Sep 13 00:45:59.656539 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 12 23:13:49 -00 2025 Sep 13 00:45:59.656555 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:45:59.656561 kernel: Disabled fast string operations Sep 13 00:45:59.656565 kernel: BIOS-provided physical RAM map: Sep 13 00:45:59.656569 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Sep 13 00:45:59.656573 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Sep 13 00:45:59.656579 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Sep 13 00:45:59.656583 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Sep 13 00:45:59.656588 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Sep 13 00:45:59.656592 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Sep 13 00:45:59.656596 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Sep 13 00:45:59.656600 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Sep 13 00:45:59.656604 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Sep 13 00:45:59.656608 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Sep 13 00:45:59.656623 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Sep 13 00:45:59.656627 kernel: NX (Execute Disable) protection: active Sep 13 00:45:59.656632 kernel: SMBIOS 2.7 present. Sep 13 00:45:59.656637 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Sep 13 00:45:59.656641 kernel: vmware: hypercall mode: 0x00 Sep 13 00:45:59.656646 kernel: Hypervisor detected: VMware Sep 13 00:45:59.656651 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Sep 13 00:45:59.656656 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Sep 13 00:45:59.656660 kernel: vmware: using clock offset of 3293581802 ns Sep 13 00:45:59.656664 kernel: tsc: Detected 3408.000 MHz processor Sep 13 00:45:59.656669 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 13 00:45:59.656674 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 13 00:45:59.656679 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Sep 13 00:45:59.656684 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 13 00:45:59.656688 kernel: total RAM covered: 3072M Sep 13 00:45:59.656694 kernel: Found optimal setting for mtrr clean up Sep 13 00:45:59.656699 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Sep 13 00:45:59.656704 kernel: Using GB pages for direct mapping Sep 13 00:45:59.656708 kernel: ACPI: Early table checksum verification disabled Sep 13 00:45:59.656713 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Sep 13 00:45:59.656718 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Sep 13 00:45:59.656722 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Sep 13 00:45:59.656727 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Sep 13 00:45:59.656732 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Sep 13 00:45:59.656736 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Sep 13 00:45:59.656742 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Sep 13 00:45:59.656749 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Sep 13 00:45:59.656754 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Sep 13 00:45:59.656759 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Sep 13 00:45:59.656764 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Sep 13 00:45:59.656770 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Sep 13 00:45:59.656775 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Sep 13 00:45:59.656780 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Sep 13 00:45:59.656785 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Sep 13 00:45:59.656790 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Sep 13 00:45:59.656794 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Sep 13 00:45:59.656803 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Sep 13 00:45:59.656808 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Sep 13 00:45:59.656813 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Sep 13 00:45:59.656819 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Sep 13 00:45:59.656824 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Sep 13 00:45:59.656829 kernel: system APIC only can use physical flat Sep 13 00:45:59.656834 kernel: Setting APIC routing to physical flat. Sep 13 00:45:59.656839 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 13 00:45:59.656844 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Sep 13 00:45:59.656849 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Sep 13 00:45:59.656854 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Sep 13 00:45:59.656859 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Sep 13 00:45:59.656865 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Sep 13 00:45:59.656870 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Sep 13 00:45:59.656875 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Sep 13 00:45:59.656879 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Sep 13 00:45:59.656884 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Sep 13 00:45:59.656889 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Sep 13 00:45:59.656894 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Sep 13 00:45:59.656899 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Sep 13 00:45:59.656904 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Sep 13 00:45:59.656908 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Sep 13 00:45:59.656914 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Sep 13 00:45:59.656919 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Sep 13 00:45:59.656924 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Sep 13 00:45:59.656929 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Sep 13 00:45:59.656934 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Sep 13 00:45:59.656938 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Sep 13 00:45:59.656943 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Sep 13 00:45:59.656948 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Sep 13 00:45:59.656953 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Sep 13 00:45:59.656958 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Sep 13 00:45:59.656964 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Sep 13 00:45:59.656969 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Sep 13 00:45:59.656974 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Sep 13 00:45:59.656978 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Sep 13 00:45:59.656983 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Sep 13 00:45:59.656988 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Sep 13 00:45:59.656993 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Sep 13 00:45:59.656998 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Sep 13 00:45:59.657003 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Sep 13 00:45:59.657008 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Sep 13 00:45:59.657014 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Sep 13 00:45:59.657018 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Sep 13 00:45:59.657023 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Sep 13 00:45:59.657028 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Sep 13 00:45:59.657033 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Sep 13 00:45:59.657038 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Sep 13 00:45:59.657043 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Sep 13 00:45:59.657048 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Sep 13 00:45:59.657053 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Sep 13 00:45:59.657058 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Sep 13 00:45:59.657064 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Sep 13 00:45:59.657069 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Sep 13 00:45:59.657074 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Sep 13 00:45:59.657079 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Sep 13 00:45:59.657084 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Sep 13 00:45:59.657089 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Sep 13 00:45:59.657094 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Sep 13 00:45:59.657099 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Sep 13 00:45:59.657104 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Sep 13 00:45:59.657110 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Sep 13 00:45:59.657115 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Sep 13 00:45:59.657119 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Sep 13 00:45:59.657124 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Sep 13 00:45:59.657129 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Sep 13 00:45:59.657134 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Sep 13 00:45:59.657139 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Sep 13 00:45:59.657149 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Sep 13 00:45:59.657155 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Sep 13 00:45:59.657160 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Sep 13 00:45:59.657165 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Sep 13 00:45:59.657170 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Sep 13 00:45:59.657177 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Sep 13 00:45:59.657182 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Sep 13 00:45:59.657187 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Sep 13 00:45:59.657192 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Sep 13 00:45:59.657197 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Sep 13 00:45:59.657203 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Sep 13 00:45:59.657209 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Sep 13 00:45:59.657214 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Sep 13 00:45:59.657220 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Sep 13 00:45:59.657225 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Sep 13 00:45:59.657230 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Sep 13 00:45:59.657235 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Sep 13 00:45:59.657240 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Sep 13 00:45:59.657246 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Sep 13 00:45:59.657251 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Sep 13 00:45:59.657256 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Sep 13 00:45:59.657262 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Sep 13 00:45:59.657268 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Sep 13 00:45:59.657273 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Sep 13 00:45:59.657278 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Sep 13 00:45:59.657283 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Sep 13 00:45:59.657288 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Sep 13 00:45:59.657293 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Sep 13 00:45:59.657299 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Sep 13 00:45:59.657304 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Sep 13 00:45:59.657309 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Sep 13 00:45:59.657315 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Sep 13 00:45:59.657321 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Sep 13 00:45:59.657326 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Sep 13 00:45:59.657331 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Sep 13 00:45:59.657336 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Sep 13 00:45:59.657342 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Sep 13 00:45:59.657347 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Sep 13 00:45:59.657352 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Sep 13 00:45:59.657357 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Sep 13 00:45:59.657362 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Sep 13 00:45:59.657368 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Sep 13 00:45:59.657374 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Sep 13 00:45:59.657379 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Sep 13 00:45:59.657384 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Sep 13 00:45:59.657389 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Sep 13 00:45:59.657395 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Sep 13 00:45:59.657400 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Sep 13 00:45:59.657405 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Sep 13 00:45:59.657411 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Sep 13 00:45:59.657416 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Sep 13 00:45:59.657422 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Sep 13 00:45:59.657428 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Sep 13 00:45:59.657433 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Sep 13 00:45:59.657438 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Sep 13 00:45:59.657443 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Sep 13 00:45:59.657448 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Sep 13 00:45:59.657454 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Sep 13 00:45:59.657459 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Sep 13 00:45:59.657464 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Sep 13 00:45:59.657470 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Sep 13 00:45:59.657475 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Sep 13 00:45:59.657481 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Sep 13 00:45:59.657486 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Sep 13 00:45:59.657491 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Sep 13 00:45:59.657496 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Sep 13 00:45:59.657502 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Sep 13 00:45:59.657507 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Sep 13 00:45:59.657512 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Sep 13 00:45:59.657518 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Sep 13 00:45:59.657524 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Sep 13 00:45:59.657530 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Sep 13 00:45:59.657535 kernel: Zone ranges: Sep 13 00:45:59.657541 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 13 00:45:59.657546 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Sep 13 00:45:59.657551 kernel: Normal empty Sep 13 00:45:59.657557 kernel: Movable zone start for each node Sep 13 00:45:59.657562 kernel: Early memory node ranges Sep 13 00:45:59.657567 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Sep 13 00:45:59.657574 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Sep 13 00:45:59.657579 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Sep 13 00:45:59.657585 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Sep 13 00:45:59.657590 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 13 00:45:59.657595 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Sep 13 00:45:59.657601 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Sep 13 00:45:59.657606 kernel: ACPI: PM-Timer IO Port: 0x1008 Sep 13 00:45:59.661218 kernel: system APIC only can use physical flat Sep 13 00:45:59.661231 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Sep 13 00:45:59.661238 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Sep 13 00:45:59.661246 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Sep 13 00:45:59.661251 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Sep 13 00:45:59.661256 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Sep 13 00:45:59.661262 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Sep 13 00:45:59.661267 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Sep 13 00:45:59.661273 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Sep 13 00:45:59.661278 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Sep 13 00:45:59.661283 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Sep 13 00:45:59.661288 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Sep 13 00:45:59.661295 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Sep 13 00:45:59.661300 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Sep 13 00:45:59.661306 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Sep 13 00:45:59.661311 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Sep 13 00:45:59.661316 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Sep 13 00:45:59.661322 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Sep 13 00:45:59.661327 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Sep 13 00:45:59.661332 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Sep 13 00:45:59.661338 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Sep 13 00:45:59.661343 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Sep 13 00:45:59.661349 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Sep 13 00:45:59.661354 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Sep 13 00:45:59.661360 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Sep 13 00:45:59.661365 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Sep 13 00:45:59.661371 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Sep 13 00:45:59.661376 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Sep 13 00:45:59.661381 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Sep 13 00:45:59.661387 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Sep 13 00:45:59.661392 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Sep 13 00:45:59.661398 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Sep 13 00:45:59.661404 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Sep 13 00:45:59.661409 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Sep 13 00:45:59.661414 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Sep 13 00:45:59.661420 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Sep 13 00:45:59.661425 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Sep 13 00:45:59.661430 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Sep 13 00:45:59.661435 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Sep 13 00:45:59.661441 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Sep 13 00:45:59.661448 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Sep 13 00:45:59.661453 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Sep 13 00:45:59.661458 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Sep 13 00:45:59.661464 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Sep 13 00:45:59.661469 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Sep 13 00:45:59.661475 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Sep 13 00:45:59.661480 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Sep 13 00:45:59.661485 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Sep 13 00:45:59.661490 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Sep 13 00:45:59.661496 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Sep 13 00:45:59.661502 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Sep 13 00:45:59.661508 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Sep 13 00:45:59.661513 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Sep 13 00:45:59.661518 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Sep 13 00:45:59.661524 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Sep 13 00:45:59.661529 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Sep 13 00:45:59.661534 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Sep 13 00:45:59.661540 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Sep 13 00:45:59.661545 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Sep 13 00:45:59.661551 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Sep 13 00:45:59.661557 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Sep 13 00:45:59.661562 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Sep 13 00:45:59.661567 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Sep 13 00:45:59.661573 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Sep 13 00:45:59.661578 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Sep 13 00:45:59.661583 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Sep 13 00:45:59.661589 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Sep 13 00:45:59.661594 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Sep 13 00:45:59.661599 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Sep 13 00:45:59.661606 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Sep 13 00:45:59.661629 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Sep 13 00:45:59.661637 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Sep 13 00:45:59.661643 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Sep 13 00:45:59.661891 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Sep 13 00:45:59.661898 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Sep 13 00:45:59.661904 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Sep 13 00:45:59.661910 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Sep 13 00:45:59.661915 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Sep 13 00:45:59.661922 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Sep 13 00:45:59.661928 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Sep 13 00:45:59.661933 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Sep 13 00:45:59.661939 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Sep 13 00:45:59.661944 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Sep 13 00:45:59.661949 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Sep 13 00:45:59.661955 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Sep 13 00:45:59.661960 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Sep 13 00:45:59.661965 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Sep 13 00:45:59.661972 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Sep 13 00:45:59.661977 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Sep 13 00:45:59.661982 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Sep 13 00:45:59.661988 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Sep 13 00:45:59.661993 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Sep 13 00:45:59.661998 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Sep 13 00:45:59.662004 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Sep 13 00:45:59.662009 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Sep 13 00:45:59.662015 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Sep 13 00:45:59.662020 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Sep 13 00:45:59.662026 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Sep 13 00:45:59.662032 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Sep 13 00:45:59.662037 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Sep 13 00:45:59.662043 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Sep 13 00:45:59.662048 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Sep 13 00:45:59.662053 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Sep 13 00:45:59.662059 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Sep 13 00:45:59.662064 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Sep 13 00:45:59.662069 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Sep 13 00:45:59.662075 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Sep 13 00:45:59.662081 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Sep 13 00:45:59.662086 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Sep 13 00:45:59.662091 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Sep 13 00:45:59.662097 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Sep 13 00:45:59.662102 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Sep 13 00:45:59.662107 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Sep 13 00:45:59.662113 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Sep 13 00:45:59.662118 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Sep 13 00:45:59.662123 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Sep 13 00:45:59.662129 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Sep 13 00:45:59.662135 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Sep 13 00:45:59.662140 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Sep 13 00:45:59.662146 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Sep 13 00:45:59.662151 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Sep 13 00:45:59.662156 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Sep 13 00:45:59.662161 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Sep 13 00:45:59.662167 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Sep 13 00:45:59.662172 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Sep 13 00:45:59.662178 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Sep 13 00:45:59.662184 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Sep 13 00:45:59.662189 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Sep 13 00:45:59.662194 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Sep 13 00:45:59.662200 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Sep 13 00:45:59.662205 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Sep 13 00:45:59.662210 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 13 00:45:59.662216 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Sep 13 00:45:59.662221 kernel: TSC deadline timer available Sep 13 00:45:59.662228 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Sep 13 00:45:59.662233 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Sep 13 00:45:59.662239 kernel: Booting paravirtualized kernel on VMware hypervisor Sep 13 00:45:59.662244 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 13 00:45:59.662250 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Sep 13 00:45:59.662256 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Sep 13 00:45:59.662261 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Sep 13 00:45:59.662267 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Sep 13 00:45:59.662272 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Sep 13 00:45:59.662279 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Sep 13 00:45:59.662284 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Sep 13 00:45:59.662289 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Sep 13 00:45:59.662294 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Sep 13 00:45:59.662300 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Sep 13 00:45:59.662312 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Sep 13 00:45:59.662318 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Sep 13 00:45:59.662324 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Sep 13 00:45:59.662330 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Sep 13 00:45:59.662336 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Sep 13 00:45:59.662342 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Sep 13 00:45:59.662347 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Sep 13 00:45:59.662353 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Sep 13 00:45:59.662358 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Sep 13 00:45:59.662364 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Sep 13 00:45:59.662370 kernel: Policy zone: DMA32 Sep 13 00:45:59.662377 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:45:59.662384 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 00:45:59.662389 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Sep 13 00:45:59.662395 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Sep 13 00:45:59.662401 kernel: printk: log_buf_len min size: 262144 bytes Sep 13 00:45:59.662408 kernel: printk: log_buf_len: 1048576 bytes Sep 13 00:45:59.662413 kernel: printk: early log buf free: 239728(91%) Sep 13 00:45:59.662445 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 13 00:45:59.662454 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 13 00:45:59.662461 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 00:45:59.662469 kernel: Memory: 1940392K/2096628K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 155976K reserved, 0K cma-reserved) Sep 13 00:45:59.662475 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Sep 13 00:45:59.662481 kernel: ftrace: allocating 34614 entries in 136 pages Sep 13 00:45:59.662496 kernel: ftrace: allocated 136 pages with 2 groups Sep 13 00:45:59.662504 kernel: rcu: Hierarchical RCU implementation. Sep 13 00:45:59.662511 kernel: rcu: RCU event tracing is enabled. Sep 13 00:45:59.662517 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Sep 13 00:45:59.662523 kernel: Rude variant of Tasks RCU enabled. Sep 13 00:45:59.662529 kernel: Tracing variant of Tasks RCU enabled. Sep 13 00:45:59.662535 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 00:45:59.662541 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Sep 13 00:45:59.662546 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Sep 13 00:45:59.662552 kernel: random: crng init done Sep 13 00:45:59.662558 kernel: Console: colour VGA+ 80x25 Sep 13 00:45:59.662564 kernel: printk: console [tty0] enabled Sep 13 00:45:59.662570 kernel: printk: console [ttyS0] enabled Sep 13 00:45:59.662576 kernel: ACPI: Core revision 20210730 Sep 13 00:45:59.662582 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Sep 13 00:45:59.662588 kernel: APIC: Switch to symmetric I/O mode setup Sep 13 00:45:59.662593 kernel: x2apic enabled Sep 13 00:45:59.662599 kernel: Switched APIC routing to physical x2apic. Sep 13 00:45:59.662605 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Sep 13 00:45:59.662616 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Sep 13 00:45:59.662622 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Sep 13 00:45:59.662629 kernel: Disabled fast string operations Sep 13 00:45:59.662635 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Sep 13 00:45:59.662641 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Sep 13 00:45:59.662647 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 13 00:45:59.662653 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Sep 13 00:45:59.662659 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Sep 13 00:45:59.662665 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Sep 13 00:45:59.662670 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Sep 13 00:45:59.662677 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Sep 13 00:45:59.662683 kernel: RETBleed: Mitigation: Enhanced IBRS Sep 13 00:45:59.662689 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 13 00:45:59.662695 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Sep 13 00:45:59.662701 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:45:59.662706 kernel: SRBDS: Unknown: Dependent on hypervisor status Sep 13 00:45:59.662712 kernel: GDS: Unknown: Dependent on hypervisor status Sep 13 00:45:59.662718 kernel: active return thunk: its_return_thunk Sep 13 00:45:59.662723 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 13 00:45:59.662730 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 13 00:45:59.662736 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 13 00:45:59.662742 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 13 00:45:59.662747 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 13 00:45:59.662753 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Sep 13 00:45:59.662759 kernel: Freeing SMP alternatives memory: 32K Sep 13 00:45:59.662765 kernel: pid_max: default: 131072 minimum: 1024 Sep 13 00:45:59.662770 kernel: LSM: Security Framework initializing Sep 13 00:45:59.662776 