.708992 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:48.710145 kubelet[1890]: E0209 12:45:48.710070 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:49.710294 kubelet[1890]: E0209 12:45:49.710220 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:50.710943 kubelet[1890]: E0209 12:45:50.710891 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:51.711831 kubelet[1890]: E0209 12:45:51.711699 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:52.712552 kubelet[1890]: E0209 12:45:52.712455 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:53.713152 kubelet[1890]: E0209 12:45:53.713052 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:54.714138 kubelet[1890]: E0209 12:45:54.714009 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:55.715037 kubelet[1890]: E0209 12:45:55.714925 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:56.715719 kubelet[1890]: E0209 12:45:56.715608 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.964409 kernel: audit: type=1400 audit(1707482756.804:1105): avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.964449 kernel: audit: type=1300 audit(1707482756.804:1105): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.964467 kernel: audit: type=1327 audit(1707482756.804:1105): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.996201 kernel: audit: type=1400 audit(1707482756.804:1106): avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:57.059158 kernel: audit: type=1300 audit(1707482756.804:1106): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:57.154417 kernel: audit: type=1327 audit(1707482756.804:1106): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:57.186217 kernel: audit: type=1400 audit(1707482756.804:1107): avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:57.249133 kernel: audit: type=1300 audit(1707482756.804:1107): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:57.344333 kernel: audit: type=1327 audit(1707482756.804:1107): proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:57.376121 kernel: audit: type=1400 audit(1707482756.804:1108): avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.804000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.804000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:56.994000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:56.994000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:56.994000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:57.437000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:57.437000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:57.437000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:57.437000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:57.437000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:57.437000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:57.437000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:57.437000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:57.437000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:57.437000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:57.437000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:57.437000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:57.437000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:57.437000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:57.437000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:57.437000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:57.437000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:57.437000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:57.437000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:57.437000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:57.437000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:57.437000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:57.437000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:57.437000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:57.437000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:57.437000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:57.437000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:57.437000 audit[6350]: AVC avc: denied { bpf } for pid=6350 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 12:45:57.437000 audit[6350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d246c20 a2=70 a3=7ffe1d246d40 items=0 ppid=6321 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 12:45:57.437000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Feb 9 12:45:57.716001 kubelet[1890]: E0209 12:45:57.715786 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:58.716109 kubelet[1890]: E0209 12:45:58.716007 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:45:59.716581 kubelet[1890]: E0209 12:45:59.716459 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:46:00.717332 kubelet[1890]: E0209 12:46:00.717227 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:46:01.718098 kubelet[1890]: E0209 12:46:01.717990 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:46:02.719186 kubelet[1890]: E0209 12:46:02.719057 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:46:03.720071 kubelet[1890]: E0209 12:46:03.719966 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:46:04.350603 kubelet[1890]: E0209 12:46:04.350533 1890 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:46:04.720619 kubelet[1890]: E0209 12:46:04.720407 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:46:05.721564 kubelet[1890]: E0209 12:46:05.721494 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:46:06.722257 kubelet[1890]: E0209 12:46:06.722158 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:46:07.722534 kubelet[1890]: E0209 12:46:07.722422 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 12:46:07.740989 systemd[1]: Started sshd@38-139.178.90.255:22-49.232.242.40:44214.service. Feb 9 12:46:07.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.255:22-49.232.242.40:44214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:46:07.768131 kernel: kauditd_printk_skb: 74 callbacks suppressed Feb 9 12:46:07.768219 kernel: audit: type=1130 audit(1707482767.739:1133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.255:22-49.232.242.40:44214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 12:46:08.585028 sshd[6457]: Invalid user klwang from 49.232.242.40 port 44214 Feb 9 12:46:08.591097 sshd[6457]: pam_faillock(sshd:auth): User unknown Feb 9 12:46:08.592098 sshd[6457]: pam_unix(sshd:auth): check pass; user unknown Feb 9 12:46:08.592186 sshd[6457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.242.40 Feb 9 12:46:08.593101 sshd[6457]: pam_faillock(sshd:auth): User unknown Feb 9 12:46:08.591000 audit[6457]: USER_AUTH pid=6457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="klwang" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:46:08.684930 kernel: audit: type=1100 audit(1707482768.591:1134): pid=6457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="klwang" exe="/usr/sbin/sshd" hostname=49.232.242.40 addr=49.232.242.40 terminal=ssh res=failed' Feb 9 12:46:08.723581 kubelet[1890]: E0209 12:46:08.723530 1890 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"