kernel: SELinux: Initializing. Sep 13 00:45:59.662783 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 13 00:45:59.662789 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 13 00:45:59.662795 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Sep 13 00:45:59.662801 kernel: Performance Events: Skylake events, core PMU driver. Sep 13 00:45:59.662807 kernel: core: CPUID marked event: 'cpu cycles' unavailable Sep 13 00:45:59.662813 kernel: core: CPUID marked event: 'instructions' unavailable Sep 13 00:45:59.662819 kernel: core: CPUID marked event: 'bus cycles' unavailable Sep 13 00:45:59.662825 kernel: core: CPUID marked event: 'cache references' unavailable Sep 13 00:45:59.662830 kernel: core: CPUID marked event: 'cache misses' unavailable Sep 13 00:45:59.662836 kernel: core: CPUID marked event: 'branch instructions' unavailable Sep 13 00:45:59.662842 kernel: core: CPUID marked event: 'branch misses' unavailable Sep 13 00:45:59.662848 kernel: ... version: 1 Sep 13 00:45:59.662853 kernel: ... bit width: 48 Sep 13 00:45:59.662859 kernel: ... generic registers: 4 Sep 13 00:45:59.662865 kernel: ... value mask: 0000ffffffffffff Sep 13 00:45:59.662871 kernel: ... max period: 000000007fffffff Sep 13 00:45:59.662876 kernel: ... fixed-purpose events: 0 Sep 13 00:45:59.662882 kernel: ... event mask: 000000000000000f Sep 13 00:45:59.662888 kernel: signal: max sigframe size: 1776 Sep 13 00:45:59.662894 kernel: rcu: Hierarchical SRCU implementation. Sep 13 00:45:59.662900 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 13 00:45:59.662906 kernel: smp: Bringing up secondary CPUs ... Sep 13 00:45:59.662911 kernel: x86: Booting SMP configuration: Sep 13 00:45:59.662917 kernel: .... node #0, CPUs: #1 Sep 13 00:45:59.662923 kernel: Disabled fast string operations Sep 13 00:45:59.662929 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Sep 13 00:45:59.662935 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Sep 13 00:45:59.662941 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 00:45:59.662947 kernel: smpboot: Max logical packages: 128 Sep 13 00:45:59.662953 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Sep 13 00:45:59.662958 kernel: devtmpfs: initialized Sep 13 00:45:59.662964 kernel: x86/mm: Memory block size: 128MB Sep 13 00:45:59.662970 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Sep 13 00:45:59.662976 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 00:45:59.662981 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Sep 13 00:45:59.662987 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 00:45:59.662994 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 00:45:59.663000 kernel: audit: initializing netlink subsys (disabled) Sep 13 00:45:59.663006 kernel: audit: type=2000 audit(1757724358.084:1): state=initialized audit_enabled=0 res=1 Sep 13 00:45:59.663011 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 00:45:59.663017 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 13 00:45:59.663023 kernel: cpuidle: using governor menu Sep 13 00:45:59.663028 kernel: Simple Boot Flag at 0x36 set to 0x80 Sep 13 00:45:59.663034 kernel: ACPI: bus type PCI registered Sep 13 00:45:59.663040 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 00:45:59.663045 kernel: dca service started, version 1.12.1 Sep 13 00:45:59.663052 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Sep 13 00:45:59.663058 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Sep 13 00:45:59.663064 kernel: PCI: Using configuration type 1 for base access Sep 13 00:45:59.663070 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 13 00:45:59.663075 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 00:45:59.663081 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 00:45:59.663087 kernel: ACPI: Added _OSI(Module Device) Sep 13 00:45:59.663093 kernel: ACPI: Added _OSI(Processor Device) Sep 13 00:45:59.663099 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 00:45:59.663106 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 00:45:59.663112 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 00:45:59.663117 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 00:45:59.663123 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 00:45:59.663129 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Sep 13 00:45:59.663135 kernel: ACPI: Interpreter enabled Sep 13 00:45:59.663141 kernel: ACPI: PM: (supports S0 S1 S5) Sep 13 00:45:59.663147 kernel: ACPI: Using IOAPIC for interrupt routing Sep 13 00:45:59.663152 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 13 00:45:59.663159 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Sep 13 00:45:59.663165 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Sep 13 00:45:59.663243 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 13 00:45:59.663297 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Sep 13 00:45:59.663345 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Sep 13 00:45:59.663354 kernel: PCI host bridge to bus 0000:00 Sep 13 00:45:59.663404 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 13 00:45:59.663453 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] Sep 13 00:45:59.663496 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Sep 13 00:45:59.663538 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 13 00:45:59.663581 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Sep 13 00:45:59.663638 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Sep 13 00:45:59.663698 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Sep 13 00:45:59.663758 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Sep 13 00:45:59.663812 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Sep 13 00:45:59.663866 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Sep 13 00:45:59.663916 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Sep 13 00:45:59.663965 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Sep 13 00:45:59.664015 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Sep 13 00:45:59.664065 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Sep 13 00:45:59.664115 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Sep 13 00:45:59.664167 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Sep 13 00:45:59.664216 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Sep 13 00:45:59.664264 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Sep 13 00:45:59.664316 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Sep 13 00:45:59.664366 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Sep 13 00:45:59.664416 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Sep 13 00:45:59.664469 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Sep 13 00:45:59.664518 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Sep 13 00:45:59.664565 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Sep 13 00:45:59.664619 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Sep 13 00:45:59.664675 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Sep 13 00:45:59.664724 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 13 00:45:59.664779 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Sep 13 00:45:59.666705 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.666769 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.666829 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.666892 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.666949 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.667002 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.667055 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.667105 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.667156 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.667205 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.667257 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.667308 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.667360 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.667409 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.667462 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.667511 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.667563 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.669821 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.669892 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.669946 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.670008 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.670060 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.670113 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.670165 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.670217 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.670266 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.670318 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.670367 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.670419 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.670471 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.670524 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.670573 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.670856 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.670915 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.670969 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.671022 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.671076 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.671125 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.671175 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.671224 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.671276 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.671328 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.671380 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.671428 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.671479 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.671527 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.671579 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.672898 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.672963 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.673015 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.673071 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.673760 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.673821 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.673872 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.673932 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.673983 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.674035 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.674084 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.674136 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.674185 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.674240 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.674289 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.674340 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Sep 13 00:45:59.674389 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.674441 kernel: pci_bus 0000:01: extended config space not accessible Sep 13 00:45:59.674492 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Sep 13 00:45:59.674546 kernel: pci_bus 0000:02: extended config space not accessible Sep 13 00:45:59.674555 kernel: acpiphp: Slot [32] registered Sep 13 00:45:59.674561 kernel: acpiphp: Slot [33] registered Sep 13 00:45:59.674567 kernel: acpiphp: Slot [34] registered Sep 13 00:45:59.674573 kernel: acpiphp: Slot [35] registered Sep 13 00:45:59.674579 kernel: acpiphp: Slot [36] registered Sep 13 00:45:59.674585 kernel: acpiphp: Slot [37] registered Sep 13 00:45:59.674591 kernel: acpiphp: Slot [38] registered Sep 13 00:45:59.674597 kernel: acpiphp: Slot [39] registered Sep 13 00:45:59.674604 kernel: acpiphp: Slot [40] registered Sep 13 00:45:59.674610 kernel: acpiphp: Slot [41] registered Sep 13 00:45:59.681857 kernel: acpiphp: Slot [42] registered Sep 13 00:45:59.681866 kernel: acpiphp: Slot [43] registered Sep 13 00:45:59.681873 kernel: acpiphp: Slot [44] registered Sep 13 00:45:59.681879 kernel: acpiphp: Slot [45] registered Sep 13 00:45:59.681885 kernel: acpiphp: Slot [46] registered Sep 13 00:45:59.681890 kernel: acpiphp: Slot [47] registered Sep 13 00:45:59.681896 kernel: acpiphp: Slot [48] registered Sep 13 00:45:59.681902 kernel: acpiphp: Slot [49] registered Sep 13 00:45:59.681913 kernel: acpiphp: Slot [50] registered Sep 13 00:45:59.681919 kernel: acpiphp: Slot [51] registered Sep 13 00:45:59.681925 kernel: acpiphp: Slot [52] registered Sep 13 00:45:59.681931 kernel: acpiphp: Slot [53] registered Sep 13 00:45:59.681936 kernel: acpiphp: Slot [54] registered Sep 13 00:45:59.681943 kernel: acpiphp: Slot [55] registered Sep 13 00:45:59.681948 kernel: acpiphp: Slot [56] registered Sep 13 00:45:59.681954 kernel: acpiphp: Slot [57] registered Sep 13 00:45:59.681959 kernel: acpiphp: Slot [58] registered Sep 13 00:45:59.681967 kernel: acpiphp: Slot [59] registered Sep 13 00:45:59.681972 kernel: acpiphp: Slot [60] registered Sep 13 00:45:59.681978 kernel: acpiphp: Slot [61] registered Sep 13 00:45:59.681984 kernel: acpiphp: Slot [62] registered Sep 13 00:45:59.681989 kernel: acpiphp: Slot [63] registered Sep 13 00:45:59.682068 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Sep 13 00:45:59.682123 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Sep 13 00:45:59.682172 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Sep 13 00:45:59.682221 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Sep 13 00:45:59.682272 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Sep 13 00:45:59.682320 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) Sep 13 00:45:59.682368 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Sep 13 00:45:59.682415 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Sep 13 00:45:59.682462 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Sep 13 00:45:59.682520 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Sep 13 00:45:59.682572 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Sep 13 00:45:59.682637 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Sep 13 00:45:59.682688 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Sep 13 00:45:59.682737 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Sep 13 00:45:59.682787 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Sep 13 00:45:59.682837 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Sep 13 00:45:59.682885 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Sep 13 00:45:59.682933 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Sep 13 00:45:59.682985 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Sep 13 00:45:59.683033 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Sep 13 00:45:59.683081 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Sep 13 00:45:59.683128 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Sep 13 00:45:59.683178 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Sep 13 00:45:59.683226 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Sep 13 00:45:59.683273 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Sep 13 00:45:59.683321 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Sep 13 00:45:59.683373 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Sep 13 00:45:59.683422 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Sep 13 00:45:59.683471 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Sep 13 00:45:59.683520 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Sep 13 00:45:59.683568 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Sep 13 00:45:59.683627 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Sep 13 00:45:59.683684 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Sep 13 00:45:59.683734 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Sep 13 00:45:59.683782 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Sep 13 00:45:59.683832 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Sep 13 00:45:59.683881 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Sep 13 00:45:59.683928 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Sep 13 00:45:59.683980 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Sep 13 00:45:59.684028 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Sep 13 00:45:59.684076 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Sep 13 00:45:59.684131 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Sep 13 00:45:59.684182 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Sep 13 00:45:59.684233 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Sep 13 00:45:59.684282 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Sep 13 00:45:59.684333 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Sep 13 00:45:59.684382 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Sep 13 00:45:59.684432 kernel: pci 0000:0b:00.0: supports D1 D2 Sep 13 00:45:59.684481 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 13 00:45:59.684531 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Sep 13 00:45:59.684580 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Sep 13 00:45:59.684640 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Sep 13 00:45:59.684691 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Sep 13 00:45:59.684744 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Sep 13 00:45:59.684793 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Sep 13 00:45:59.684845 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Sep 13 00:45:59.684894 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Sep 13 00:45:59.684944 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Sep 13 00:45:59.684992 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Sep 13 00:45:59.685040 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Sep 13 00:45:59.685089 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Sep 13 00:45:59.685141 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Sep 13 00:45:59.685190 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Sep 13 00:45:59.685238 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Sep 13 00:45:59.685287 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Sep 13 00:45:59.685335 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Sep 13 00:45:59.685383 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Sep 13 00:45:59.685433 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Sep 13 00:45:59.685481 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Sep 13 00:45:59.685532 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Sep 13 00:45:59.685582 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Sep 13 00:45:59.688949 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Sep 13 00:45:59.689009 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Sep 13 00:45:59.689063 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Sep 13 00:45:59.689113 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Sep 13 00:45:59.689162 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Sep 13 00:45:59.689212 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Sep 13 00:45:59.689264 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Sep 13 00:45:59.689314 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Sep 13 00:45:59.689362 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Sep 13 00:45:59.689412 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Sep 13 00:45:59.689460 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Sep 13 00:45:59.689508 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Sep 13 00:45:59.689556 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Sep 13 00:45:59.689608 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Sep 13 00:45:59.689672 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Sep 13 00:45:59.689721 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Sep 13 00:45:59.689769 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Sep 13 00:45:59.689820 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Sep 13 00:45:59.689869 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Sep 13 00:45:59.689917 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Sep 13 00:45:59.689968 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Sep 13 00:45:59.690020 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Sep 13 00:45:59.691130 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Sep 13 00:45:59.691190 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Sep 13 00:45:59.691242 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Sep 13 00:45:59.691291 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Sep 13 00:45:59.691342 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Sep 13 00:45:59.691391 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Sep 13 00:45:59.691439 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Sep 13 00:45:59.691509 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Sep 13 00:45:59.691558 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Sep 13 00:45:59.691606 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Sep 13 00:45:59.691750 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Sep 13 00:45:59.691799 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Sep 13 00:45:59.691852 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Sep 13 00:45:59.691900 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Sep 13 00:45:59.691949 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Sep 13 00:45:59.692000 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Sep 13 00:45:59.692048 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Sep 13 00:45:59.692095 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Sep 13 00:45:59.692144 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Sep 13 00:45:59.692192 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Sep 13 00:45:59.692239 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Sep 13 00:45:59.692288 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Sep 13 00:45:59.692336 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Sep 13 00:45:59.692386 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Sep 13 00:45:59.692437 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Sep 13 00:45:59.692486 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Sep 13 00:45:59.692533 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Sep 13 00:45:59.692582 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Sep 13 00:45:59.692636 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Sep 13 00:45:59.692685 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Sep 13 00:45:59.692734 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Sep 13 00:45:59.692784 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Sep 13 00:45:59.692832 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Sep 13 00:45:59.692881 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Sep 13 00:45:59.692930 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Sep 13 00:45:59.692977 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Sep 13 00:45:59.692986 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Sep 13 00:45:59.692992 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Sep 13 00:45:59.692998 kernel: ACPI: PCI: Interrupt link LNKB disabled Sep 13 00:45:59.693005 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Sep 13 00:45:59.693011 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Sep 13 00:45:59.693017 kernel: iommu: Default domain type: Translated Sep 13 00:45:59.693023 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 13 00:45:59.693072 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Sep 13 00:45:59.693120 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 13 00:45:59.693168 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Sep 13 00:45:59.693176 kernel: vgaarb: loaded Sep 13 00:45:59.693182 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 00:45:59.693190 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 00:45:59.693196 kernel: PTP clock support registered Sep 13 00:45:59.693202 kernel: PCI: Using ACPI for IRQ routing Sep 13 00:45:59.693208 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 13 00:45:59.693214 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Sep 13 00:45:59.693220 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Sep 13 00:45:59.693225 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Sep 13 00:45:59.693231 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Sep 13 00:45:59.693237 kernel: clocksource: Switched to clocksource tsc-early Sep 13 00:45:59.693244 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 00:45:59.693250 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 00:45:59.693256 kernel: pnp: PnP ACPI init Sep 13 00:45:59.693307 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Sep 13 00:45:59.693353 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Sep 13 00:45:59.693397 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Sep 13 00:45:59.693444 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Sep 13 00:45:59.693493 kernel: pnp 00:06: [dma 2] Sep 13 00:45:59.693541 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Sep 13 00:45:59.693585 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Sep 13 00:45:59.693636 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Sep 13 00:45:59.693645 kernel: pnp: PnP ACPI: found 8 devices Sep 13 00:45:59.693651 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 13 00:45:59.693657 kernel: NET: Registered PF_INET protocol family Sep 13 00:45:59.693665 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 13 00:45:59.693670 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Sep 13 00:45:59.693676 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 00:45:59.693682 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:45:59.693688 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 13 00:45:59.693694 kernel: TCP: Hash tables configured (established 16384 bind 16384) Sep 13 00:45:59.693699 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 13 00:45:59.693705 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 13 00:45:59.693711 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 00:45:59.693718 kernel: NET: Registered PF_XDP protocol family Sep 13 00:45:59.693768 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Sep 13 00:45:59.693818 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Sep 13 00:45:59.693868 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Sep 13 00:45:59.693918 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Sep 13 00:45:59.693967 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Sep 13 00:45:59.694016 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Sep 13 00:45:59.694067 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Sep 13 00:45:59.694115 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Sep 13 00:45:59.694165 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Sep 13 00:45:59.694214 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Sep 13 00:45:59.694263 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Sep 13 00:45:59.694313 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Sep 13 00:45:59.694361 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Sep 13 00:45:59.694409 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Sep 13 00:45:59.694456 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Sep 13 00:45:59.694504 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Sep 13 00:45:59.694552 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Sep 13 00:45:59.694601 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Sep 13 00:45:59.694656 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Sep 13 00:45:59.694705 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Sep 13 00:45:59.694768 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Sep 13 00:45:59.694822 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Sep 13 00:45:59.694871 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Sep 13 00:45:59.695219 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Sep 13 00:45:59.695276 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Sep 13 00:45:59.695328 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.695378 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.695427 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.695476 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.695525 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.695574 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.695687 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.695738 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.695787 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.696132 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.696189 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.696241 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.696290 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.696340 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.696392 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.696440 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.696489 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.696538 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.696586 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.696704 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.696755 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.696803 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.697144 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.697196 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.697245 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.697294 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.697343 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.697391 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.697438 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.697487 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.697537 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.697585 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.697651 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.697701 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.697749 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.697797 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.697850 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.697898 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.697948 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.697996 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.698044 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.698094 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.698175 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.698240 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.698288 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.698337 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.698384 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.698438 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.698486 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.698534 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.698581 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.698649 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.698697 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.698744 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.698792 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.698845 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.698895 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.698958 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.699009 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.699057 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.699104 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.699289 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.699346 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.699395 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.699444 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.699801 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.699858 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.699910 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.700251 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.700308 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.700358 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.700746 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.700802 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.700852 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.700901 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.700952 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.701000 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.701047 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.701096 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.701144 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.701191 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.701239 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.701288 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Sep 13 00:45:59.701335 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Sep 13 00:45:59.701387 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Sep 13 00:45:59.701437 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Sep 13 00:45:59.701484 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Sep 13 00:45:59.701533 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Sep 13 00:45:59.701581 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Sep 13 00:45:59.701652 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Sep 13 00:45:59.701704 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Sep 13 00:45:59.701752 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Sep 13 00:45:59.701804 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Sep 13 00:45:59.701855 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Sep 13 00:45:59.701905 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Sep 13 00:45:59.701953 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Sep 13 00:45:59.702002 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Sep 13 00:45:59.702050 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Sep 13 00:45:59.702100 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Sep 13 00:45:59.702148 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Sep 13 00:45:59.702196 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Sep 13 00:45:59.702244 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Sep 13 00:45:59.702295 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Sep 13 00:45:59.702343 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Sep 13 00:45:59.702391 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Sep 13 00:45:59.702440 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Sep 13 00:45:59.702488 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Sep 13 00:45:59.702536 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Sep 13 00:45:59.702587 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Sep 13 00:45:59.702670 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Sep 13 00:45:59.702719 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Sep 13 00:45:59.702767 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Sep 13 00:45:59.702814 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Sep 13 00:45:59.702861 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Sep 13 00:45:59.702909 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Sep 13 00:45:59.702956 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Sep 13 00:45:59.703004 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Sep 13 00:45:59.703057 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Sep 13 00:45:59.703106 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Sep 13 00:45:59.703155 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Sep 13 00:45:59.703202 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Sep 13 00:45:59.703250 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Sep 13 00:45:59.703299 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Sep 13 00:45:59.703346 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Sep 13 00:45:59.703394 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Sep 13 00:45:59.703442 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Sep 13 00:45:59.703493 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Sep 13 00:45:59.703541 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Sep 13 00:45:59.703589 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Sep 13 00:45:59.703655 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Sep 13 00:45:59.703705 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Sep 13 00:45:59.703752 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Sep 13 00:45:59.703801 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Sep 13 00:45:59.704144 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Sep 13 00:45:59.704199 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Sep 13 00:45:59.704250 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Sep 13 00:45:59.704482 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Sep 13 00:45:59.704539 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Sep 13 00:45:59.704589 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Sep 13 00:45:59.704953 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Sep 13 00:45:59.705008 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Sep 13 00:45:59.705079 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Sep 13 00:45:59.705223 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Sep 13 00:45:59.705281 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Sep 13 00:45:59.705330 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Sep 13 00:45:59.705383 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Sep 13 00:45:59.705725 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Sep 13 00:45:59.705777 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Sep 13 00:45:59.705827 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Sep 13 00:45:59.705875 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Sep 13 00:45:59.705923 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Sep 13 00:45:59.705971 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Sep 13 00:45:59.706019 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Sep 13 00:45:59.706067 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Sep 13 00:45:59.706115 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Sep 13 00:45:59.706167 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Sep 13 00:45:59.706215 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Sep 13 00:45:59.706263 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Sep 13 00:45:59.706311 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Sep 13 00:45:59.706359 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Sep 13 00:45:59.706407 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Sep 13 00:45:59.706455 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Sep 13 00:45:59.706503 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Sep 13 00:45:59.706550 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Sep 13 00:45:59.706600 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Sep 13 00:45:59.706692 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Sep 13 00:45:59.706742 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Sep 13 00:45:59.706811 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Sep 13 00:45:59.706970 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Sep 13 00:45:59.707030 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Sep 13 00:45:59.707079 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Sep 13 00:45:59.707127 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Sep 13 00:45:59.707466 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Sep 13 00:45:59.707522 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Sep 13 00:45:59.707574 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Sep 13 00:45:59.707764 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Sep 13 00:45:59.707828 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Sep 13 00:45:59.707881 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Sep 13 00:45:59.708214 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Sep 13 00:45:59.708271 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Sep 13 00:45:59.708321 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Sep 13 00:45:59.708371 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Sep 13 00:45:59.708419 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Sep 13 00:45:59.708470 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Sep 13 00:45:59.708518 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Sep 13 00:45:59.708567 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Sep 13 00:45:59.708640 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Sep 13 00:45:59.708691 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Sep 13 00:45:59.708741 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Sep 13 00:45:59.708788 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Sep 13 00:45:59.708842 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Sep 13 00:45:59.708890 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Sep 13 00:45:59.708938 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Sep 13 00:45:59.708989 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Sep 13 00:45:59.709037 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Sep 13 00:45:59.709085 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Sep 13 00:45:59.709132 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Sep 13 00:45:59.709180 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Sep 13 00:45:59.709228 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Sep 13 00:45:59.709272 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] Sep 13 00:45:59.709316 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] Sep 13 00:45:59.709361 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] Sep 13 00:45:59.709403 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] Sep 13 00:45:59.709449 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Sep 13 00:45:59.709495 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Sep 13 00:45:59.709539 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Sep 13 00:45:59.709584 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Sep 13 00:45:59.709636 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] Sep 13 00:45:59.709681 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] Sep 13 00:45:59.709728 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] Sep 13 00:45:59.709772 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] Sep 13 00:45:59.709825 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Sep 13 00:45:59.709871 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Sep 13 00:45:59.709916 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Sep 13 00:45:59.709965 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Sep 13 00:45:59.710011 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Sep 13 00:45:59.710058 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Sep 13 00:45:59.710109 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Sep 13 00:45:59.710155 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Sep 13 00:45:59.710199 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Sep 13 00:45:59.710248 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Sep 13 00:45:59.710294 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Sep 13 00:45:59.710345 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Sep 13 00:45:59.710391 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Sep 13 00:45:59.710440 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Sep 13 00:45:59.710485 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Sep 13 00:45:59.710537 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Sep 13 00:45:59.710582 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Sep 13 00:45:59.710638 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Sep 13 00:45:59.710687 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Sep 13 00:45:59.710736 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Sep 13 00:45:59.710782 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Sep 13 00:45:59.710827 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Sep 13 00:45:59.710876 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Sep 13 00:45:59.710925 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Sep 13 00:45:59.710982 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Sep 13 00:45:59.711032 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Sep 13 00:45:59.711079 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Sep 13 00:45:59.711125 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Sep 13 00:45:59.711175 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Sep 13 00:45:59.711221 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Sep 13 00:45:59.711275 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Sep 13 00:45:59.711322 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Sep 13 00:45:59.711371 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Sep 13 00:45:59.711417 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Sep 13 00:45:59.711466 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Sep 13 00:45:59.711512 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Sep 13 00:45:59.711563 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Sep 13 00:45:59.711610 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Sep 13 00:45:59.711672 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Sep 13 00:45:59.711718 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Sep 13 00:45:59.711764 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Sep 13 00:45:59.711816 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Sep 13 00:45:59.711988 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Sep 13 00:45:59.712040 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Sep 13 00:45:59.712090 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Sep 13 00:45:59.712416 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Sep 13 00:45:59.712472 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Sep 13 00:45:59.712527 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Sep 13 00:45:59.712574 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Sep 13 00:45:59.712640 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Sep 13 00:45:59.712689 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Sep 13 00:45:59.713155 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Sep 13 00:45:59.713205 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Sep 13 00:45:59.713257 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Sep 13 00:45:59.713325 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Sep 13 00:45:59.713672 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Sep 13 00:45:59.713725 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Sep 13 00:45:59.713776 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Sep 13 00:45:59.713822 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Sep 13 00:45:59.713867 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Sep 13 00:45:59.713920 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Sep 13 00:45:59.713966 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Sep 13 00:45:59.714922 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Sep 13 00:45:59.714990 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Sep 13 00:45:59.715056 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Sep 13 00:45:59.715113 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Sep 13 00:45:59.715160 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Sep 13 00:45:59.715521 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Sep 13 00:45:59.715578 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Sep 13 00:45:59.716002 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Sep 13 00:45:59.716056 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Sep 13 00:45:59.716107 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Sep 13 00:45:59.716154 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Sep 13 00:45:59.716343 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Sep 13 00:45:59.716396 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Sep 13 00:45:59.716451 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Sep 13 00:45:59.716639 kernel: PCI: CLS 32 bytes, default 64 Sep 13 00:45:59.716648 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 13 00:45:59.716655 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Sep 13 00:45:59.716662 kernel: clocksource: Switched to clocksource tsc Sep 13 00:45:59.716668 kernel: Initialise system trusted keyrings Sep 13 00:45:59.716675 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Sep 13 00:45:59.716683 kernel: Key type asymmetric registered Sep 13 00:45:59.716689 kernel: Asymmetric key parser 'x509' registered Sep 13 00:45:59.716696 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 00:45:59.716702 kernel: io scheduler mq-deadline registered Sep 13 00:45:59.716708 kernel: io scheduler kyber registered Sep 13 00:45:59.716715 kernel: io scheduler bfq registered Sep 13 00:45:59.716773 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Sep 13 00:45:59.716842 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.717140 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Sep 13 00:45:59.717374 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.717438 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Sep 13 00:45:59.717490 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.717540 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Sep 13 00:45:59.717595 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.717915 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Sep 13 00:45:59.717974 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.718114 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Sep 13 00:45:59.718168 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.718220 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Sep 13 00:45:59.718455 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.718512 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Sep 13 00:45:59.718562 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.718656 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Sep 13 00:45:59.718956 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.719196 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Sep 13 00:45:59.719252 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.719304 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Sep 13 00:45:59.719363 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.719413 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Sep 13 00:45:59.719463 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.719513 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Sep 13 00:45:59.719562 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.719617 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Sep 13 00:45:59.719922 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.720054 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Sep 13 00:45:59.720115 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.720167 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Sep 13 00:45:59.720395 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.720456 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Sep 13 00:45:59.720508 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.720559 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Sep 13 00:45:59.720649 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.720944 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Sep 13 00:45:59.721181 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.721242 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Sep 13 00:45:59.721296 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.721351 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Sep 13 00:45:59.721403 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.721452 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Sep 13 00:45:59.721501 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.721553 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Sep 13 00:45:59.721603 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.721924 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Sep 13 00:45:59.721980 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.722117 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Sep 13 00:45:59.722169 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.722224 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Sep 13 00:45:59.722570 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.722654 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Sep 13 00:45:59.722708 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.722760 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Sep 13 00:45:59.722811 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.722864 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Sep 13 00:45:59.722913 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.722963 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Sep 13 00:45:59.723014 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.723063 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Sep 13 00:45:59.723115 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.723164 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Sep 13 00:45:59.723214 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Sep 13 00:45:59.723223 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 13 00:45:59.723230 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 00:45:59.723236 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 13 00:45:59.723243 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Sep 13 00:45:59.723251 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Sep 13 00:45:59.723257 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Sep 13 00:45:59.723307 kernel: rtc_cmos 00:01: registered as rtc0 Sep 13 00:45:59.723353 kernel: rtc_cmos 00:01: setting system clock to 2025-09-13T00:45:59 UTC (1757724359) Sep 13 00:45:59.723399 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Sep 13 00:45:59.723408 kernel: intel_pstate: CPU model not supported Sep 13 00:45:59.723414 kernel: NET: Registered PF_INET6 protocol family Sep 13 00:45:59.723421 kernel: Segment Routing with IPv6 Sep 13 00:45:59.723428 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 00:45:59.723435 kernel: NET: Registered PF_PACKET protocol family Sep 13 00:45:59.723441 kernel: Key type dns_resolver registered Sep 13 00:45:59.723447 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Sep 13 00:45:59.723454 kernel: IPI shorthand broadcast: enabled Sep 13 00:45:59.723460 kernel: sched_clock: Marking stable (859058095, 220401578)->(1142940242, -63480569) Sep 13 00:45:59.723466 kernel: registered taskstats version 1 Sep 13 00:45:59.723473 kernel: Loading compiled-in X.509 certificates Sep 13 00:45:59.723479 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: d4931373bb0d9b9f95da11f02ae07d3649cc6c37' Sep 13 00:45:59.723486 kernel: Key type .fscrypt registered Sep 13 00:45:59.723492 kernel: Key type fscrypt-provisioning registered Sep 13 00:45:59.723498 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 00:45:59.723505 kernel: ima: Allocated hash algorithm: sha1 Sep 13 00:45:59.723511 kernel: ima: No architecture policies found Sep 13 00:45:59.723517 kernel: clk: Disabling unused clocks Sep 13 00:45:59.723523 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 13 00:45:59.723529 kernel: Write protecting the kernel read-only data: 28672k Sep 13 00:45:59.723537 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 13 00:45:59.723543 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 13 00:45:59.723549 kernel: Run /init as init process Sep 13 00:45:59.723556 kernel: with arguments: Sep 13 00:45:59.723562 kernel: /init Sep 13 00:45:59.723568 kernel: with environment: Sep 13 00:45:59.723575 kernel: HOME=/ Sep 13 00:45:59.723581 kernel: TERM=linux Sep 13 00:45:59.723587 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 00:45:59.723595 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:45:59.723604 systemd[1]: Detected virtualization vmware. Sep 13 00:45:59.723616 systemd[1]: Detected architecture x86-64. Sep 13 00:45:59.723623 systemd[1]: Running in initrd. Sep 13 00:45:59.723629 systemd[1]: No hostname configured, using default hostname. Sep 13 00:45:59.723636 systemd[1]: Hostname set to . Sep 13 00:45:59.723642 systemd[1]: Initializing machine ID from random generator. Sep 13 00:45:59.723649 systemd[1]: Queued start job for default target initrd.target. Sep 13 00:45:59.723657 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:45:59.723663 systemd[1]: Reached target cryptsetup.target. Sep 13 00:45:59.723669 systemd[1]: Reached target paths.target. Sep 13 00:45:59.723676 systemd[1]: Reached target slices.target. Sep 13 00:45:59.723682 systemd[1]: Reached target swap.target. Sep 13 00:45:59.723689 systemd[1]: Reached target timers.target. Sep 13 00:45:59.723696 systemd[1]: Listening on iscsid.socket. Sep 13 00:45:59.723703 systemd[1]: Listening on iscsiuio.socket. Sep 13 00:45:59.723709 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 00:45:59.723716 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 00:45:59.723722 systemd[1]: Listening on systemd-journald.socket. Sep 13 00:45:59.723729 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:45:59.723735 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:45:59.723741 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:45:59.723748 systemd[1]: Reached target sockets.target. Sep 13 00:45:59.723754 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:45:59.723761 systemd[1]: Finished network-cleanup.service. Sep 13 00:45:59.723768 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 00:45:59.723774 systemd[1]: Starting systemd-journald.service... Sep 13 00:45:59.723780 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:45:59.723787 systemd[1]: Starting systemd-resolved.service... Sep 13 00:45:59.723794 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 00:45:59.723800 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:45:59.723806 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 00:45:59.723812 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:45:59.723820 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:45:59.723826 kernel: audit: type=1130 audit(1757724359.656:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.723833 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 00:45:59.723839 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 00:45:59.723846 kernel: audit: type=1130 audit(1757724359.660:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.723853 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 00:45:59.723859 systemd[1]: Starting dracut-cmdline.service... Sep 13 00:45:59.723866 kernel: audit: type=1130 audit(1757724359.672:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.723873 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 00:45:59.723879 systemd[1]: Started systemd-resolved.service. Sep 13 00:45:59.723886 systemd[1]: Reached target nss-lookup.target. Sep 13 00:45:59.723893 kernel: audit: type=1130 audit(1757724359.690:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.723900 kernel: Bridge firewalling registered Sep 13 00:45:59.723906 kernel: SCSI subsystem initialized Sep 13 00:45:59.723915 systemd-journald[217]: Journal started Sep 13 00:45:59.723946 systemd-journald[217]: Runtime Journal (/run/log/journal/bf6e893aad2a4be2b3fcdc4ee21ecbea) is 4.8M, max 38.8M, 34.0M free. Sep 13 00:45:59.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.651688 systemd-modules-load[218]: Inserted module 'overlay' Sep 13 00:45:59.686759 systemd-resolved[219]: Positive Trust Anchors: Sep 13 00:45:59.725643 systemd[1]: Started systemd-journald.service. Sep 13 00:45:59.686766 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:45:59.727838 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 00:45:59.727849 kernel: device-mapper: uevent: version 1.0.3 Sep 13 00:45:59.686786 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:45:59.688476 systemd-resolved[219]: Defaulting to hostname 'linux'. Sep 13 00:45:59.699160 systemd-modules-load[218]: Inserted module 'br_netfilter' Sep 13 00:45:59.728646 dracut-cmdline[233]: dracut-dracut-053 Sep 13 00:45:59.728646 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Sep 13 00:45:59.728646 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:45:59.732965 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 00:45:59.732977 kernel: audit: type=1130 audit(1757724359.728:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.733561 systemd-modules-load[218]: Inserted module 'dm_multipath' Sep 13 00:45:59.733933 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:45:59.737631 kernel: audit: type=1130 audit(1757724359.733:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.737129 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:45:59.741569 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:45:59.744094 kernel: audit: type=1130 audit(1757724359.740:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.756657 kernel: Loading iSCSI transport class v2.0-870. Sep 13 00:45:59.765628 kernel: iscsi: registered transport (tcp) Sep 13 00:45:59.782629 kernel: iscsi: registered transport (qla4xxx) Sep 13 00:45:59.782658 kernel: QLogic iSCSI HBA Driver Sep 13 00:45:59.799077 systemd[1]: Finished dracut-cmdline.service. Sep 13 00:45:59.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.799717 systemd[1]: Starting dracut-pre-udev.service... Sep 13 00:45:59.802699 kernel: audit: type=1130 audit(1757724359.797:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:45:59.836627 kernel: raid6: avx2x4 gen() 47765 MB/s Sep 13 00:45:59.853652 kernel: raid6: avx2x4 xor() 21228 MB/s Sep 13 00:45:59.870627 kernel: raid6: avx2x2 gen() 52294 MB/s Sep 13 00:45:59.887624 kernel: raid6: avx2x2 xor() 31928 MB/s Sep 13 00:45:59.904623 kernel: raid6: avx2x1 gen() 44938 MB/s Sep 13 00:45:59.921622 kernel: raid6: avx2x1 xor() 27832 MB/s Sep 13 00:45:59.938625 kernel: raid6: sse2x4 gen() 21386 MB/s Sep 13 00:45:59.955630 kernel: raid6: sse2x4 xor() 11861 MB/s Sep 13 00:45:59.972632 kernel: raid6: sse2x2 gen() 21481 MB/s Sep 13 00:45:59.989624 kernel: raid6: sse2x2 xor() 13306 MB/s Sep 13 00:46:00.006622 kernel: raid6: sse2x1 gen() 18222 MB/s Sep 13 00:46:00.023904 kernel: raid6: sse2x1 xor() 8855 MB/s Sep 13 00:46:00.023931 kernel: raid6: using algorithm avx2x2 gen() 52294 MB/s Sep 13 00:46:00.023939 kernel: raid6: .... xor() 31928 MB/s, rmw enabled Sep 13 00:46:00.025114 kernel: raid6: using avx2x2 recovery algorithm Sep 13 00:46:00.033624 kernel: xor: automatically using best checksumming function avx Sep 13 00:46:00.094634 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 13 00:46:00.099216 systemd[1]: Finished dracut-pre-udev.service. Sep 13 00:46:00.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.099877 systemd[1]: Starting systemd-udevd.service... Sep 13 00:46:00.097000 audit: BPF prog-id=7 op=LOAD Sep 13 00:46:00.098000 audit: BPF prog-id=8 op=LOAD Sep 13 00:46:00.104625 kernel: audit: type=1130 audit(1757724360.097:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.110326 systemd-udevd[416]: Using default interface naming scheme 'v252'. Sep 13 00:46:00.113019 systemd[1]: Started systemd-udevd.service. Sep 13 00:46:00.113530 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 00:46:00.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.121458 dracut-pre-trigger[421]: rd.md=0: removing MD RAID activation Sep 13 00:46:00.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.137111 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 00:46:00.137658 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:46:00.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:00.201679 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:46:00.258878 kernel: VMware PVSCSI driver - version 1.0.7.0-k Sep 13 00:46:00.258909 kernel: vmw_pvscsi: using 64bit dma Sep 13 00:46:00.258917 kernel: vmw_pvscsi: max_id: 16 Sep 13 00:46:00.258924 kernel: vmw_pvscsi: setting ring_pages to 8 Sep 13 00:46:00.270429 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Sep 13 00:46:00.270457 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Sep 13 00:46:00.272925 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Sep 13 00:46:00.275685 kernel: vmw_pvscsi: enabling reqCallThreshold Sep 13 00:46:00.275703 kernel: vmw_pvscsi: driver-based request coalescing enabled Sep 13 00:46:00.275714 kernel: vmw_pvscsi: using MSI-X Sep 13 00:46:00.277649 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Sep 13 00:46:00.278754 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Sep 13 00:46:00.280182 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Sep 13 00:46:00.289624 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 00:46:00.300638 kernel: AVX2 version of gcm_enc/dec engaged. Sep 13 00:46:00.300673 kernel: AES CTR mode by8 optimization enabled Sep 13 00:46:00.301624 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Sep 13 00:46:00.307623 kernel: libata version 3.00 loaded. Sep 13 00:46:00.309626 kernel: ata_piix 0000:00:07.1: version 2.13 Sep 13 00:46:00.321836 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Sep 13 00:46:00.393500 kernel: scsi host1: ata_piix Sep 13 00:46:00.393581 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 13 00:46:00.393660 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Sep 13 00:46:00.393723 kernel: sd 0:0:0:0: [sda] Cache data unavailable Sep 13 00:46:00.393782 kernel: scsi host2: ata_piix Sep 13 00:46:00.393841 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Sep 13 00:46:00.393900 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Sep 13 00:46:00.393909 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Sep 13 00:46:00.393916 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:46:00.393925 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 13 00:46:00.493704 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Sep 13 00:46:00.499627 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Sep 13 00:46:00.528642 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Sep 13 00:46:00.545665 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 13 00:46:00.545683 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Sep 13 00:46:00.548422 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 00:46:00.550400 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 00:46:00.553625 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (464) Sep 13 00:46:00.556090 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 00:46:00.557686 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 00:46:00.558314 systemd[1]: Starting disk-uuid.service... Sep 13 00:46:00.561804 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:46:00.662626 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:46:00.667211 kernel: GPT:disk_guids don't match. Sep 13 00:46:00.667227 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 13 00:46:00.667235 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:46:01.693227 disk-uuid[549]: The operation has completed successfully. Sep 13 00:46:01.693622 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 00:46:01.744864 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 00:46:01.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:01.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:01.744921 systemd[1]: Finished disk-uuid.service. Sep 13 00:46:01.745504 systemd[1]: Starting verity-setup.service... Sep 13 00:46:01.755629 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Sep 13 00:46:01.894280 systemd[1]: Found device dev-mapper-usr.device. Sep 13 00:46:01.895404 systemd[1]: Mounting sysusr-usr.mount... Sep 13 00:46:01.897155 systemd[1]: Finished verity-setup.service. Sep 13 00:46:01.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.063219 systemd[1]: Mounted sysusr-usr.mount. Sep 13 00:46:02.063623 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 00:46:02.063812 systemd[1]: Starting afterburn-network-kargs.service... Sep 13 00:46:02.064259 systemd[1]: Starting ignition-setup.service... Sep 13 00:46:02.082805 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:46:02.082830 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:46:02.082838 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:46:02.089626 kernel: BTRFS info (device sda6): enabling ssd optimizations Sep 13 00:46:02.095598 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 00:46:02.101907 systemd[1]: Finished ignition-setup.service. Sep 13 00:46:02.102465 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 00:46:02.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.157502 systemd[1]: Finished afterburn-network-kargs.service. Sep 13 00:46:02.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.158121 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 00:46:02.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.195000 audit: BPF prog-id=9 op=LOAD Sep 13 00:46:02.196592 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 00:46:02.197441 systemd[1]: Starting systemd-networkd.service... Sep 13 00:46:02.213280 systemd-networkd[735]: lo: Link UP Sep 13 00:46:02.213287 systemd-networkd[735]: lo: Gained carrier Sep 13 00:46:02.213776 systemd-networkd[735]: Enumeration completed Sep 13 00:46:02.217872 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Sep 13 00:46:02.217991 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Sep 13 00:46:02.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.213946 systemd[1]: Started systemd-networkd.service. Sep 13 00:46:02.214084 systemd[1]: Reached target network.target. Sep 13 00:46:02.214135 systemd-networkd[735]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Sep 13 00:46:02.214552 systemd[1]: Starting iscsiuio.service... Sep 13 00:46:02.218829 systemd-networkd[735]: ens192: Link UP Sep 13 00:46:02.218834 systemd-networkd[735]: ens192: Gained carrier Sep 13 00:46:02.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.219618 systemd[1]: Started iscsiuio.service. Sep 13 00:46:02.220183 systemd[1]: Starting iscsid.service... Sep 13 00:46:02.222139 iscsid[740]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:46:02.222139 iscsid[740]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 00:46:02.222139 iscsid[740]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 00:46:02.222139 iscsid[740]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 00:46:02.222139 iscsid[740]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:46:02.223101 iscsid[740]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 00:46:02.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.223426 systemd[1]: Started iscsid.service. Sep 13 00:46:02.223948 systemd[1]: Starting dracut-initqueue.service... Sep 13 00:46:02.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.230290 systemd[1]: Finished dracut-initqueue.service. Sep 13 00:46:02.230436 systemd[1]: Reached target remote-fs-pre.target. Sep 13 00:46:02.230525 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:46:02.230628 systemd[1]: Reached target remote-fs.target. Sep 13 00:46:02.231993 systemd[1]: Starting dracut-pre-mount.service... Sep 13 00:46:02.236713 systemd[1]: Finished dracut-pre-mount.service. Sep 13 00:46:02.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.298235 ignition[607]: Ignition 2.14.0 Sep 13 00:46:02.298551 ignition[607]: Stage: fetch-offline Sep 13 00:46:02.298745 ignition[607]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:46:02.298951 ignition[607]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Sep 13 00:46:02.302144 ignition[607]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Sep 13 00:46:02.302420 ignition[607]: parsed url from cmdline: "" Sep 13 00:46:02.302467 ignition[607]: no config URL provided Sep 13 00:46:02.302610 ignition[607]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:46:02.302788 ignition[607]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:46:02.310731 ignition[607]: config successfully fetched Sep 13 00:46:02.310795 ignition[607]: parsing config with SHA512: ebcfbbda31df1e93fd87901760075608f265d177c5ae68d2bfb5e5973b5b8fdc021cc8c9926022af1300401e809603f7292b643bfbfb63d5b27b9f49576ba1e6 Sep 13 00:46:02.316990 unknown[607]: fetched base config from "system" Sep 13 00:46:02.317185 unknown[607]: fetched user config from "vmware" Sep 13 00:46:02.317688 ignition[607]: fetch-offline: fetch-offline passed Sep 13 00:46:02.317890 ignition[607]: Ignition finished successfully Sep 13 00:46:02.318619 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 00:46:02.318823 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Sep 13 00:46:02.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.319348 systemd[1]: Starting ignition-kargs.service... Sep 13 00:46:02.325785 ignition[755]: Ignition 2.14.0 Sep 13 00:46:02.325793 ignition[755]: Stage: kargs Sep 13 00:46:02.325849 ignition[755]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:46:02.325859 ignition[755]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Sep 13 00:46:02.326929 ignition[755]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Sep 13 00:46:02.327536 ignition[755]: kargs: kargs passed Sep 13 00:46:02.328682 ignition[755]: Ignition finished successfully Sep 13 00:46:02.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.329507 systemd[1]: Finished ignition-kargs.service. Sep 13 00:46:02.330090 systemd[1]: Starting ignition-disks.service... Sep 13 00:46:02.334744 ignition[761]: Ignition 2.14.0 Sep 13 00:46:02.334954 ignition[761]: Stage: disks Sep 13 00:46:02.335129 ignition[761]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:46:02.335285 ignition[761]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Sep 13 00:46:02.336595 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Sep 13 00:46:02.337763 ignition[761]: disks: disks passed Sep 13 00:46:02.337967 ignition[761]: Ignition finished successfully Sep 13 00:46:02.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.338498 systemd[1]: Finished ignition-disks.service. Sep 13 00:46:02.338659 systemd[1]: Reached target initrd-root-device.target. Sep 13 00:46:02.338754 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:46:02.338848 systemd[1]: Reached target local-fs.target. Sep 13 00:46:02.338933 systemd[1]: Reached target sysinit.target. Sep 13 00:46:02.339016 systemd[1]: Reached target basic.target. Sep 13 00:46:02.339571 systemd[1]: Starting systemd-fsck-root.service... Sep 13 00:46:02.353309 systemd-fsck[769]: ROOT: clean, 629/1628000 files, 124065/1617920 blocks Sep 13 00:46:02.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.355090 systemd[1]: Finished systemd-fsck-root.service. Sep 13 00:46:02.355750 systemd[1]: Mounting sysroot.mount... Sep 13 00:46:02.365631 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 00:46:02.366132 systemd[1]: Mounted sysroot.mount. Sep 13 00:46:02.366305 systemd[1]: Reached target initrd-root-fs.target. Sep 13 00:46:02.368060 systemd[1]: Mounting sysroot-usr.mount... Sep 13 00:46:02.368526 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 13 00:46:02.368553 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 00:46:02.368571 systemd[1]: Reached target ignition-diskful.target. Sep 13 00:46:02.370143 systemd[1]: Mounted sysroot-usr.mount. Sep 13 00:46:02.370784 systemd[1]: Starting initrd-setup-root.service... Sep 13 00:46:02.374389 initrd-setup-root[779]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 00:46:02.379324 initrd-setup-root[787]: cut: /sysroot/etc/group: No such file or directory Sep 13 00:46:02.381770 initrd-setup-root[795]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 00:46:02.384104 initrd-setup-root[803]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 00:46:02.422696 systemd[1]: Finished initrd-setup-root.service. Sep 13 00:46:02.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.423281 systemd[1]: Starting ignition-mount.service... Sep 13 00:46:02.423745 systemd[1]: Starting sysroot-boot.service... Sep 13 00:46:02.427307 bash[820]: umount: /sysroot/usr/share/oem: not mounted. Sep 13 00:46:02.432145 ignition[821]: INFO : Ignition 2.14.0 Sep 13 00:46:02.432145 ignition[821]: INFO : Stage: mount Sep 13 00:46:02.432446 ignition[821]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:46:02.432446 ignition[821]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Sep 13 00:46:02.433671 ignition[821]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Sep 13 00:46:02.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.435927 ignition[821]: INFO : mount: mount passed Sep 13 00:46:02.435927 ignition[821]: INFO : Ignition finished successfully Sep 13 00:46:02.435736 systemd[1]: Finished ignition-mount.service. Sep 13 00:46:02.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:02.445396 systemd[1]: Finished sysroot-boot.service. Sep 13 00:46:03.026909 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:46:03.038636 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (830) Sep 13 00:46:03.042345 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:46:03.042379 kernel: BTRFS info (device sda6): using free space tree Sep 13 00:46:03.042391 kernel: BTRFS info (device sda6): has skinny extents Sep 13 00:46:03.048637 kernel: BTRFS info (device sda6): enabling ssd optimizations Sep 13 00:46:03.050109 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:46:03.050842 systemd[1]: Starting ignition-files.service... Sep 13 00:46:03.060379 ignition[850]: INFO : Ignition 2.14.0 Sep 13 00:46:03.060379 ignition[850]: INFO : Stage: files Sep 13 00:46:03.060717 ignition[850]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:46:03.060717 ignition[850]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Sep 13 00:46:03.061712 ignition[850]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Sep 13 00:46:03.063625 ignition[850]: DEBUG : files: compiled without relabeling support, skipping Sep 13 00:46:03.064415 ignition[850]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 00:46:03.064415 ignition[850]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 00:46:03.067775 ignition[850]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 00:46:03.067999 ignition[850]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 00:46:03.068446 unknown[850]: wrote ssh authorized keys file for user: core Sep 13 00:46:03.068648 ignition[850]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 00:46:03.069178 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 13 00:46:03.069342 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 00:46:03.069703 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:46:03.069870 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:46:03.069870 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 13 00:46:03.069870 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 13 00:46:03.070503 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Sep 13 00:46:03.070685 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:46:03.075827 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2505026845" Sep 13 00:46:03.076016 ignition[850]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2505026845": device or resource busy Sep 13 00:46:03.076016 ignition[850]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2505026845", trying btrfs: device or resource busy Sep 13 00:46:03.076016 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2505026845" Sep 13 00:46:03.076016 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2505026845" Sep 13 00:46:03.077703 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem2505026845" Sep 13 00:46:03.077871 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem2505026845" Sep 13 00:46:03.077871 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Sep 13 00:46:03.077871 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 13 00:46:03.077871 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Sep 13 00:46:03.078499 systemd[1]: mnt-oem2505026845.mount: Deactivated successfully. Sep 13 00:46:03.567706 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Sep 13 00:46:03.957074 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Sep 13 00:46:03.957350 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Sep 13 00:46:03.957350 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Sep 13 00:46:03.957706 ignition[850]: INFO : files: op(c): [started] processing unit "vmtoolsd.service" Sep 13 00:46:03.957706 ignition[850]: INFO : files: op(c): [finished] processing unit "vmtoolsd.service" Sep 13 00:46:03.957706 ignition[850]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Sep 13 00:46:03.957706 ignition[850]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Sep 13 00:46:03.957706 ignition[850]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Sep 13 00:46:03.957706 ignition[850]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Sep 13 00:46:03.957706 ignition[850]: INFO : files: op(f): [started] setting preset to disabled for "coreos-metadata.service" Sep 13 00:46:03.957706 ignition[850]: INFO : files: op(f): op(10): [started] removing enablement symlink(s) for "coreos-metadata.service" Sep 13 00:46:04.006193 ignition[850]: INFO : files: op(f): op(10): [finished] removing enablement symlink(s) for "coreos-metadata.service" Sep 13 00:46:04.006406 ignition[850]: INFO : files: op(f): [finished] setting preset to disabled for "coreos-metadata.service" Sep 13 00:46:04.006406 ignition[850]: INFO : files: op(11): [started] setting preset to enabled for "vmtoolsd.service" Sep 13 00:46:04.006406 ignition[850]: INFO : files: op(11): [finished] setting preset to enabled for "vmtoolsd.service" Sep 13 00:46:04.006406 ignition[850]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:46:04.006406 ignition[850]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:46:04.007267 ignition[850]: INFO : files: files passed Sep 13 00:46:04.007267 ignition[850]: INFO : Ignition finished successfully Sep 13 00:46:04.008136 systemd[1]: Finished ignition-files.service. Sep 13 00:46:04.012118 kernel: kauditd_printk_skb: 24 callbacks suppressed Sep 13 00:46:04.012147 kernel: audit: type=1130 audit(1757724364.006:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.009413 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 00:46:04.011434 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 00:46:04.011864 systemd[1]: Starting ignition-quench.service... Sep 13 00:46:04.014309 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 00:46:04.014359 systemd[1]: Finished ignition-quench.service. Sep 13 00:46:04.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.018140 initrd-setup-root-after-ignition[876]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 00:46:04.019644 kernel: audit: type=1130 audit(1757724364.013:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.019659 kernel: audit: type=1131 audit(1757724364.013:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.018542 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 00:46:04.019808 systemd[1]: Reached target ignition-complete.target. Sep 13 00:46:04.022497 kernel: audit: type=1130 audit(1757724364.018:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.022888 systemd[1]: Starting initrd-parse-etc.service... Sep 13 00:46:04.031535 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 00:46:04.031824 systemd[1]: Finished initrd-parse-etc.service. Sep 13 00:46:04.032112 systemd[1]: Reached target initrd-fs.target. Sep 13 00:46:04.032322 systemd[1]: Reached target initrd.target. Sep 13 00:46:04.032550 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 00:46:04.037740 kernel: audit: type=1130 audit(1757724364.030:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.037764 kernel: audit: type=1131 audit(1757724364.030:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.035140 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 00:46:04.045201 kernel: audit: type=1130 audit(1757724364.040:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.041929 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 00:46:04.042524 systemd[1]: Starting initrd-cleanup.service... Sep 13 00:46:04.050067 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 00:46:04.050292 systemd[1]: Finished initrd-cleanup.service. Sep 13 00:46:04.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.050980 systemd[1]: Stopped target nss-lookup.target. Sep 13 00:46:04.055319 kernel: audit: type=1130 audit(1757724364.048:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.055337 kernel: audit: type=1131 audit(1757724364.048:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.055365 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 00:46:04.055488 systemd[1]: Stopped target timers.target. Sep 13 00:46:04.055678 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 00:46:04.058253 kernel: audit: type=1131 audit(1757724364.054:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.055712 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 00:46:04.055849 systemd[1]: Stopped target initrd.target. Sep 13 00:46:04.058306 systemd[1]: Stopped target basic.target. Sep 13 00:46:04.058476 systemd[1]: Stopped target ignition-complete.target. Sep 13 00:46:04.058641 systemd[1]: Stopped target ignition-diskful.target. Sep 13 00:46:04.058719 systemd[1]: Stopped target initrd-root-device.target. Sep 13 00:46:04.058909 systemd[1]: Stopped target remote-fs.target. Sep 13 00:46:04.059077 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 00:46:04.059260 systemd[1]: Stopped target sysinit.target. Sep 13 00:46:04.059409 systemd[1]: Stopped target local-fs.target. Sep 13 00:46:04.059566 systemd[1]: Stopped target local-fs-pre.target. Sep 13 00:46:04.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.059740 systemd[1]: Stopped target swap.target. Sep 13 00:46:04.059897 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 00:46:04.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.059924 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 00:46:04.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.060080 systemd[1]: Stopped target cryptsetup.target. Sep 13 00:46:04.060223 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 00:46:04.060245 systemd[1]: Stopped dracut-initqueue.service. Sep 13 00:46:04.060410 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 00:46:04.060431 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 00:46:04.060565 systemd[1]: Stopped target paths.target. Sep 13 00:46:04.060732 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 00:46:04.062663 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 00:46:04.062775 systemd[1]: Stopped target slices.target. Sep 13 00:46:04.062940 systemd[1]: Stopped target sockets.target. Sep 13 00:46:04.063105 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 00:46:04.063121 systemd[1]: Closed iscsid.socket. Sep 13 00:46:04.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.063265 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 00:46:04.063287 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 00:46:04.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.063436 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 00:46:04.063456 systemd[1]: Stopped ignition-files.service. Sep 13 00:46:04.064010 systemd[1]: Stopping ignition-mount.service... Sep 13 00:46:04.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.064602 systemd[1]: Stopping iscsiuio.service... Sep 13 00:46:04.064711 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 00:46:04.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.064741 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 00:46:04.065318 systemd[1]: Stopping sysroot-boot.service... Sep 13 00:46:04.065427 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 00:46:04.065459 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 00:46:04.065584 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 00:46:04.065605 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 00:46:04.065997 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 00:46:04.066055 systemd[1]: Stopped iscsiuio.service. Sep 13 00:46:04.066228 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 00:46:04.066250 systemd[1]: Closed iscsiuio.socket. Sep 13 00:46:04.072055 ignition[889]: INFO : Ignition 2.14.0 Sep 13 00:46:04.072055 ignition[889]: INFO : Stage: umount Sep 13 00:46:04.072055 ignition[889]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:46:04.072055 ignition[889]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Sep 13 00:46:04.074418 ignition[889]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Sep 13 00:46:04.078634 ignition[889]: INFO : umount: umount passed Sep 13 00:46:04.078634 ignition[889]: INFO : Ignition finished successfully Sep 13 00:46:04.078442 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 00:46:04.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.081799 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 00:46:04.081881 systemd[1]: Stopped ignition-mount.service. Sep 13 00:46:04.082052 systemd[1]: Stopped target network.target. Sep 13 00:46:04.082135 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 00:46:04.082159 systemd[1]: Stopped ignition-disks.service. Sep 13 00:46:04.082256 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 00:46:04.082275 systemd[1]: Stopped ignition-kargs.service. Sep 13 00:46:04.082371 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 00:46:04.082390 systemd[1]: Stopped ignition-setup.service. Sep 13 00:46:04.082537 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:46:04.082693 systemd[1]: Stopping systemd-resolved.service... Sep 13 00:46:04.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.088771 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 00:46:04.088827 systemd[1]: Stopped sysroot-boot.service. Sep 13 00:46:04.088997 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 00:46:04.089020 systemd[1]: Stopped initrd-setup-root.service. Sep 13 00:46:04.092196 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:46:04.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.092251 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:46:04.092451 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 00:46:04.092469 systemd[1]: Closed systemd-networkd.socket. Sep 13 00:46:04.093932 systemd[1]: Stopping network-cleanup.service... Sep 13 00:46:04.094031 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 00:46:04.094061 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 00:46:04.094198 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Sep 13 00:46:04.094221 systemd[1]: Stopped afterburn-network-kargs.service. Sep 13 00:46:04.094325 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 00:46:04.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.094000 audit: BPF prog-id=9 op=UNLOAD Sep 13 00:46:04.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.094345 systemd[1]: Stopped systemd-sysctl.service. Sep 13 00:46:04.094487 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 00:46:04.094508 systemd[1]: Stopped systemd-modules-load.service. Sep 13 00:46:04.098000 audit: BPF prog-id=6 op=UNLOAD Sep 13 00:46:04.094666 systemd[1]: Stopping systemd-udevd.service... Sep 13 00:46:04.096233 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 00:46:04.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.096496 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 00:46:04.096556 systemd[1]: Stopped systemd-resolved.service. Sep 13 00:46:04.099858 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 00:46:04.099912 systemd[1]: Stopped network-cleanup.service. Sep 13 00:46:04.103555 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 00:46:04.103639 systemd[1]: Stopped systemd-udevd.service. Sep 13 00:46:04.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.103878 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 00:46:04.103898 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 00:46:04.104000 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 00:46:04.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.104017 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 00:46:04.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.104291 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 00:46:04.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.104317 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 00:46:04.104472 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 00:46:04.104492 systemd[1]: Stopped dracut-cmdline.service. Sep 13 00:46:04.104757 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 00:46:04.104779 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 00:46:04.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.105363 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 00:46:04.105513 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 00:46:04.105548 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 00:46:04.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.109261 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 00:46:04.109313 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 00:46:04.109479 systemd[1]: Reached target initrd-switch-root.target. Sep 13 00:46:04.110041 systemd[1]: Starting initrd-switch-root.service... Sep 13 00:46:04.117014 systemd[1]: Switching root. Sep 13 00:46:04.131313 systemd-journald[217]: Journal stopped Sep 13 00:46:06.573578 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). Sep 13 00:46:06.573600 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 00:46:06.573609 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 00:46:06.573642 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 00:46:06.573659 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 00:46:06.573669 kernel: SELinux: policy capability open_perms=1 Sep 13 00:46:06.573676 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 00:46:06.573682 kernel: SELinux: policy capability always_check_network=0 Sep 13 00:46:06.573688 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 00:46:06.573694 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 00:46:06.573699 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 00:46:06.573705 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 00:46:06.573712 systemd[1]: Successfully loaded SELinux policy in 147.661ms. Sep 13 00:46:06.573720 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.529ms. Sep 13 00:46:06.573728 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:46:06.573735 systemd[1]: Detected virtualization vmware. Sep 13 00:46:06.573742 systemd[1]: Detected architecture x86-64. Sep 13 00:46:06.573748 systemd[1]: Detected first boot. Sep 13 00:46:06.573755 systemd[1]: Initializing machine ID from random generator. Sep 13 00:46:06.573761 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 00:46:06.573768 systemd[1]: Populated /etc with preset unit settings. Sep 13 00:46:06.573775 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:46:06.573782 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:46:06.573789 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:46:06.573797 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 00:46:06.573803 systemd[1]: Stopped iscsid.service. Sep 13 00:46:06.573811 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 00:46:06.573818 systemd[1]: Stopped initrd-switch-root.service. Sep 13 00:46:06.573824 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 00:46:06.573831 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 00:46:06.573837 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 00:46:06.573845 systemd[1]: Created slice system-getty.slice. Sep 13 00:46:06.573851 systemd[1]: Created slice system-modprobe.slice. Sep 13 00:46:06.573858 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 00:46:06.573864 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 00:46:06.573871 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 00:46:06.573877 systemd[1]: Created slice user.slice. Sep 13 00:46:06.573884 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:46:06.573890 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 00:46:06.573898 systemd[1]: Set up automount boot.automount. Sep 13 00:46:06.573905 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 00:46:06.573913 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 00:46:06.573920 systemd[1]: Stopped target initrd-fs.target. Sep 13 00:46:06.573927 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 00:46:06.573933 systemd[1]: Reached target integritysetup.target. Sep 13 00:46:06.573940 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:46:06.573947 systemd[1]: Reached target remote-fs.target. Sep 13 00:46:06.573955 systemd[1]: Reached target slices.target. Sep 13 00:46:06.573963 systemd[1]: Reached target swap.target. Sep 13 00:46:06.573970 systemd[1]: Reached target torcx.target. Sep 13 00:46:06.573976 systemd[1]: Reached target veritysetup.target. Sep 13 00:46:06.573983 systemd[1]: Listening on systemd-coredump.socket. Sep 13 00:46:06.573989 systemd[1]: Listening on systemd-initctl.socket. Sep 13 00:46:06.573997 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:46:06.574005 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:46:06.574012 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:46:06.574019 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 00:46:06.574025 systemd[1]: Mounting dev-hugepages.mount... Sep 13 00:46:06.574032 systemd[1]: Mounting dev-mqueue.mount... Sep 13 00:46:06.574039 systemd[1]: Mounting media.mount... Sep 13 00:46:06.574046 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:06.574054 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 00:46:06.574061 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 00:46:06.574068 systemd[1]: Mounting tmp.mount... Sep 13 00:46:06.574075 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 00:46:06.574082 systemd[1]: Starting ignition-delete-config.service... Sep 13 00:46:06.574088 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:46:06.574095 systemd[1]: Starting modprobe@configfs.service... Sep 13 00:46:06.574103 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:46:06.574111 systemd[1]: Starting modprobe@drm.service... Sep 13 00:46:06.574119 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:46:06.574126 systemd[1]: Starting modprobe@fuse.service... Sep 13 00:46:06.574132 systemd[1]: Starting modprobe@loop.service... Sep 13 00:46:06.574139 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 00:46:06.574146 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 00:46:06.574153 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 00:46:06.574160 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 00:46:06.574167 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 00:46:06.574173 systemd[1]: Stopped systemd-journald.service. Sep 13 00:46:06.574181 systemd[1]: Starting systemd-journald.service... Sep 13 00:46:06.574188 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:46:06.574195 systemd[1]: Starting systemd-network-generator.service... Sep 13 00:46:06.574202 systemd[1]: Starting systemd-remount-fs.service... Sep 13 00:46:06.574209 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:46:06.574215 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 00:46:06.574222 systemd[1]: Stopped verity-setup.service. Sep 13 00:46:06.574230 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:06.574237 systemd[1]: Mounted dev-hugepages.mount. Sep 13 00:46:06.574245 systemd[1]: Mounted dev-mqueue.mount. Sep 13 00:46:06.574253 systemd[1]: Mounted media.mount. Sep 13 00:46:06.574260 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 00:46:06.574266 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 00:46:06.574273 kernel: fuse: init (API version 7.34) Sep 13 00:46:06.574279 systemd[1]: Mounted tmp.mount. Sep 13 00:46:06.574286 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:46:06.574293 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 00:46:06.574300 systemd[1]: Finished modprobe@configfs.service. Sep 13 00:46:06.574308 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:46:06.574315 kernel: loop: module loaded Sep 13 00:46:06.574322 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:46:06.574329 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:46:06.574335 systemd[1]: Finished modprobe@drm.service. Sep 13 00:46:06.574342 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:46:06.574349 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:46:06.574356 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 00:46:06.574364 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 00:46:06.574371 systemd[1]: Finished modprobe@fuse.service. Sep 13 00:46:06.574378 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:46:06.574385 systemd[1]: Finished modprobe@loop.service. Sep 13 00:46:06.574395 systemd-journald[1009]: Journal started Sep 13 00:46:06.574426 systemd-journald[1009]: Runtime Journal (/run/log/journal/a5e988e9c4f842d6a337cd94a24b5935) is 4.8M, max 38.8M, 34.0M free. Sep 13 00:46:04.596000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:46:04.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:46:04.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:46:04.680000 audit: BPF prog-id=10 op=LOAD Sep 13 00:46:04.680000 audit: BPF prog-id=10 op=UNLOAD Sep 13 00:46:04.680000 audit: BPF prog-id=11 op=LOAD Sep 13 00:46:04.680000 audit: BPF prog-id=11 op=UNLOAD Sep 13 00:46:04.759000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:46:04.759000 audit[922]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b4 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:04.759000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:46:04.761000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 00:46:04.761000 audit[922]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d999 a2=1ed a3=0 items=2 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:04.761000 audit: CWD cwd="/" Sep 13 00:46:04.761000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:04.761000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:04.761000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:46:06.448000 audit: BPF prog-id=12 op=LOAD Sep 13 00:46:06.448000 audit: BPF prog-id=3 op=UNLOAD Sep 13 00:46:06.448000 audit: BPF prog-id=13 op=LOAD Sep 13 00:46:06.448000 audit: BPF prog-id=14 op=LOAD Sep 13 00:46:06.448000 audit: BPF prog-id=4 op=UNLOAD Sep 13 00:46:06.448000 audit: BPF prog-id=5 op=UNLOAD Sep 13 00:46:06.449000 audit: BPF prog-id=15 op=LOAD Sep 13 00:46:06.449000 audit: BPF prog-id=12 op=UNLOAD Sep 13 00:46:06.449000 audit: BPF prog-id=16 op=LOAD Sep 13 00:46:06.449000 audit: BPF prog-id=17 op=LOAD Sep 13 00:46:06.449000 audit: BPF prog-id=13 op=UNLOAD Sep 13 00:46:06.450000 audit: BPF prog-id=14 op=UNLOAD Sep 13 00:46:06.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.457000 audit: BPF prog-id=15 op=UNLOAD Sep 13 00:46:06.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.521000 audit: BPF prog-id=18 op=LOAD Sep 13 00:46:06.521000 audit: BPF prog-id=19 op=LOAD Sep 13 00:46:06.521000 audit: BPF prog-id=20 op=LOAD Sep 13 00:46:06.521000 audit: BPF prog-id=16 op=UNLOAD Sep 13 00:46:06.521000 audit: BPF prog-id=17 op=UNLOAD Sep 13 00:46:06.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.575219 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:46:06.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.570000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 00:46:06.570000 audit[1009]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffdd4db1250 a2=4000 a3=7ffdd4db12ec items=0 ppid=1 pid=1009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:06.570000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 00:46:06.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.758447 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:46:06.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.448471 systemd[1]: Queued start job for default target multi-user.target. Sep 13 00:46:04.758876 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:46:06.448479 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 13 00:46:04.758896 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:46:06.452162 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 00:46:04.758917 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 00:46:04.758923 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 00:46:04.758943 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 00:46:04.758951 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 00:46:04.759076 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 00:46:04.759099 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:46:06.576115 jq[988]: true Sep 13 00:46:06.576178 systemd[1]: Started systemd-journald.service. Sep 13 00:46:04.759107 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:46:04.760164 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 00:46:06.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:04.760185 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 00:46:04.760197 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 00:46:04.760205 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 00:46:04.760215 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 00:46:04.760222 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 00:46:06.251225 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:06Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:46:06.251386 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:06Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:46:06.251537 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:06Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:46:06.251771 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:06Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:46:06.577095 systemd[1]: Finished systemd-network-generator.service. Sep 13 00:46:06.251806 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:06Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 00:46:06.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.577217 jq[1030]: true Sep 13 00:46:06.251848 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-09-13T00:46:06Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 00:46:06.577368 systemd[1]: Finished systemd-remount-fs.service. Sep 13 00:46:06.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.578370 systemd[1]: Reached target network-pre.target. Sep 13 00:46:06.579495 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 00:46:06.581957 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 00:46:06.583555 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 00:46:06.588504 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 00:46:06.589650 systemd[1]: Starting systemd-journal-flush.service... Sep 13 00:46:06.590257 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:46:06.591746 systemd[1]: Starting systemd-random-seed.service... Sep 13 00:46:06.591935 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:46:06.592979 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:46:06.599809 systemd-journald[1009]: Time spent on flushing to /var/log/journal/a5e988e9c4f842d6a337cd94a24b5935 is 38.798ms for 1980 entries. Sep 13 00:46:06.599809 systemd-journald[1009]: System Journal (/var/log/journal/a5e988e9c4f842d6a337cd94a24b5935) is 8.0M, max 584.8M, 576.8M free. Sep 13 00:46:06.653276 systemd-journald[1009]: Received client request to flush runtime journal. Sep 13 00:46:06.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.594718 systemd[1]: Starting systemd-sysusers.service... Sep 13 00:46:06.597915 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 00:46:06.598707 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 00:46:06.608360 systemd[1]: Finished systemd-random-seed.service. Sep 13 00:46:06.608527 systemd[1]: Reached target first-boot-complete.target. Sep 13 00:46:06.627557 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:46:06.654003 systemd[1]: Finished systemd-journal-flush.service. Sep 13 00:46:06.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.657429 systemd[1]: Finished systemd-sysusers.service. Sep 13 00:46:06.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.707997 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:46:06.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:06.709165 systemd[1]: Starting systemd-udev-settle.service... Sep 13 00:46:06.716586 udevadm[1052]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 13 00:46:06.759043 ignition[1035]: Ignition 2.14.0 Sep 13 00:46:06.759231 ignition[1035]: deleting config from guestinfo properties Sep 13 00:46:06.810973 ignition[1035]: Successfully deleted config Sep 13 00:46:06.811732 systemd[1]: Finished ignition-delete-config.service. Sep 13 00:46:06.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:07.183482 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 00:46:07.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:07.182000 audit: BPF prog-id=21 op=LOAD Sep 13 00:46:07.183000 audit: BPF prog-id=22 op=LOAD Sep 13 00:46:07.183000 audit: BPF prog-id=7 op=UNLOAD Sep 13 00:46:07.183000 audit: BPF prog-id=8 op=UNLOAD Sep 13 00:46:07.185171 systemd[1]: Starting systemd-udevd.service... Sep 13 00:46:07.199707 systemd-udevd[1053]: Using default interface naming scheme 'v252'. Sep 13 00:46:07.313783 systemd[1]: Started systemd-udevd.service. Sep 13 00:46:07.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:07.313000 audit: BPF prog-id=23 op=LOAD Sep 13 00:46:07.315982 systemd[1]: Starting systemd-networkd.service... Sep 13 00:46:07.324000 audit: BPF prog-id=24 op=LOAD Sep 13 00:46:07.324000 audit: BPF prog-id=25 op=LOAD Sep 13 00:46:07.324000 audit: BPF prog-id=26 op=LOAD Sep 13 00:46:07.326462 systemd[1]: Starting systemd-userdbd.service... Sep 13 00:46:07.344338 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 13 00:46:07.354462 systemd[1]: Started systemd-userdbd.service. Sep 13 00:46:07.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:07.388665 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Sep 13 00:46:07.395635 kernel: ACPI: button: Power Button [PWRF] Sep 13 00:46:07.435344 systemd-networkd[1063]: lo: Link UP Sep 13 00:46:07.435358 systemd-networkd[1063]: lo: Gained carrier Sep 13 00:46:07.435791 systemd-networkd[1063]: Enumeration completed Sep 13 00:46:07.435865 systemd[1]: Started systemd-networkd.service. Sep 13 00:46:07.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:07.436107 systemd-networkd[1063]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Sep 13 00:46:07.438627 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Sep 13 00:46:07.438760 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Sep 13 00:46:07.440739 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Sep 13 00:46:07.440886 systemd-networkd[1063]: ens192: Link UP Sep 13 00:46:07.441048 systemd-networkd[1063]: ens192: Gained carrier Sep 13 00:46:07.476000 audit[1064]: AVC avc: denied { confidentiality } for pid=1064 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 00:46:07.483343 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:46:07.485653 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Sep 13 00:46:07.485850 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Sep 13 00:46:07.487868 kernel: Guest personality initialized and is active Sep 13 00:46:07.487889 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Sep 13 00:46:07.487900 kernel: Initialized host personality Sep 13 00:46:07.476000 audit[1064]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5617ae0f14e0 a1=338ec a2=7f346c633bc5 a3=5 items=110 ppid=1053 pid=1064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:07.476000 audit: CWD cwd="/" Sep 13 00:46:07.476000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=1 name=(null) inode=24945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=2 name=(null) inode=24945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=3 name=(null) inode=24946 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=4 name=(null) inode=24945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=5 name=(null) inode=24947 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=6 name=(null) inode=24945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=7 name=(null) inode=24948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=8 name=(null) inode=24948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=9 name=(null) inode=24949 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=10 name=(null) inode=24948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=11 name=(null) inode=24950 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=12 name=(null) inode=24948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=13 name=(null) inode=24951 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=14 name=(null) inode=24948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=15 name=(null) inode=24952 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=16 name=(null) inode=24948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=17 name=(null) inode=24953 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=18 name=(null) inode=24945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=19 name=(null) inode=24954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=20 name=(null) inode=24954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=21 name=(null) inode=24955 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=22 name=(null) inode=24954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=23 name=(null) inode=24956 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=24 name=(null) inode=24954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=25 name=(null) inode=24957 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=26 name=(null) inode=24954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=27 name=(null) inode=24958 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=28 name=(null) inode=24954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=29 name=(null) inode=24959 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=30 name=(null) inode=24945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=31 name=(null) inode=24960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=32 name=(null) inode=24960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=33 name=(null) inode=24961 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=34 name=(null) inode=24960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=35 name=(null) inode=24962 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=36 name=(null) inode=24960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=37 name=(null) inode=24963 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=38 name=(null) inode=24960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=39 name=(null) inode=24964 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=40 name=(null) inode=24960 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=41 name=(null) inode=24965 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=42 name=(null) inode=24945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=43 name=(null) inode=24966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=44 name=(null) inode=24966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=45 name=(null) inode=24967 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=46 name=(null) inode=24966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=47 name=(null) inode=24968 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=48 name=(null) inode=24966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=49 name=(null) inode=24969 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=50 name=(null) inode=24966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=51 name=(null) inode=24970 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=52 name=(null) inode=24966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=53 name=(null) inode=24971 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=55 name=(null) inode=24972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=56 name=(null) inode=24972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=57 name=(null) inode=24973 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=58 name=(null) inode=24972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=59 name=(null) inode=24974 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=60 name=(null) inode=24972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=61 name=(null) inode=24975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=62 name=(null) inode=24975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=63 name=(null) inode=24976 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=64 name=(null) inode=24975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=65 name=(null) inode=24977 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=66 name=(null) inode=24975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=67 name=(null) inode=24978 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=68 name=(null) inode=24975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=69 name=(null) inode=24979 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=70 name=(null) inode=24975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=71 name=(null) inode=24980 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=72 name=(null) inode=24972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=73 name=(null) inode=24981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=74 name=(null) inode=24981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=75 name=(null) inode=24982 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=76 name=(null) inode=24981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=77 name=(null) inode=24983 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=78 name=(null) inode=24981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=79 name=(null) inode=24984 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=80 name=(null) inode=24981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=81 name=(null) inode=24985 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=82 name=(null) inode=24981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=83 name=(null) inode=24986 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=84 name=(null) inode=24972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=85 name=(null) inode=24987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=86 name=(null) inode=24987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=87 name=(null) inode=24988 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=88 name=(null) inode=24987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=89 name=(null) inode=24989 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=90 name=(null) inode=24987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=91 name=(null) inode=24990 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=92 name=(null) inode=24987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=93 name=(null) inode=24991 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=94 name=(null) inode=24987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=95 name=(null) inode=24992 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=96 name=(null) inode=24972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=97 name=(null) inode=24993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=98 name=(null) inode=24993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=99 name=(null) inode=24994 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=100 name=(null) inode=24993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=101 name=(null) inode=24995 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=102 name=(null) inode=24993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=103 name=(null) inode=24996 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=104 name=(null) inode=24993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=105 name=(null) inode=24997 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=106 name=(null) inode=24993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=107 name=(null) inode=24998 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PATH item=109 name=(null) inode=24999 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:07.476000 audit: PROCTITLE proctitle="(udev-worker)" Sep 13 00:46:07.498627 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Sep 13 00:46:07.506630 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Sep 13 00:46:07.514653 kernel: mousedev: PS/2 mouse device common for all mice Sep 13 00:46:07.519450 (udev-worker)[1065]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Sep 13 00:46:07.531904 systemd[1]: Finished systemd-udev-settle.service. Sep 13 00:46:07.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:07.533036 systemd[1]: Starting lvm2-activation-early.service... Sep 13 00:46:07.553601 lvm[1086]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:46:07.577177 systemd[1]: Finished lvm2-activation-early.service. Sep 13 00:46:07.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:07.577372 systemd[1]: Reached target cryptsetup.target. Sep 13 00:46:07.578301 systemd[1]: Starting lvm2-activation.service... Sep 13 00:46:07.580814 lvm[1087]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:46:07.602133 systemd[1]: Finished lvm2-activation.service. Sep 13 00:46:07.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:07.602323 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:46:07.602426 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 00:46:07.602444 systemd[1]: Reached target local-fs.target. Sep 13 00:46:07.602533 systemd[1]: Reached target machines.target. Sep 13 00:46:07.603479 systemd[1]: Starting ldconfig.service... Sep 13 00:46:07.614514 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:07.614544 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:07.615360 systemd[1]: Starting systemd-boot-update.service... Sep 13 00:46:07.616100 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 00:46:07.616919 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 00:46:07.617719 systemd[1]: Starting systemd-sysext.service... Sep 13 00:46:07.641896 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1089 (bootctl) Sep 13 00:46:07.642861 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 00:46:07.667847 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 00:46:07.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:07.670329 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 00:46:07.698998 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 00:46:07.699118 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 00:46:07.716722 kernel: loop0: detected capacity change from 0 to 229808 Sep 13 00:46:07.856233 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 00:46:07.856917 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 00:46:07.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.045638 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 00:46:08.162709 kernel: loop1: detected capacity change from 0 to 229808 Sep 13 00:46:08.286638 (sd-sysext)[1102]: Using extensions 'kubernetes'. Sep 13 00:46:08.287774 (sd-sysext)[1102]: Merged extensions into '/usr'. Sep 13 00:46:08.302717 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:08.304190 systemd[1]: Mounting usr-share-oem.mount... Sep 13 00:46:08.305383 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:46:08.308219 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:46:08.309414 systemd[1]: Starting modprobe@loop.service... Sep 13 00:46:08.309591 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:08.309736 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:08.309855 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:08.312037 systemd[1]: Mounted usr-share-oem.mount. Sep 13 00:46:08.312658 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:46:08.312774 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:46:08.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.313196 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:46:08.313311 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:46:08.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.313732 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:46:08.313835 systemd[1]: Finished modprobe@loop.service. Sep 13 00:46:08.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.314267 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:46:08.314362 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:46:08.315141 systemd[1]: Finished systemd-sysext.service. Sep 13 00:46:08.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.316391 systemd[1]: Starting ensure-sysext.service... Sep 13 00:46:08.317455 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 00:46:08.325942 systemd[1]: Reloading. Sep 13 00:46:08.336408 systemd-tmpfiles[1109]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 00:46:08.341976 systemd-tmpfiles[1109]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 00:46:08.352486 systemd-tmpfiles[1109]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 00:46:08.353514 systemd-fsck[1099]: fsck.fat 4.2 (2021-01-31) Sep 13 00:46:08.353514 systemd-fsck[1099]: /dev/sda1: 790 files, 120761/258078 clusters Sep 13 00:46:08.382296 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2025-09-13T00:46:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:46:08.382507 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2025-09-13T00:46:08Z" level=info msg="torcx already run" Sep 13 00:46:08.458631 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:46:08.458766 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:46:08.470532 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:46:08.503000 audit: BPF prog-id=27 op=LOAD Sep 13 00:46:08.503000 audit: BPF prog-id=18 op=UNLOAD Sep 13 00:46:08.503000 audit: BPF prog-id=28 op=LOAD Sep 13 00:46:08.503000 audit: BPF prog-id=29 op=LOAD Sep 13 00:46:08.503000 audit: BPF prog-id=19 op=UNLOAD Sep 13 00:46:08.503000 audit: BPF prog-id=20 op=UNLOAD Sep 13 00:46:08.504000 audit: BPF prog-id=30 op=LOAD Sep 13 00:46:08.504000 audit: BPF prog-id=23 op=UNLOAD Sep 13 00:46:08.505000 audit: BPF prog-id=31 op=LOAD Sep 13 00:46:08.505000 audit: BPF prog-id=32 op=LOAD Sep 13 00:46:08.505000 audit: BPF prog-id=21 op=UNLOAD Sep 13 00:46:08.505000 audit: BPF prog-id=22 op=UNLOAD Sep 13 00:46:08.505000 audit: BPF prog-id=33 op=LOAD Sep 13 00:46:08.505000 audit: BPF prog-id=24 op=UNLOAD Sep 13 00:46:08.506000 audit: BPF prog-id=34 op=LOAD Sep 13 00:46:08.506000 audit: BPF prog-id=35 op=LOAD Sep 13 00:46:08.506000 audit: BPF prog-id=25 op=UNLOAD Sep 13 00:46:08.506000 audit: BPF prog-id=26 op=UNLOAD Sep 13 00:46:08.508910 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 00:46:08.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.512524 systemd[1]: Mounting boot.mount... Sep 13 00:46:08.514945 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:08.515606 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:46:08.516298 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:46:08.517318 systemd[1]: Starting modprobe@loop.service... Sep 13 00:46:08.517752 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:08.517829 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:08.517896 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:08.518347 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:46:08.518423 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:46:08.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.518818 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:46:08.518895 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:46:08.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.519211 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:46:08.519280 systemd[1]: Finished modprobe@loop.service. Sep 13 00:46:08.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.519556 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:46:08.519638 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:46:08.520539 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:08.521377 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:46:08.522060 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:46:08.523047 systemd[1]: Starting modprobe@loop.service... Sep 13 00:46:08.523446 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:08.523519 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:08.523585 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:08.524039 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:46:08.524113 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:46:08.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.524409 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:46:08.524489 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:46:08.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.524801 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:46:08.524876 systemd[1]: Finished modprobe@loop.service. Sep 13 00:46:08.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.525152 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:46:08.525212 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:46:08.526826 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:08.527506 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:46:08.528212 systemd[1]: Starting modprobe@drm.service... Sep 13 00:46:08.529296 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:46:08.530340 systemd[1]: Starting modprobe@loop.service... Sep 13 00:46:08.530793 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:08.530867 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:08.531742 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:46:08.531915 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:08.532765 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:46:08.532853 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:46:08.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.533183 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:46:08.533265 systemd[1]: Finished modprobe@drm.service. Sep 13 00:46:08.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.533576 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:46:08.533665 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:46:08.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.533980 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:46:08.534049 systemd[1]: Finished modprobe@loop.service. Sep 13 00:46:08.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.534433 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:46:08.534495 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:46:08.535165 systemd[1]: Finished ensure-sysext.service. Sep 13 00:46:08.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.634041 systemd[1]: Mounted boot.mount. Sep 13 00:46:08.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.647309 systemd[1]: Finished systemd-boot-update.service. Sep 13 00:46:08.750260 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 00:46:08.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.751401 systemd[1]: Starting audit-rules.service... Sep 13 00:46:08.752312 systemd[1]: Starting clean-ca-certificates.service... Sep 13 00:46:08.753284 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 00:46:08.753000 audit: BPF prog-id=36 op=LOAD Sep 13 00:46:08.754000 audit: BPF prog-id=37 op=LOAD Sep 13 00:46:08.755565 systemd[1]: Starting systemd-resolved.service... Sep 13 00:46:08.756883 systemd[1]: Starting systemd-timesyncd.service... Sep 13 00:46:08.757776 systemd[1]: Starting systemd-update-utmp.service... Sep 13 00:46:08.766000 audit[1206]: SYSTEM_BOOT pid=1206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.769267 systemd[1]: Finished systemd-update-utmp.service. Sep 13 00:46:08.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.787847 systemd[1]: Finished clean-ca-certificates.service. Sep 13 00:46:08.788027 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:46:08.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:08.829455 systemd[1]: Started systemd-timesyncd.service. Sep 13 00:46:08.829634 systemd[1]: Reached target time-set.target. Sep 13 00:46:08.848004 systemd-resolved[1204]: Positive Trust Anchors: Sep 13 00:46:08.848322 systemd-resolved[1204]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:46:08.848387 systemd-resolved[1204]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:47:42.001915 systemd-timesyncd[1205]: Contacted time server 23.186.168.125:123 (0.flatcar.pool.ntp.org). Sep 13 00:47:42.002179 systemd-timesyncd[1205]: Initial clock synchronization to Sat 2025-09-13 00:47:42.001778 UTC. Sep 13 00:47:42.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:47:42.049757 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 00:47:42.118000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:47:42.118000 audit[1222]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe15998500 a2=420 a3=0 items=0 ppid=1201 pid=1222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:42.118000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 00:47:42.120187 augenrules[1222]: No rules Sep 13 00:47:42.120558 systemd[1]: Finished audit-rules.service. Sep 13 00:47:42.142460 systemd-resolved[1204]: Defaulting to hostname 'linux'. Sep 13 00:47:42.143673 systemd[1]: Started systemd-resolved.service. Sep 13 00:47:42.143801 systemd[1]: Reached target network.target. Sep 13 00:47:42.143894 systemd[1]: Reached target nss-lookup.target. Sep 13 00:47:42.579758 systemd-networkd[1063]: ens192: Gained IPv6LL Sep 13 00:47:42.581181 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:47:42.581392 systemd[1]: Reached target network-online.target. Sep 13 00:47:42.816529 ldconfig[1088]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 00:47:42.819540 systemd[1]: Finished ldconfig.service. Sep 13 00:47:42.820922 systemd[1]: Starting systemd-update-done.service... Sep 13 00:47:42.826954 systemd[1]: Finished systemd-update-done.service. Sep 13 00:47:42.827199 systemd[1]: Reached target sysinit.target. Sep 13 00:47:42.827442 systemd[1]: Started motdgen.path. Sep 13 00:47:42.827576 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 00:47:42.827887 systemd[1]: Started logrotate.timer. Sep 13 00:47:42.828073 systemd[1]: Started mdadm.timer. Sep 13 00:47:42.828201 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 00:47:42.828346 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 00:47:42.828377 systemd[1]: Reached target paths.target. Sep 13 00:47:42.828498 systemd[1]: Reached target timers.target. Sep 13 00:47:42.828873 systemd[1]: Listening on dbus.socket. Sep 13 00:47:42.830037 systemd[1]: Starting docker.socket... Sep 13 00:47:42.832970 systemd[1]: Listening on sshd.socket. Sep 13 00:47:42.833295 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:47:42.833660 systemd[1]: Listening on docker.socket. Sep 13 00:47:42.834036 systemd[1]: Reached target sockets.target. Sep 13 00:47:42.834225 systemd[1]: Reached target basic.target. Sep 13 00:47:42.834456 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:47:42.834483 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:47:42.835735 systemd[1]: Starting containerd.service... Sep 13 00:47:42.837014 systemd[1]: Starting dbus.service... Sep 13 00:47:42.838557 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 00:47:42.839564 systemd[1]: Starting extend-filesystems.service... Sep 13 00:47:42.839745 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 00:47:42.841034 systemd[1]: Starting kubelet.service... Sep 13 00:47:42.842076 systemd[1]: Starting motdgen.service... Sep 13 00:47:42.843124 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 00:47:42.844287 systemd[1]: Starting sshd-keygen.service... Sep 13 00:47:42.845449 jq[1232]: false Sep 13 00:47:42.846964 systemd[1]: Starting systemd-logind.service... Sep 13 00:47:42.847268 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:47:42.847303 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 00:47:42.848079 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 00:47:42.849054 systemd[1]: Starting update-engine.service... Sep 13 00:47:42.850767 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 00:47:42.857952 jq[1240]: true Sep 13 00:47:42.858032 systemd[1]: Starting vmtoolsd.service... Sep 13 00:47:42.860658 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 00:47:42.860826 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 00:47:42.867850 jq[1250]: true Sep 13 00:47:42.876298 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 00:47:42.877373 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 00:47:42.881569 systemd[1]: Started vmtoolsd.service. Sep 13 00:47:42.884441 extend-filesystems[1233]: Found loop1 Sep 13 00:47:42.888546 extend-filesystems[1233]: Found sda Sep 13 00:47:42.889020 extend-filesystems[1233]: Found sda1 Sep 13 00:47:42.889188 extend-filesystems[1233]: Found sda2 Sep 13 00:47:42.889339 extend-filesystems[1233]: Found sda3 Sep 13 00:47:42.889518 extend-filesystems[1233]: Found usr Sep 13 00:47:42.889661 extend-filesystems[1233]: Found sda4 Sep 13 00:47:42.890142 extend-filesystems[1233]: Found sda6 Sep 13 00:47:42.890287 extend-filesystems[1233]: Found sda7 Sep 13 00:47:42.890435 extend-filesystems[1233]: Found sda9 Sep 13 00:47:42.890584 extend-filesystems[1233]: Checking size of /dev/sda9 Sep 13 00:47:42.895999 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 00:47:42.896110 systemd[1]: Finished motdgen.service. Sep 13 00:47:42.902522 env[1256]: time="2025-09-13T00:47:42.902210729Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 00:47:42.932002 extend-filesystems[1233]: Old size kept for /dev/sda9 Sep 13 00:47:42.932002 extend-filesystems[1233]: Found sr0 Sep 13 00:47:42.932249 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 00:47:42.932350 systemd[1]: Finished extend-filesystems.service. Sep 13 00:47:42.939633 env[1256]: time="2025-09-13T00:47:42.939602047Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 00:47:42.942682 env[1256]: time="2025-09-13T00:47:42.939815759Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:47:42.942682 env[1256]: time="2025-09-13T00:47:42.941096010Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:47:42.942682 env[1256]: time="2025-09-13T00:47:42.941113812Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:47:42.942682 env[1256]: time="2025-09-13T00:47:42.941238745Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:47:42.942682 env[1256]: time="2025-09-13T00:47:42.941249615Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 00:47:42.942682 env[1256]: time="2025-09-13T00:47:42.941257040Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 00:47:42.942682 env[1256]: time="2025-09-13T00:47:42.941262281Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 00:47:42.942682 env[1256]: time="2025-09-13T00:47:42.941304019Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:47:42.942682 env[1256]: time="2025-09-13T00:47:42.941428416Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:47:42.942682 env[1256]: time="2025-09-13T00:47:42.941505931Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:47:42.942883 env[1256]: time="2025-09-13T00:47:42.941514680Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 00:47:42.942883 env[1256]: time="2025-09-13T00:47:42.941540795Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 00:47:42.942883 env[1256]: time="2025-09-13T00:47:42.941547762Z" level=info msg="metadata content store policy set" policy=shared Sep 13 00:47:42.953816 systemd-logind[1238]: Watching system buttons on /dev/input/event1 (Power Button) Sep 13 00:47:42.953830 systemd-logind[1238]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 13 00:47:42.954121 systemd-logind[1238]: New seat seat0. Sep 13 00:47:42.980005 bash[1279]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:47:42.980372 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 00:47:42.983519 env[1256]: time="2025-09-13T00:47:42.983499302Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 00:47:42.983588 env[1256]: time="2025-09-13T00:47:42.983577761Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 00:47:42.983635 env[1256]: time="2025-09-13T00:47:42.983625389Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 00:47:42.984635 env[1256]: time="2025-09-13T00:47:42.984620273Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 00:47:42.984699 env[1256]: time="2025-09-13T00:47:42.984687898Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 00:47:42.984748 env[1256]: time="2025-09-13T00:47:42.984738630Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 00:47:42.984795 env[1256]: time="2025-09-13T00:47:42.984785518Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 00:47:42.984842 env[1256]: time="2025-09-13T00:47:42.984832203Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 00:47:42.984894 env[1256]: time="2025-09-13T00:47:42.984884614Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 00:47:42.984941 env[1256]: time="2025-09-13T00:47:42.984931188Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 00:47:42.984990 env[1256]: time="2025-09-13T00:47:42.984980821Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 00:47:42.985037 env[1256]: time="2025-09-13T00:47:42.985027773Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 00:47:42.985142 env[1256]: time="2025-09-13T00:47:42.985133192Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 00:47:42.985236 env[1256]: time="2025-09-13T00:47:42.985227537Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 00:47:42.985423 env[1256]: time="2025-09-13T00:47:42.985412557Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 00:47:42.985475 env[1256]: time="2025-09-13T00:47:42.985464943Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 00:47:42.985525 env[1256]: time="2025-09-13T00:47:42.985515247Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 00:47:42.985595 env[1256]: time="2025-09-13T00:47:42.985585888Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 00:47:42.985639 env[1256]: time="2025-09-13T00:47:42.985630020Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 00:47:42.985701 env[1256]: time="2025-09-13T00:47:42.985692513Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 00:47:42.985747 env[1256]: time="2025-09-13T00:47:42.985737507Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 00:47:42.985791 env[1256]: time="2025-09-13T00:47:42.985782056Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 00:47:42.985836 env[1256]: time="2025-09-13T00:47:42.985826875Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 00:47:42.985886 env[1256]: time="2025-09-13T00:47:42.985876859Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 00:47:42.985933 env[1256]: time="2025-09-13T00:47:42.985923873Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 00:47:42.985983 env[1256]: time="2025-09-13T00:47:42.985974315Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 00:47:42.986104 env[1256]: time="2025-09-13T00:47:42.986095090Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 00:47:42.986152 env[1256]: time="2025-09-13T00:47:42.986143180Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 00:47:42.986197 env[1256]: time="2025-09-13T00:47:42.986187850Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 00:47:42.986241 env[1256]: time="2025-09-13T00:47:42.986231835Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 00:47:42.986291 env[1256]: time="2025-09-13T00:47:42.986280667Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 00:47:42.986334 env[1256]: time="2025-09-13T00:47:42.986324583Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 00:47:42.986383 env[1256]: time="2025-09-13T00:47:42.986372493Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 00:47:42.986458 env[1256]: time="2025-09-13T00:47:42.986448707Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 00:47:42.986629 env[1256]: time="2025-09-13T00:47:42.986598509Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 00:47:42.996431 env[1256]: time="2025-09-13T00:47:42.986713444Z" level=info msg="Connect containerd service" Sep 13 00:47:42.996431 env[1256]: time="2025-09-13T00:47:42.986736322Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 00:47:42.996431 env[1256]: time="2025-09-13T00:47:42.987068015Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:47:42.996431 env[1256]: time="2025-09-13T00:47:42.987210222Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 00:47:42.996431 env[1256]: time="2025-09-13T00:47:42.987233414Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 00:47:42.996431 env[1256]: time="2025-09-13T00:47:42.987847106Z" level=info msg="containerd successfully booted in 0.086264s" Sep 13 00:47:42.996431 env[1256]: time="2025-09-13T00:47:42.988555369Z" level=info msg="Start subscribing containerd event" Sep 13 00:47:42.996431 env[1256]: time="2025-09-13T00:47:42.988624934Z" level=info msg="Start recovering state" Sep 13 00:47:42.996431 env[1256]: time="2025-09-13T00:47:42.988701439Z" level=info msg="Start event monitor" Sep 13 00:47:42.996431 env[1256]: time="2025-09-13T00:47:42.988799270Z" level=info msg="Start snapshots syncer" Sep 13 00:47:42.996431 env[1256]: time="2025-09-13T00:47:42.988805562Z" level=info msg="Start cni network conf syncer for default" Sep 13 00:47:42.996431 env[1256]: time="2025-09-13T00:47:42.988812314Z" level=info msg="Start streaming server" Sep 13 00:47:42.987295 systemd[1]: Started containerd.service. Sep 13 00:47:43.006523 dbus-daemon[1231]: [system] SELinux support is enabled Sep 13 00:47:43.006608 systemd[1]: Started dbus.service. Sep 13 00:47:43.007796 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 00:47:43.007810 systemd[1]: Reached target system-config.target. Sep 13 00:47:43.007927 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 00:47:43.007936 systemd[1]: Reached target user-config.target. Sep 13 00:47:43.009989 systemd[1]: Started systemd-logind.service. Sep 13 00:47:43.010284 dbus-daemon[1231]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 13 00:47:43.018682 kernel: NET: Registered PF_VSOCK protocol family Sep 13 00:47:43.033618 update_engine[1239]: I0913 00:47:43.031978 1239 main.cc:92] Flatcar Update Engine starting Sep 13 00:47:43.035730 systemd[1]: Started update-engine.service. Sep 13 00:47:43.038751 update_engine[1239]: I0913 00:47:43.038575 1239 update_check_scheduler.cc:74] Next update check in 11m33s Sep 13 00:47:43.037454 systemd[1]: Started locksmithd.service. Sep 13 00:47:43.103981 systemd[1]: Created slice system-sshd.slice. Sep 13 00:47:43.298009 locksmithd[1292]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 00:47:43.358887 sshd_keygen[1258]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 00:47:43.372909 systemd[1]: Finished sshd-keygen.service. Sep 13 00:47:43.374179 systemd[1]: Starting issuegen.service... Sep 13 00:47:43.375004 systemd[1]: Started sshd@0-139.178.70.109:22-121.132.81.3:52900.service. Sep 13 00:47:43.378079 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 00:47:43.378211 systemd[1]: Finished issuegen.service. Sep 13 00:47:43.379606 systemd[1]: Starting systemd-user-sessions.service... Sep 13 00:47:43.386162 systemd[1]: Finished systemd-user-sessions.service. Sep 13 00:47:43.387164 systemd[1]: Started getty@tty1.service. Sep 13 00:47:43.387999 systemd[1]: Started serial-getty@ttyS0.service. Sep 13 00:47:43.388208 systemd[1]: Reached target getty.target. Sep 13 00:47:44.617530 sshd[1352]: Invalid user craft from 121.132.81.3 port 52900 Sep 13 00:47:44.711797 systemd[1]: Started kubelet.service. Sep 13 00:47:44.712120 systemd[1]: Reached target multi-user.target. Sep 13 00:47:44.713147 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 00:47:44.719162 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 00:47:44.719266 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 00:47:44.719455 systemd[1]: Startup finished in 898ms (kernel) + 4.801s (initrd) + 7.255s (userspace) = 12.955s. Sep 13 00:47:44.731072 login[1356]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 00:47:44.732473 login[1357]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 00:47:44.741260 systemd[1]: Created slice user-500.slice. Sep 13 00:47:44.742076 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 00:47:44.746180 systemd-logind[1238]: New session 1 of user core. Sep 13 00:47:44.749079 systemd-logind[1238]: New session 2 of user core. Sep 13 00:47:44.752193 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 00:47:44.753256 systemd[1]: Starting user@500.service... Sep 13 00:47:44.756366 (systemd)[1364]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:47:44.880597 systemd[1364]: Queued start job for default target default.target. Sep 13 00:47:44.881279 systemd[1364]: Reached target paths.target. Sep 13 00:47:44.881298 systemd[1364]: Reached target sockets.target. Sep 13 00:47:44.881307 systemd[1364]: Reached target timers.target. Sep 13 00:47:44.881314 systemd[1364]: Reached target basic.target. Sep 13 00:47:44.881377 systemd[1]: Started user@500.service. Sep 13 00:47:44.882223 systemd[1]: Started session-1.scope. Sep 13 00:47:44.882324 systemd[1364]: Reached target default.target. Sep 13 00:47:44.882351 systemd[1364]: Startup finished in 121ms. Sep 13 00:47:44.882738 systemd[1]: Started session-2.scope. Sep 13 00:47:44.890225 sshd[1352]: pam_faillock(sshd:auth): User unknown Sep 13 00:47:44.890598 sshd[1352]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:47:44.890616 sshd[1352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:47:44.891026 sshd[1352]: pam_faillock(sshd:auth): User unknown Sep 13 00:47:46.336300 kubelet[1361]: E0913 00:47:46.336273 1361 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:47:46.337532 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:47:46.337610 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:47:47.088002 sshd[1352]: Failed password for invalid user craft from 121.132.81.3 port 52900 ssh2 Sep 13 00:47:47.407778 sshd[1352]: Connection closed by invalid user craft 121.132.81.3 port 52900 [preauth] Sep 13 00:47:47.408757 systemd[1]: sshd@0-139.178.70.109:22-121.132.81.3:52900.service: Deactivated successfully. Sep 13 00:47:47.541486 systemd[1]: Started sshd@1-139.178.70.109:22-121.132.81.3:42394.service. Sep 13 00:47:48.300573 systemd[1]: Started sshd@2-139.178.70.109:22-185.255.90.135:47138.service. Sep 13 00:47:48.565009 sshd[1391]: Invalid user pi from 121.132.81.3 port 42394 Sep 13 00:47:48.856300 sshd[1391]: pam_faillock(sshd:auth): User unknown Sep 13 00:47:48.856642 sshd[1391]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:47:48.856683 sshd[1391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:47:48.857055 sshd[1391]: pam_faillock(sshd:auth): User unknown Sep 13 00:47:49.595152 sshd[1394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.255.90.135 user=root Sep 13 00:47:50.602470 sshd[1391]: Failed password for invalid user pi from 121.132.81.3 port 42394 ssh2 Sep 13 00:47:50.905029 sshd[1391]: Connection closed by invalid user pi 121.132.81.3 port 42394 [preauth] Sep 13 00:47:50.905615 systemd[1]: sshd@1-139.178.70.109:22-121.132.81.3:42394.service: Deactivated successfully. Sep 13 00:47:51.097340 systemd[1]: Started sshd@3-139.178.70.109:22-121.132.81.3:59670.service. Sep 13 00:47:51.145027 sshd[1394]: Failed password for root from 185.255.90.135 port 47138 ssh2 Sep 13 00:47:52.180188 sshd[1394]: Received disconnect from 185.255.90.135 port 47138:11: Bye Bye [preauth] Sep 13 00:47:52.180473 sshd[1394]: Disconnected from authenticating user root 185.255.90.135 port 47138 [preauth] Sep 13 00:47:52.181111 systemd[1]: sshd@2-139.178.70.109:22-185.255.90.135:47138.service: Deactivated successfully. Sep 13 00:47:52.611024 sshd[1398]: Invalid user msfadmin from 121.132.81.3 port 59670 Sep 13 00:47:52.881052 sshd[1398]: pam_faillock(sshd:auth): User unknown Sep 13 00:47:52.881760 sshd[1398]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:47:52.881887 sshd[1398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:47:52.882389 sshd[1398]: pam_faillock(sshd:auth): User unknown Sep 13 00:47:55.179484 sshd[1398]: Failed password for invalid user msfadmin from 121.132.81.3 port 59670 ssh2 Sep 13 00:47:55.618485 systemd[1]: Started sshd@4-139.178.70.109:22-23.228.85.111:39186.service. Sep 13 00:47:55.766292 sshd[1402]: Invalid user rajan from 23.228.85.111 port 39186 Sep 13 00:47:55.768055 sshd[1402]: pam_faillock(sshd:auth): User unknown Sep 13 00:47:55.768445 sshd[1402]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:47:55.768507 sshd[1402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.228.85.111 Sep 13 00:47:55.768805 sshd[1402]: pam_faillock(sshd:auth): User unknown Sep 13 00:47:55.965623 sshd[1398]: Connection closed by invalid user msfadmin 121.132.81.3 port 59670 [preauth] Sep 13 00:47:55.966353 systemd[1]: sshd@3-139.178.70.109:22-121.132.81.3:59670.service: Deactivated successfully. Sep 13 00:47:56.119550 systemd[1]: Started sshd@5-139.178.70.109:22-121.132.81.3:51844.service. Sep 13 00:47:56.447978 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 00:47:56.448115 systemd[1]: Stopped kubelet.service. Sep 13 00:47:56.449180 systemd[1]: Starting kubelet.service... Sep 13 00:47:56.707523 systemd[1]: Started kubelet.service. Sep 13 00:47:56.759137 kubelet[1412]: E0913 00:47:56.759110 1412 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:47:56.761503 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:47:56.761590 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:47:57.692572 sshd[1406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 user=root Sep 13 00:47:57.810130 sshd[1402]: Failed password for invalid user rajan from 23.228.85.111 port 39186 ssh2 Sep 13 00:47:59.646438 sshd[1402]: Received disconnect from 23.228.85.111 port 39186:11: Bye Bye [preauth] Sep 13 00:47:59.646438 sshd[1402]: Disconnected from invalid user rajan 23.228.85.111 port 39186 [preauth] Sep 13 00:47:59.647340 systemd[1]: sshd@4-139.178.70.109:22-23.228.85.111:39186.service: Deactivated successfully. Sep 13 00:47:59.673864 sshd[1406]: Failed password for root from 121.132.81.3 port 51844 ssh2 Sep 13 00:48:00.354815 sshd[1406]: Connection closed by authenticating user root 121.132.81.3 port 51844 [preauth] Sep 13 00:48:00.355746 systemd[1]: sshd@5-139.178.70.109:22-121.132.81.3:51844.service: Deactivated successfully. Sep 13 00:48:00.610466 systemd[1]: Started sshd@6-139.178.70.109:22-121.132.81.3:42906.service. Sep 13 00:48:01.499537 sshd[1420]: Invalid user admin from 121.132.81.3 port 42906 Sep 13 00:48:01.663136 sshd[1420]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:01.663644 sshd[1420]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:48:01.663730 sshd[1420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:48:01.664066 sshd[1420]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:03.193766 sshd[1420]: Failed password for invalid user admin from 121.132.81.3 port 42906 ssh2 Sep 13 00:48:03.831155 sshd[1420]: Connection closed by invalid user admin 121.132.81.3 port 42906 [preauth] Sep 13 00:48:03.831822 systemd[1]: sshd@6-139.178.70.109:22-121.132.81.3:42906.service: Deactivated successfully. Sep 13 00:48:03.977645 systemd[1]: Started sshd@7-139.178.70.109:22-121.132.81.3:56552.service. Sep 13 00:48:05.655537 sshd[1424]: Invalid user mcserver from 121.132.81.3 port 56552 Sep 13 00:48:05.867975 sshd[1424]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:05.868545 sshd[1424]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:48:05.868631 sshd[1424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:48:05.869051 sshd[1424]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:06.947965 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 13 00:48:06.948102 systemd[1]: Stopped kubelet.service. Sep 13 00:48:06.949118 systemd[1]: Starting kubelet.service... Sep 13 00:48:07.214859 systemd[1]: Started kubelet.service. Sep 13 00:48:07.240446 kubelet[1430]: E0913 00:48:07.240399 1430 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:48:07.241885 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:48:07.241961 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:48:07.950497 sshd[1424]: Failed password for invalid user mcserver from 121.132.81.3 port 56552 ssh2 Sep 13 00:48:09.190327 sshd[1424]: Connection closed by invalid user mcserver 121.132.81.3 port 56552 [preauth] Sep 13 00:48:09.191117 systemd[1]: sshd@7-139.178.70.109:22-121.132.81.3:56552.service: Deactivated successfully. Sep 13 00:48:09.316995 systemd[1]: Started sshd@8-139.178.70.109:22-121.132.81.3:50102.service. Sep 13 00:48:11.041696 sshd[1437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 user=root Sep 13 00:48:12.610365 sshd[1437]: Failed password for root from 121.132.81.3 port 50102 ssh2 Sep 13 00:48:13.098724 systemd[1]: Started sshd@9-139.178.70.109:22-147.75.109.163:43998.service. Sep 13 00:48:13.131392 sshd[1440]: Accepted publickey for core from 147.75.109.163 port 43998 ssh2: RSA SHA256:sJGDjo0Z2Vx3Gx4EUnUZFO+gxzu8eUeKwoabCfe3hp8 Sep 13 00:48:13.132139 sshd[1440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:13.135075 systemd[1]: Started session-3.scope. Sep 13 00:48:13.135253 systemd-logind[1238]: New session 3 of user core. Sep 13 00:48:13.185776 systemd[1]: Started sshd@10-139.178.70.109:22-147.75.109.163:44010.service. Sep 13 00:48:13.222002 sshd[1445]: Accepted publickey for core from 147.75.109.163 port 44010 ssh2: RSA SHA256:sJGDjo0Z2Vx3Gx4EUnUZFO+gxzu8eUeKwoabCfe3hp8 Sep 13 00:48:13.222862 sshd[1445]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:13.225773 systemd[1]: Started session-4.scope. Sep 13 00:48:13.225952 systemd-logind[1238]: New session 4 of user core. Sep 13 00:48:13.275213 sshd[1445]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:13.277334 systemd[1]: Started sshd@11-139.178.70.109:22-147.75.109.163:44024.service. Sep 13 00:48:13.278766 systemd[1]: sshd@10-139.178.70.109:22-147.75.109.163:44010.service: Deactivated successfully. Sep 13 00:48:13.279153 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 00:48:13.279824 systemd-logind[1238]: Session 4 logged out. Waiting for processes to exit. Sep 13 00:48:13.280396 systemd-logind[1238]: Removed session 4. Sep 13 00:48:13.309699 sshd[1450]: Accepted publickey for core from 147.75.109.163 port 44024 ssh2: RSA SHA256:sJGDjo0Z2Vx3Gx4EUnUZFO+gxzu8eUeKwoabCfe3hp8 Sep 13 00:48:13.310574 sshd[1450]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:13.312693 systemd-logind[1238]: New session 5 of user core. Sep 13 00:48:13.313273 systemd[1]: Started session-5.scope. Sep 13 00:48:13.359771 sshd[1450]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:13.362356 systemd[1]: Started sshd@12-139.178.70.109:22-147.75.109.163:44036.service. Sep 13 00:48:13.362656 systemd[1]: sshd@11-139.178.70.109:22-147.75.109.163:44024.service: Deactivated successfully. Sep 13 00:48:13.363092 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 00:48:13.363915 systemd-logind[1238]: Session 5 logged out. Waiting for processes to exit. Sep 13 00:48:13.364611 systemd-logind[1238]: Removed session 5. Sep 13 00:48:13.396181 sshd[1456]: Accepted publickey for core from 147.75.109.163 port 44036 ssh2: RSA SHA256:sJGDjo0Z2Vx3Gx4EUnUZFO+gxzu8eUeKwoabCfe3hp8 Sep 13 00:48:13.397100 sshd[1456]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:13.399524 systemd-logind[1238]: New session 6 of user core. Sep 13 00:48:13.399962 systemd[1]: Started session-6.scope. Sep 13 00:48:13.450462 sshd[1456]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:13.452204 systemd[1]: Started sshd@13-139.178.70.109:22-147.75.109.163:44046.service. Sep 13 00:48:13.453580 systemd[1]: sshd@12-139.178.70.109:22-147.75.109.163:44036.service: Deactivated successfully. Sep 13 00:48:13.453963 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 00:48:13.454406 systemd-logind[1238]: Session 6 logged out. Waiting for processes to exit. Sep 13 00:48:13.454868 systemd-logind[1238]: Removed session 6. Sep 13 00:48:13.486220 sshd[1462]: Accepted publickey for core from 147.75.109.163 port 44046 ssh2: RSA SHA256:sJGDjo0Z2Vx3Gx4EUnUZFO+gxzu8eUeKwoabCfe3hp8 Sep 13 00:48:13.486974 sshd[1462]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:13.489729 systemd-logind[1238]: New session 7 of user core. Sep 13 00:48:13.489971 systemd[1]: Started session-7.scope. Sep 13 00:48:13.552847 sudo[1466]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 00:48:13.552977 sudo[1466]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:48:13.560764 dbus-daemon[1231]: \xd0MG: received setenforce notice (enforcing=1430954864) Sep 13 00:48:13.561705 sudo[1466]: pam_unix(sudo:session): session closed for user root Sep 13 00:48:13.563309 sshd[1462]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:13.565471 systemd[1]: sshd@13-139.178.70.109:22-147.75.109.163:44046.service: Deactivated successfully. Sep 13 00:48:13.565839 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 00:48:13.566248 systemd-logind[1238]: Session 7 logged out. Waiting for processes to exit. Sep 13 00:48:13.566956 systemd[1]: Started sshd@14-139.178.70.109:22-147.75.109.163:44054.service. Sep 13 00:48:13.567636 systemd-logind[1238]: Removed session 7. Sep 13 00:48:13.601380 sshd[1470]: Accepted publickey for core from 147.75.109.163 port 44054 ssh2: RSA SHA256:sJGDjo0Z2Vx3Gx4EUnUZFO+gxzu8eUeKwoabCfe3hp8 Sep 13 00:48:13.602136 sshd[1470]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:13.603551 sshd[1437]: Connection closed by authenticating user root 121.132.81.3 port 50102 [preauth] Sep 13 00:48:13.604706 systemd-logind[1238]: New session 8 of user core. Sep 13 00:48:13.605173 systemd[1]: Started session-8.scope. Sep 13 00:48:13.605777 systemd[1]: sshd@8-139.178.70.109:22-121.132.81.3:50102.service: Deactivated successfully. Sep 13 00:48:13.654747 sudo[1475]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 00:48:13.654927 sudo[1475]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:48:13.657205 sudo[1475]: pam_unix(sudo:session): session closed for user root Sep 13 00:48:13.659988 sudo[1474]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 00:48:13.660113 sudo[1474]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:48:13.665980 systemd[1]: Stopping audit-rules.service... Sep 13 00:48:13.665000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:48:13.667951 kernel: kauditd_printk_skb: 291 callbacks suppressed Sep 13 00:48:13.667984 kernel: audit: type=1305 audit(1757724493.665:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:48:13.674156 kernel: audit: type=1300 audit(1757724493.665:212): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffce56c8400 a2=420 a3=0 items=0 ppid=1 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:13.674239 kernel: audit: type=1327 audit(1757724493.665:212): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:48:13.665000 audit[1478]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffce56c8400 a2=420 a3=0 items=0 ppid=1 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:13.665000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:48:13.673217 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 00:48:13.674372 auditctl[1478]: No rules Sep 13 00:48:13.673311 systemd[1]: Stopped audit-rules.service. Sep 13 00:48:13.674376 systemd[1]: Starting audit-rules.service... Sep 13 00:48:13.676629 kernel: audit: type=1131 audit(1757724493.672:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.685014 augenrules[1495]: No rules Sep 13 00:48:13.685457 systemd[1]: Finished audit-rules.service. Sep 13 00:48:13.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.685909 sudo[1474]: pam_unix(sudo:session): session closed for user root Sep 13 00:48:13.684000 audit[1474]: USER_END pid=1474 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.691801 kernel: audit: type=1130 audit(1757724493.683:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.691838 kernel: audit: type=1106 audit(1757724493.684:215): pid=1474 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.692445 sshd[1470]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:13.684000 audit[1474]: CRED_DISP pid=1474 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.695724 kernel: audit: type=1104 audit(1757724493.684:216): pid=1474 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.694550 systemd[1]: Started sshd@15-139.178.70.109:22-147.75.109.163:44068.service. Sep 13 00:48:13.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.109:22-147.75.109.163:44068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.700235 kernel: audit: type=1130 audit(1757724493.691:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.109:22-147.75.109.163:44068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.700367 systemd[1]: sshd@14-139.178.70.109:22-147.75.109.163:44054.service: Deactivated successfully. Sep 13 00:48:13.698000 audit[1470]: USER_END pid=1470 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:13.700807 systemd[1]: session-8.scope: Deactivated successfully. Sep 13 00:48:13.704805 kernel: audit: type=1106 audit(1757724493.698:218): pid=1470 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:13.704835 kernel: audit: type=1104 audit(1757724493.698:219): pid=1470 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:13.698000 audit[1470]: CRED_DISP pid=1470 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:13.707637 systemd-logind[1238]: Session 8 logged out. Waiting for processes to exit. Sep 13 00:48:13.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.109:22-147.75.109.163:44054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.708199 systemd-logind[1238]: Removed session 8. Sep 13 00:48:13.732000 audit[1500]: USER_ACCT pid=1500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:13.734680 sshd[1500]: Accepted publickey for core from 147.75.109.163 port 44068 ssh2: RSA SHA256:sJGDjo0Z2Vx3Gx4EUnUZFO+gxzu8eUeKwoabCfe3hp8 Sep 13 00:48:13.735567 sshd[1500]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:13.733000 audit[1500]: CRED_ACQ pid=1500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:13.733000 audit[1500]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd632b5fe0 a2=3 a3=0 items=0 ppid=1 pid=1500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:13.733000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:13.738377 systemd[1]: Started session-9.scope. Sep 13 00:48:13.738737 systemd-logind[1238]: New session 9 of user core. Sep 13 00:48:13.739000 audit[1500]: USER_START pid=1500 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:13.740000 audit[1503]: CRED_ACQ pid=1503 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:13.785000 audit[1504]: USER_ACCT pid=1504 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.787564 sudo[1504]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 00:48:13.786000 audit[1504]: CRED_REFR pid=1504 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.787903 sudo[1504]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:48:13.787000 audit[1504]: USER_START pid=1504 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.794022 systemd[1]: /etc/systemd/system/coreos-metadata.service:11: Ignoring unknown escape sequences: "echo "COREOS_CUSTOM_PRIVATE_IPV4=$(ip addr show ens192 | grep "inet 10." | grep -Po "inet \K[\d.]+") Sep 13 00:48:13.795624 systemd[1]: Starting coreos-metadata.service... Sep 13 00:48:13.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.809619 systemd[1]: coreos-metadata.service: Deactivated successfully. Sep 13 00:48:13.809743 systemd[1]: Finished coreos-metadata.service. Sep 13 00:48:13.925317 systemd[1]: Started sshd@16-139.178.70.109:22-121.132.81.3:43464.service. Sep 13 00:48:13.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.109:22-121.132.81.3:43464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:14.317847 systemd[1]: Stopped kubelet.service. Sep 13 00:48:14.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:14.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:14.319620 systemd[1]: Starting kubelet.service... Sep 13 00:48:14.339126 systemd[1]: Reloading. Sep 13 00:48:14.387175 /usr/lib/systemd/system-generators/torcx-generator[1572]: time="2025-09-13T00:48:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:48:14.387193 /usr/lib/systemd/system-generators/torcx-generator[1572]: time="2025-09-13T00:48:14Z" level=info msg="torcx already run" Sep 13 00:48:14.453737 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:48:14.453843 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:48:14.465410 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:48:14.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.505000 audit: BPF prog-id=43 op=LOAD Sep 13 00:48:14.505000 audit: BPF prog-id=41 op=UNLOAD Sep 13 00:48:14.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit: BPF prog-id=44 op=LOAD Sep 13 00:48:14.507000 audit: BPF prog-id=38 op=UNLOAD Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit: BPF prog-id=45 op=LOAD Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit: BPF prog-id=46 op=LOAD Sep 13 00:48:14.507000 audit: BPF prog-id=39 op=UNLOAD Sep 13 00:48:14.507000 audit: BPF prog-id=40 op=UNLOAD Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit: BPF prog-id=47 op=LOAD Sep 13 00:48:14.507000 audit: BPF prog-id=27 op=UNLOAD Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit: BPF prog-id=48 op=LOAD Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.507000 audit: BPF prog-id=49 op=LOAD Sep 13 00:48:14.507000 audit: BPF prog-id=28 op=UNLOAD Sep 13 00:48:14.507000 audit: BPF prog-id=29 op=UNLOAD Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit: BPF prog-id=50 op=LOAD Sep 13 00:48:14.508000 audit: BPF prog-id=36 op=UNLOAD Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit: BPF prog-id=51 op=LOAD Sep 13 00:48:14.509000 audit: BPF prog-id=30 op=UNLOAD Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit: BPF prog-id=52 op=LOAD Sep 13 00:48:14.509000 audit: BPF prog-id=37 op=UNLOAD Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit: BPF prog-id=53 op=LOAD Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.509000 audit: BPF prog-id=54 op=LOAD Sep 13 00:48:14.509000 audit: BPF prog-id=31 op=UNLOAD Sep 13 00:48:14.509000 audit: BPF prog-id=32 op=UNLOAD Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit: BPF prog-id=55 op=LOAD Sep 13 00:48:14.511000 audit: BPF prog-id=33 op=UNLOAD Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit: BPF prog-id=56 op=LOAD Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:14.511000 audit: BPF prog-id=57 op=LOAD Sep 13 00:48:14.511000 audit: BPF prog-id=34 op=UNLOAD Sep 13 00:48:14.511000 audit: BPF prog-id=35 op=UNLOAD Sep 13 00:48:14.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:14.525280 systemd[1]: Stopping kubelet.service... Sep 13 00:48:14.525719 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:48:14.525832 systemd[1]: Stopped kubelet.service. Sep 13 00:48:14.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:14.526889 systemd[1]: Starting kubelet.service... Sep 13 00:48:15.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:15.040042 systemd[1]: Started kubelet.service. Sep 13 00:48:15.069918 kubelet[1639]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:48:15.069918 kubelet[1639]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 00:48:15.069918 kubelet[1639]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:48:15.070156 kubelet[1639]: I0913 00:48:15.069943 1639 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:48:15.282852 kubelet[1639]: I0913 00:48:15.282832 1639 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Sep 13 00:48:15.282852 kubelet[1639]: I0913 00:48:15.282848 1639 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:48:15.282981 kubelet[1639]: I0913 00:48:15.282970 1639 server.go:956] "Client rotation is on, will bootstrap in background" Sep 13 00:48:15.322183 kubelet[1639]: I0913 00:48:15.322113 1639 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:48:15.331800 kubelet[1639]: E0913 00:48:15.331762 1639 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:48:15.331800 kubelet[1639]: I0913 00:48:15.331801 1639 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:48:15.334069 kubelet[1639]: I0913 00:48:15.334049 1639 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:48:15.334210 kubelet[1639]: I0913 00:48:15.334185 1639 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:48:15.334309 kubelet[1639]: I0913 00:48:15.334206 1639 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.67.124.141","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:48:15.334382 kubelet[1639]: I0913 00:48:15.334312 1639 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:48:15.334382 kubelet[1639]: I0913 00:48:15.334319 1639 container_manager_linux.go:303] "Creating device plugin manager" Sep 13 00:48:15.335302 kubelet[1639]: I0913 00:48:15.335287 1639 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:48:15.338511 kubelet[1639]: I0913 00:48:15.338490 1639 kubelet.go:480] "Attempting to sync node with API server" Sep 13 00:48:15.338511 kubelet[1639]: I0913 00:48:15.338512 1639 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:48:15.338698 kubelet[1639]: I0913 00:48:15.338530 1639 kubelet.go:386] "Adding apiserver pod source" Sep 13 00:48:15.338698 kubelet[1639]: I0913 00:48:15.338539 1639 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:48:15.362528 kubelet[1639]: E0913 00:48:15.362497 1639 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:15.362636 kubelet[1639]: E0913 00:48:15.362545 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:15.375000 audit[1530]: USER_AUTH pid=1530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:15.376457 sshd[1530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 user=root Sep 13 00:48:15.379614 kubelet[1639]: I0913 00:48:15.379598 1639 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:48:15.380060 kubelet[1639]: I0913 00:48:15.380052 1639 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Sep 13 00:48:15.381274 kubelet[1639]: W0913 00:48:15.381263 1639 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 00:48:15.382841 kubelet[1639]: I0913 00:48:15.382831 1639 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 00:48:15.382970 kubelet[1639]: I0913 00:48:15.382962 1639 server.go:1289] "Started kubelet" Sep 13 00:48:15.388952 kubelet[1639]: I0913 00:48:15.388898 1639 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:48:15.389709 kubelet[1639]: I0913 00:48:15.389516 1639 server.go:317] "Adding debug handlers to kubelet server" Sep 13 00:48:15.397846 kubelet[1639]: I0913 00:48:15.397808 1639 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:48:15.397982 kubelet[1639]: I0913 00:48:15.397970 1639 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:48:15.398000 audit[1639]: AVC avc: denied { mac_admin } for pid=1639 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:15.398000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:48:15.398000 audit[1639]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00087b560 a1=c000471d28 a2=c00087b530 a3=25 items=0 ppid=1 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.398000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:48:15.398000 audit[1639]: AVC avc: denied { mac_admin } for pid=1639 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:15.398000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:48:15.398000 audit[1639]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aa0420 a1=c000471d40 a2=c00087b5f0 a3=25 items=0 ppid=1 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.398000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:48:15.400594 kubelet[1639]: I0913 00:48:15.400373 1639 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:48:15.400594 kubelet[1639]: I0913 00:48:15.400401 1639 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 00:48:15.400594 kubelet[1639]: I0913 00:48:15.400441 1639 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:48:15.400737 kubelet[1639]: E0913 00:48:15.400724 1639 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Sep 13 00:48:15.400854 kubelet[1639]: E0913 00:48:15.400842 1639 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: nodes \"10.67.124.141\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Sep 13 00:48:15.401121 kubelet[1639]: I0913 00:48:15.401111 1639 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:48:15.404622 kubelet[1639]: E0913 00:48:15.403244 1639 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.141.1864b11da04d9f27 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.141,UID:10.67.124.141,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.67.124.141,},FirstTimestamp:2025-09-13 00:48:15.382945575 +0000 UTC m=+0.340151554,LastTimestamp:2025-09-13 00:48:15.382945575 +0000 UTC m=+0.340151554,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.141,}" Sep 13 00:48:15.405058 kubelet[1639]: E0913 00:48:15.405047 1639 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.141\" not found" Sep 13 00:48:15.405121 kubelet[1639]: I0913 00:48:15.405113 1639 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 00:48:15.405286 kubelet[1639]: I0913 00:48:15.405278 1639 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 00:48:15.405364 kubelet[1639]: I0913 00:48:15.405358 1639 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:48:15.405988 kubelet[1639]: I0913 00:48:15.405978 1639 factory.go:223] Registration of the systemd container factory successfully Sep 13 00:48:15.406091 kubelet[1639]: I0913 00:48:15.406077 1639 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:48:15.406952 kubelet[1639]: E0913 00:48:15.406942 1639 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:48:15.407147 kubelet[1639]: I0913 00:48:15.407139 1639 factory.go:223] Registration of the containerd container factory successfully Sep 13 00:48:15.425025 kubelet[1639]: E0913 00:48:15.424963 1639 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.141.1864b11da1bb9b2f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.141,UID:10.67.124.141,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.67.124.141,},FirstTimestamp:2025-09-13 00:48:15.406930735 +0000 UTC m=+0.364136717,LastTimestamp:2025-09-13 00:48:15.406930735 +0000 UTC m=+0.364136717,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.141,}" Sep 13 00:48:15.425640 kubelet[1639]: I0913 00:48:15.425624 1639 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 00:48:15.426212 kubelet[1639]: I0913 00:48:15.426204 1639 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 00:48:15.426278 kubelet[1639]: I0913 00:48:15.426271 1639 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:48:15.426474 kubelet[1639]: E0913 00:48:15.426025 1639 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.141\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Sep 13 00:48:15.426519 kubelet[1639]: E0913 00:48:15.426062 1639 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Sep 13 00:48:15.426564 kubelet[1639]: E0913 00:48:15.426110 1639 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.141.1864b11da2c138c9 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.141,UID:10.67.124.141,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.67.124.141 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.67.124.141,},FirstTimestamp:2025-09-13 00:48:15.424075977 +0000 UTC m=+0.381281959,LastTimestamp:2025-09-13 00:48:15.424075977 +0000 UTC m=+0.381281959,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.141,}" Sep 13 00:48:15.428035 kubelet[1639]: I0913 00:48:15.428027 1639 policy_none.go:49] "None policy: Start" Sep 13 00:48:15.428099 kubelet[1639]: I0913 00:48:15.428092 1639 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 00:48:15.428176 kubelet[1639]: I0913 00:48:15.428170 1639 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:48:15.430704 kubelet[1639]: E0913 00:48:15.430630 1639 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.141.1864b11da2c14dcc default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.141,UID:10.67.124.141,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.67.124.141 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.67.124.141,},FirstTimestamp:2025-09-13 00:48:15.424081356 +0000 UTC m=+0.381287332,LastTimestamp:2025-09-13 00:48:15.424081356 +0000 UTC m=+0.381287332,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.141,}" Sep 13 00:48:15.432780 kubelet[1639]: E0913 00:48:15.432731 1639 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.141.1864b11da2c156e9 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.141,UID:10.67.124.141,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.67.124.141 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.67.124.141,},FirstTimestamp:2025-09-13 00:48:15.424083689 +0000 UTC m=+0.381289665,LastTimestamp:2025-09-13 00:48:15.424083689 +0000 UTC m=+0.381289665,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.141,}" Sep 13 00:48:15.434261 systemd[1]: Created slice kubepods.slice. Sep 13 00:48:15.437602 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 00:48:15.439908 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 00:48:15.440000 audit[1662]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:15.440000 audit[1662]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc6149f5e0 a2=0 a3=7ffc6149f5cc items=0 ppid=1639 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:48:15.440000 audit[1663]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1663 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:15.440000 audit[1663]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd6ca22710 a2=0 a3=7ffd6ca226fc items=0 ppid=1639 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:48:15.443000 audit[1639]: AVC avc: denied { mac_admin } for pid=1639 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:15.443000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:48:15.443000 audit[1639]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bffad0 a1=c000da9d58 a2=c000bffaa0 a3=25 items=0 ppid=1 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.443000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:48:15.446321 kubelet[1639]: E0913 00:48:15.445443 1639 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Sep 13 00:48:15.446321 kubelet[1639]: E0913 00:48:15.445585 1639 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Sep 13 00:48:15.446321 kubelet[1639]: I0913 00:48:15.445695 1639 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:48:15.446321 kubelet[1639]: I0913 00:48:15.445702 1639 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:48:15.446321 kubelet[1639]: I0913 00:48:15.446010 1639 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:48:15.447982 kubelet[1639]: E0913 00:48:15.447964 1639 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 00:48:15.448069 kubelet[1639]: E0913 00:48:15.448061 1639 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.141\" not found" Sep 13 00:48:15.448330 kubelet[1639]: E0913 00:48:15.448288 1639 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.141.1864b11da4230642 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.141,UID:10.67.124.141,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:10.67.124.141,},FirstTimestamp:2025-09-13 00:48:15.447262786 +0000 UTC m=+0.404468766,LastTimestamp:2025-09-13 00:48:15.447262786 +0000 UTC m=+0.404468766,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.141,}" Sep 13 00:48:15.442000 audit[1665]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:15.442000 audit[1665]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff5b6bbfe0 a2=0 a3=7fff5b6bbfcc items=0 ppid=1639 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:48:15.456000 audit[1670]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1670 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:15.456000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff31d9fc70 a2=0 a3=7fff31d9fc5c items=0 ppid=1639 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:48:15.491000 audit[1675]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1675 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:15.491000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcf86c33e0 a2=0 a3=7ffcf86c33cc items=0 ppid=1639 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.491000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 00:48:15.493904 kubelet[1639]: I0913 00:48:15.493874 1639 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Sep 13 00:48:15.492000 audit[1677]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1677 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:15.492000 audit[1677]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7596cd00 a2=0 a3=7fff7596ccec items=0 ppid=1639 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:48:15.492000 audit[1676]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:15.492000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe55069ad0 a2=0 a3=7ffe55069abc items=0 ppid=1639 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.492000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:48:15.494754 kubelet[1639]: I0913 00:48:15.494710 1639 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Sep 13 00:48:15.494754 kubelet[1639]: I0913 00:48:15.494721 1639 status_manager.go:230] "Starting to sync pod status with apiserver" Sep 13 00:48:15.494754 kubelet[1639]: I0913 00:48:15.494740 1639 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 00:48:15.494754 kubelet[1639]: I0913 00:48:15.494749 1639 kubelet.go:2436] "Starting kubelet main sync loop" Sep 13 00:48:15.494828 kubelet[1639]: E0913 00:48:15.494813 1639 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 13 00:48:15.494000 audit[1678]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:15.494000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff00cfcc50 a2=0 a3=7fff00cfcc3c items=0 ppid=1639 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:48:15.494000 audit[1679]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:15.494000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca75a2990 a2=0 a3=7ffca75a297c items=0 ppid=1639 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:48:15.495000 audit[1681]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:15.495000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff53f635a0 a2=0 a3=7fff53f6358c items=0 ppid=1639 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.495000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:48:15.495000 audit[1680]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:15.495000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff85754060 a2=0 a3=7fff8575404c items=0 ppid=1639 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:48:15.496000 audit[1682]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:15.496000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff6c845080 a2=0 a3=7fff6c84506c items=0 ppid=1639 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:48:15.546579 kubelet[1639]: I0913 00:48:15.546554 1639 kubelet_node_status.go:75] "Attempting to register node" node="10.67.124.141" Sep 13 00:48:15.562896 kubelet[1639]: I0913 00:48:15.562878 1639 kubelet_node_status.go:78] "Successfully registered node" node="10.67.124.141" Sep 13 00:48:15.563065 kubelet[1639]: E0913 00:48:15.563052 1639 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.67.124.141\": node \"10.67.124.141\" not found" Sep 13 00:48:15.569898 kubelet[1639]: E0913 00:48:15.569879 1639 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.141\" not found" Sep 13 00:48:15.670831 kubelet[1639]: E0913 00:48:15.670191 1639 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.141\" not found" Sep 13 00:48:15.770858 kubelet[1639]: E0913 00:48:15.770833 1639 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.141\" not found" Sep 13 00:48:15.871473 kubelet[1639]: E0913 00:48:15.871447 1639 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.141\" not found" Sep 13 00:48:15.972240 kubelet[1639]: E0913 00:48:15.972214 1639 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.141\" not found" Sep 13 00:48:16.060000 audit[1504]: USER_END pid=1504 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:48:16.060000 audit[1504]: CRED_DISP pid=1504 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:48:16.061731 sudo[1504]: pam_unix(sudo:session): session closed for user root Sep 13 00:48:16.062649 sshd[1500]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:16.061000 audit[1500]: USER_END pid=1500 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:16.061000 audit[1500]: CRED_DISP pid=1500 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:16.064361 systemd[1]: sshd@15-139.178.70.109:22-147.75.109.163:44068.service: Deactivated successfully. Sep 13 00:48:16.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.109:22-147.75.109.163:44068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:16.064807 systemd[1]: session-9.scope: Deactivated successfully. Sep 13 00:48:16.065159 systemd-logind[1238]: Session 9 logged out. Waiting for processes to exit. Sep 13 00:48:16.065773 systemd-logind[1238]: Removed session 9. Sep 13 00:48:16.072908 kubelet[1639]: E0913 00:48:16.072890 1639 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.141\" not found" Sep 13 00:48:16.173601 kubelet[1639]: E0913 00:48:16.173575 1639 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.124.141\" not found" Sep 13 00:48:16.275246 kubelet[1639]: I0913 00:48:16.275175 1639 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 13 00:48:16.275396 env[1256]: time="2025-09-13T00:48:16.275368650Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 00:48:16.275590 kubelet[1639]: I0913 00:48:16.275478 1639 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 13 00:48:16.288282 kubelet[1639]: I0913 00:48:16.288230 1639 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 13 00:48:16.288506 kubelet[1639]: I0913 00:48:16.288483 1639 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Sep 13 00:48:16.363471 kubelet[1639]: E0913 00:48:16.363412 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:16.365600 kubelet[1639]: I0913 00:48:16.365556 1639 apiserver.go:52] "Watching apiserver" Sep 13 00:48:16.458779 systemd[1]: Created slice kubepods-besteffort-pod73448515_3b24_4edd_be1e_e4513016364c.slice. Sep 13 00:48:16.459744 kubelet[1639]: E0913 00:48:16.459726 1639 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlfxz" podUID="d4b8e069-24cf-4eee-b387-607d770984c6" Sep 13 00:48:16.465404 systemd[1]: Created slice kubepods-besteffort-pod69d01850_9bd1_416a_9ac0_f851b3c560f3.slice. Sep 13 00:48:16.505978 kubelet[1639]: I0913 00:48:16.505958 1639 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 00:48:16.512314 kubelet[1639]: I0913 00:48:16.512295 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/69d01850-9bd1-416a-9ac0-f851b3c560f3-kube-proxy\") pod \"kube-proxy-fchbx\" (UID: \"69d01850-9bd1-416a-9ac0-f851b3c560f3\") " pod="kube-system/kube-proxy-fchbx" Sep 13 00:48:16.512365 kubelet[1639]: I0913 00:48:16.512316 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/69d01850-9bd1-416a-9ac0-f851b3c560f3-lib-modules\") pod \"kube-proxy-fchbx\" (UID: \"69d01850-9bd1-416a-9ac0-f851b3c560f3\") " pod="kube-system/kube-proxy-fchbx" Sep 13 00:48:16.512365 kubelet[1639]: I0913 00:48:16.512326 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/73448515-3b24-4edd-be1e-e4513016364c-cni-bin-dir\") pod \"calico-node-5l6p2\" (UID: \"73448515-3b24-4edd-be1e-e4513016364c\") " pod="calico-system/calico-node-5l6p2" Sep 13 00:48:16.512365 kubelet[1639]: I0913 00:48:16.512335 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/73448515-3b24-4edd-be1e-e4513016364c-node-certs\") pod \"calico-node-5l6p2\" (UID: \"73448515-3b24-4edd-be1e-e4513016364c\") " pod="calico-system/calico-node-5l6p2" Sep 13 00:48:16.512365 kubelet[1639]: I0913 00:48:16.512343 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d4b8e069-24cf-4eee-b387-607d770984c6-registration-dir\") pod \"csi-node-driver-xlfxz\" (UID: \"d4b8e069-24cf-4eee-b387-607d770984c6\") " pod="calico-system/csi-node-driver-xlfxz" Sep 13 00:48:16.512365 kubelet[1639]: I0913 00:48:16.512355 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qmzkq\" (UniqueName: \"kubernetes.io/projected/d4b8e069-24cf-4eee-b387-607d770984c6-kube-api-access-qmzkq\") pod \"csi-node-driver-xlfxz\" (UID: \"d4b8e069-24cf-4eee-b387-607d770984c6\") " pod="calico-system/csi-node-driver-xlfxz" Sep 13 00:48:16.512480 kubelet[1639]: I0913 00:48:16.512363 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/69d01850-9bd1-416a-9ac0-f851b3c560f3-xtables-lock\") pod \"kube-proxy-fchbx\" (UID: \"69d01850-9bd1-416a-9ac0-f851b3c560f3\") " pod="kube-system/kube-proxy-fchbx" Sep 13 00:48:16.512480 kubelet[1639]: I0913 00:48:16.512378 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/73448515-3b24-4edd-be1e-e4513016364c-cni-net-dir\") pod \"calico-node-5l6p2\" (UID: \"73448515-3b24-4edd-be1e-e4513016364c\") " pod="calico-system/calico-node-5l6p2" Sep 13 00:48:16.512480 kubelet[1639]: I0913 00:48:16.512388 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/73448515-3b24-4edd-be1e-e4513016364c-flexvol-driver-host\") pod \"calico-node-5l6p2\" (UID: \"73448515-3b24-4edd-be1e-e4513016364c\") " pod="calico-system/calico-node-5l6p2" Sep 13 00:48:16.512480 kubelet[1639]: I0913 00:48:16.512396 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/73448515-3b24-4edd-be1e-e4513016364c-var-run-calico\") pod \"calico-node-5l6p2\" (UID: \"73448515-3b24-4edd-be1e-e4513016364c\") " pod="calico-system/calico-node-5l6p2" Sep 13 00:48:16.512480 kubelet[1639]: I0913 00:48:16.512405 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/73448515-3b24-4edd-be1e-e4513016364c-xtables-lock\") pod \"calico-node-5l6p2\" (UID: \"73448515-3b24-4edd-be1e-e4513016364c\") " pod="calico-system/calico-node-5l6p2" Sep 13 00:48:16.512576 kubelet[1639]: I0913 00:48:16.512414 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/73448515-3b24-4edd-be1e-e4513016364c-tigera-ca-bundle\") pod \"calico-node-5l6p2\" (UID: \"73448515-3b24-4edd-be1e-e4513016364c\") " pod="calico-system/calico-node-5l6p2" Sep 13 00:48:16.512576 kubelet[1639]: I0913 00:48:16.512427 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/73448515-3b24-4edd-be1e-e4513016364c-var-lib-calico\") pod \"calico-node-5l6p2\" (UID: \"73448515-3b24-4edd-be1e-e4513016364c\") " pod="calico-system/calico-node-5l6p2" Sep 13 00:48:16.512576 kubelet[1639]: I0913 00:48:16.512435 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d4b8e069-24cf-4eee-b387-607d770984c6-socket-dir\") pod \"csi-node-driver-xlfxz\" (UID: \"d4b8e069-24cf-4eee-b387-607d770984c6\") " pod="calico-system/csi-node-driver-xlfxz" Sep 13 00:48:16.512576 kubelet[1639]: I0913 00:48:16.512443 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d4b8e069-24cf-4eee-b387-607d770984c6-varrun\") pod \"csi-node-driver-xlfxz\" (UID: \"d4b8e069-24cf-4eee-b387-607d770984c6\") " pod="calico-system/csi-node-driver-xlfxz" Sep 13 00:48:16.512576 kubelet[1639]: I0913 00:48:16.512451 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hxwgq\" (UniqueName: \"kubernetes.io/projected/69d01850-9bd1-416a-9ac0-f851b3c560f3-kube-api-access-hxwgq\") pod \"kube-proxy-fchbx\" (UID: \"69d01850-9bd1-416a-9ac0-f851b3c560f3\") " pod="kube-system/kube-proxy-fchbx" Sep 13 00:48:16.512687 kubelet[1639]: I0913 00:48:16.512461 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/73448515-3b24-4edd-be1e-e4513016364c-cni-log-dir\") pod \"calico-node-5l6p2\" (UID: \"73448515-3b24-4edd-be1e-e4513016364c\") " pod="calico-system/calico-node-5l6p2" Sep 13 00:48:16.512687 kubelet[1639]: I0913 00:48:16.512470 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/73448515-3b24-4edd-be1e-e4513016364c-lib-modules\") pod \"calico-node-5l6p2\" (UID: \"73448515-3b24-4edd-be1e-e4513016364c\") " pod="calico-system/calico-node-5l6p2" Sep 13 00:48:16.512687 kubelet[1639]: I0913 00:48:16.512477 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/73448515-3b24-4edd-be1e-e4513016364c-policysync\") pod \"calico-node-5l6p2\" (UID: \"73448515-3b24-4edd-be1e-e4513016364c\") " pod="calico-system/calico-node-5l6p2" Sep 13 00:48:16.512687 kubelet[1639]: I0913 00:48:16.512502 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9qmm9\" (UniqueName: \"kubernetes.io/projected/73448515-3b24-4edd-be1e-e4513016364c-kube-api-access-9qmm9\") pod \"calico-node-5l6p2\" (UID: \"73448515-3b24-4edd-be1e-e4513016364c\") " pod="calico-system/calico-node-5l6p2" Sep 13 00:48:16.512687 kubelet[1639]: I0913 00:48:16.512512 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d4b8e069-24cf-4eee-b387-607d770984c6-kubelet-dir\") pod \"csi-node-driver-xlfxz\" (UID: \"d4b8e069-24cf-4eee-b387-607d770984c6\") " pod="calico-system/csi-node-driver-xlfxz" Sep 13 00:48:16.614615 kubelet[1639]: I0913 00:48:16.614565 1639 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 00:48:16.619296 kubelet[1639]: E0913 00:48:16.619277 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:16.619296 kubelet[1639]: W0913 00:48:16.619290 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:16.619391 kubelet[1639]: E0913 00:48:16.619308 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:16.653409 kubelet[1639]: E0913 00:48:16.653388 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:16.653409 kubelet[1639]: W0913 00:48:16.653401 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:16.653509 kubelet[1639]: E0913 00:48:16.653414 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:16.653653 kubelet[1639]: E0913 00:48:16.653641 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:16.653653 kubelet[1639]: W0913 00:48:16.653648 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:16.653653 kubelet[1639]: E0913 00:48:16.653653 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:16.657320 kubelet[1639]: E0913 00:48:16.657306 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:16.657399 kubelet[1639]: W0913 00:48:16.657388 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:16.657456 kubelet[1639]: E0913 00:48:16.657448 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:16.764177 env[1256]: time="2025-09-13T00:48:16.764007814Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5l6p2,Uid:73448515-3b24-4edd-be1e-e4513016364c,Namespace:calico-system,Attempt:0,}" Sep 13 00:48:16.767960 env[1256]: time="2025-09-13T00:48:16.767928234Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fchbx,Uid:69d01850-9bd1-416a-9ac0-f851b3c560f3,Namespace:kube-system,Attempt:0,}" Sep 13 00:48:17.363897 kubelet[1639]: E0913 00:48:17.363859 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:17.487268 env[1256]: time="2025-09-13T00:48:17.487228988Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:17.488101 env[1256]: time="2025-09-13T00:48:17.488082523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:17.488526 env[1256]: time="2025-09-13T00:48:17.488501692Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:17.489155 env[1256]: time="2025-09-13T00:48:17.489140615Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:17.490445 env[1256]: time="2025-09-13T00:48:17.490427652Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:17.492614 env[1256]: time="2025-09-13T00:48:17.492506929Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:17.493662 env[1256]: time="2025-09-13T00:48:17.493647912Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:17.497806 sshd[1530]: Failed password for root from 121.132.81.3 port 43464 ssh2 Sep 13 00:48:17.498964 env[1256]: time="2025-09-13T00:48:17.498944161Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:17.509360 env[1256]: time="2025-09-13T00:48:17.505641098Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:48:17.509360 env[1256]: time="2025-09-13T00:48:17.505658038Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:48:17.509360 env[1256]: time="2025-09-13T00:48:17.505701353Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:48:17.509360 env[1256]: time="2025-09-13T00:48:17.505792902Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b423c1712c3fddadecbc21933ac414b04a09f341efba2f6c1c3fc213d6be1578 pid=1709 runtime=io.containerd.runc.v2 Sep 13 00:48:17.509691 env[1256]: time="2025-09-13T00:48:17.505360430Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:48:17.509691 env[1256]: time="2025-09-13T00:48:17.505405015Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:48:17.509691 env[1256]: time="2025-09-13T00:48:17.505415368Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:48:17.509691 env[1256]: time="2025-09-13T00:48:17.505497652Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef09e58c894d0dbcd6307516f11551f4690faa8e48453647aa57da0fed94cbb9 pid=1710 runtime=io.containerd.runc.v2 Sep 13 00:48:17.528542 systemd[1]: Started cri-containerd-b423c1712c3fddadecbc21933ac414b04a09f341efba2f6c1c3fc213d6be1578.scope. Sep 13 00:48:17.537080 systemd[1]: Started cri-containerd-ef09e58c894d0dbcd6307516f11551f4690faa8e48453647aa57da0fed94cbb9.scope. Sep 13 00:48:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.541000 audit: BPF prog-id=58 op=LOAD Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1709 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:17.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234323363313731326333666464616465636263323139333361633431 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1709 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:17.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234323363313731326333666464616465636263323139333361633431 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit: BPF prog-id=59 op=LOAD Sep 13 00:48:17.542000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000215010 items=0 ppid=1709 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:17.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234323363313731326333666464616465636263323139333361633431 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit: BPF prog-id=60 op=LOAD Sep 13 00:48:17.542000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000215058 items=0 ppid=1709 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:17.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234323363313731326333666464616465636263323139333361633431 Sep 13 00:48:17.542000 audit: BPF prog-id=60 op=UNLOAD Sep 13 00:48:17.542000 audit: BPF prog-id=59 op=UNLOAD Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.542000 audit: BPF prog-id=61 op=LOAD Sep 13 00:48:17.542000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000215468 items=0 ppid=1709 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:17.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234323363313731326333666464616465636263323139333361633431 Sep 13 00:48:17.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.551000 audit: BPF prog-id=62 op=LOAD Sep 13 00:48:17.551000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.551000 audit[1732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1710 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:17.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566303965353863383934643064626364363330373531366631313535 Sep 13 00:48:17.551000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.551000 audit[1732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1710 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:17.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566303965353863383934643064626364363330373531366631313535 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit: BPF prog-id=63 op=LOAD Sep 13 00:48:17.552000 audit[1732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001e5ce0 items=0 ppid=1710 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:17.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566303965353863383934643064626364363330373531366631313535 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit: BPF prog-id=64 op=LOAD Sep 13 00:48:17.552000 audit[1732]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001e5d28 items=0 ppid=1710 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:17.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566303965353863383934643064626364363330373531366631313535 Sep 13 00:48:17.552000 audit: BPF prog-id=64 op=UNLOAD Sep 13 00:48:17.552000 audit: BPF prog-id=63 op=UNLOAD Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:17.552000 audit: BPF prog-id=65 op=LOAD Sep 13 00:48:17.552000 audit[1732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002ce138 items=0 ppid=1710 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:17.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566303965353863383934643064626364363330373531366631313535 Sep 13 00:48:17.561447 env[1256]: time="2025-09-13T00:48:17.561309616Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fchbx,Uid:69d01850-9bd1-416a-9ac0-f851b3c560f3,Namespace:kube-system,Attempt:0,} returns sandbox id \"ef09e58c894d0dbcd6307516f11551f4690faa8e48453647aa57da0fed94cbb9\"" Sep 13 00:48:17.562283 env[1256]: time="2025-09-13T00:48:17.561943542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5l6p2,Uid:73448515-3b24-4edd-be1e-e4513016364c,Namespace:calico-system,Attempt:0,} returns sandbox id \"b423c1712c3fddadecbc21933ac414b04a09f341efba2f6c1c3fc213d6be1578\"" Sep 13 00:48:17.562857 env[1256]: time="2025-09-13T00:48:17.562804341Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\"" Sep 13 00:48:17.619429 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3526558550.mount: Deactivated successfully. Sep 13 00:48:18.015705 sshd[1530]: Connection closed by authenticating user root 121.132.81.3 port 43464 [preauth] Sep 13 00:48:18.016860 systemd[1]: sshd@16-139.178.70.109:22-121.132.81.3:43464.service: Deactivated successfully. Sep 13 00:48:18.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.109:22-121.132.81.3:43464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:18.284127 systemd[1]: Started sshd@17-139.178.70.109:22-121.132.81.3:34368.service. Sep 13 00:48:18.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.109:22-121.132.81.3:34368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:18.364098 kubelet[1639]: E0913 00:48:18.364059 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:18.433097 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount724618703.mount: Deactivated successfully. Sep 13 00:48:18.495251 kubelet[1639]: E0913 00:48:18.495206 1639 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlfxz" podUID="d4b8e069-24cf-4eee-b387-607d770984c6" Sep 13 00:48:18.923000 env[1256]: time="2025-09-13T00:48:18.922973124Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:18.923620 env[1256]: time="2025-09-13T00:48:18.923601733Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:18.924335 env[1256]: time="2025-09-13T00:48:18.924320128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:18.924964 env[1256]: time="2025-09-13T00:48:18.924951362Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:71445ec84ad98bd52a7784865a9d31b1b50b56092d3f7699edc39eefd71befe1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:18.925245 env[1256]: time="2025-09-13T00:48:18.925231368Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\" returns image reference \"sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3\"" Sep 13 00:48:18.926399 env[1256]: time="2025-09-13T00:48:18.926387017Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 00:48:18.927561 env[1256]: time="2025-09-13T00:48:18.927538416Z" level=info msg="CreateContainer within sandbox \"ef09e58c894d0dbcd6307516f11551f4690faa8e48453647aa57da0fed94cbb9\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 00:48:18.933462 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3985038636.mount: Deactivated successfully. Sep 13 00:48:18.936722 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4171565163.mount: Deactivated successfully. Sep 13 00:48:18.939319 env[1256]: time="2025-09-13T00:48:18.939294312Z" level=info msg="CreateContainer within sandbox \"ef09e58c894d0dbcd6307516f11551f4690faa8e48453647aa57da0fed94cbb9\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"95423b06355d2709eca4ba19002d7e9be7db79ed271289f6f912e8e3215fa813\"" Sep 13 00:48:18.953241 env[1256]: time="2025-09-13T00:48:18.953202003Z" level=info msg="StartContainer for \"95423b06355d2709eca4ba19002d7e9be7db79ed271289f6f912e8e3215fa813\"" Sep 13 00:48:18.966580 systemd[1]: Started cri-containerd-95423b06355d2709eca4ba19002d7e9be7db79ed271289f6f912e8e3215fa813.scope. Sep 13 00:48:18.984206 kernel: kauditd_printk_skb: 361 callbacks suppressed Sep 13 00:48:18.984288 kernel: audit: type=1400 audit(1757724498.975:468): avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.984317 kernel: audit: type=1300 audit(1757724498.975:468): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f49880a9918 items=0 ppid=1710 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.975000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.975000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f49880a9918 items=0 ppid=1710 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935343233623036333535643237303965636134626131393030326437 Sep 13 00:48:18.990626 kernel: audit: type=1327 audit(1757724498.975:468): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935343233623036333535643237303965636134626131393030326437 Sep 13 00:48:18.990655 kernel: audit: type=1400 audit(1757724498.975:469): avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.975000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.975000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.975000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.995776 kernel: audit: type=1400 audit(1757724498.975:469): avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.995813 kernel: audit: type=1400 audit(1757724498.975:469): avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.975000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.998879 kernel: audit: type=1400 audit(1757724498.975:469): avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.975000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:19.001353 kernel: audit: type=1400 audit(1757724498.975:469): avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.975000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:19.008162 kernel: audit: type=1400 audit(1757724498.975:469): avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:19.008223 kernel: audit: type=1400 audit(1757724498.975:469): avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.975000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:19.008379 env[1256]: time="2025-09-13T00:48:19.008356490Z" level=info msg="StartContainer for \"95423b06355d2709eca4ba19002d7e9be7db79ed271289f6f912e8e3215fa813\" returns successfully" Sep 13 00:48:18.975000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.975000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.975000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.975000 audit: BPF prog-id=66 op=LOAD Sep 13 00:48:18.975000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002d9ba8 items=0 ppid=1710 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935343233623036333535643237303965636134626131393030326437 Sep 13 00:48:18.978000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.978000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.978000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.978000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.978000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.978000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.978000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.978000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.978000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.978000 audit: BPF prog-id=67 op=LOAD Sep 13 00:48:18.978000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002d9bf8 items=0 ppid=1710 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935343233623036333535643237303965636134626131393030326437 Sep 13 00:48:18.982000 audit: BPF prog-id=67 op=UNLOAD Sep 13 00:48:18.982000 audit: BPF prog-id=66 op=UNLOAD Sep 13 00:48:18.982000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.982000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.982000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.982000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.982000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.982000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.982000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.982000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.982000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.982000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.982000 audit: BPF prog-id=68 op=LOAD Sep 13 00:48:18.982000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002d9c88 items=0 ppid=1710 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935343233623036333535643237303965636134626131393030326437 Sep 13 00:48:19.182000 audit[1849]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.182000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd59451990 a2=0 a3=7ffd5945197c items=0 ppid=1799 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:48:19.183000 audit[1850]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.183000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee41ff080 a2=0 a3=7ffee41ff06c items=0 ppid=1799 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:48:19.183000 audit[1851]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.183000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbb17b770 a2=0 a3=7fffbb17b75c items=0 ppid=1799 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:48:19.184000 audit[1852]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.184000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7e6b21e0 a2=0 a3=7ffe7e6b21cc items=0 ppid=1799 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:48:19.185000 audit[1853]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.185000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3b525390 a2=0 a3=7fff3b52537c items=0 ppid=1799 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:48:19.185000 audit[1854]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1854 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.185000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1e980900 a2=0 a3=7ffe1e9808ec items=0 ppid=1799 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.185000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:48:19.288000 audit[1857]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.288000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffeead6fbc0 a2=0 a3=7ffeead6fbac items=0 ppid=1799 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:48:19.290000 audit[1859]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.290000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc3d7ecc10 a2=0 a3=7ffc3d7ecbfc items=0 ppid=1799 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 00:48:19.292000 audit[1862]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.292000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff6e8010c0 a2=0 a3=7fff6e8010ac items=0 ppid=1799 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 00:48:19.293000 audit[1863]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.293000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe35920a0 a2=0 a3=7fffe359208c items=0 ppid=1799 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:48:19.295000 audit[1865]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.295000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff82f60d70 a2=0 a3=7fff82f60d5c items=0 ppid=1799 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:48:19.295000 audit[1866]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.295000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa10fc020 a2=0 a3=7fffa10fc00c items=0 ppid=1799 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:48:19.297000 audit[1868]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.297000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe763288d0 a2=0 a3=7ffe763288bc items=0 ppid=1799 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:48:19.299000 audit[1871]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.299000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffccb72ece0 a2=0 a3=7ffccb72eccc items=0 ppid=1799 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 00:48:19.300000 audit[1872]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.300000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdce526da0 a2=0 a3=7ffdce526d8c items=0 ppid=1799 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:48:19.302000 audit[1874]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.302000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe2f193290 a2=0 a3=7ffe2f19327c items=0 ppid=1799 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:48:19.302000 audit[1875]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.302000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7c06dd70 a2=0 a3=7ffc7c06dd5c items=0 ppid=1799 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:48:19.304000 audit[1877]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.304000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe9faabab0 a2=0 a3=7ffe9faaba9c items=0 ppid=1799 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:48:19.306000 audit[1880]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.306000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff4f6a7660 a2=0 a3=7fff4f6a764c items=0 ppid=1799 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:48:19.308000 audit[1883]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.308000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff707d0060 a2=0 a3=7fff707d004c items=0 ppid=1799 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.308000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:48:19.309000 audit[1884]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.309000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdfc9b5a10 a2=0 a3=7ffdfc9b59fc items=0 ppid=1799 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:48:19.311000 audit[1886]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1886 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.311000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffebd54ed70 a2=0 a3=7ffebd54ed5c items=0 ppid=1799 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:48:19.328000 audit[1890]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.328000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffedc8c6ea0 a2=0 a3=7ffedc8c6e8c items=0 ppid=1799 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.328000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:48:19.329000 audit[1891]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.329000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcaaf7c0a0 a2=0 a3=7ffcaaf7c08c items=0 ppid=1799 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:48:19.330000 audit[1893]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:48:19.330000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc82d324a0 a2=0 a3=7ffc82d3248c items=0 ppid=1799 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.330000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:48:19.347000 audit[1899]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:19.347000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc670ccc70 a2=0 a3=7ffc670ccc5c items=0 ppid=1799 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:19.364570 kubelet[1639]: E0913 00:48:19.364542 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:19.363000 audit[1899]: NETFILTER_CFG table=nat:40 family=2 entries=72 op=nft_register_chain pid=1899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:19.363000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=34516 a0=3 a1=7ffc670ccc70 a2=0 a3=7ffc670ccc5c items=0 ppid=1799 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:19.370000 audit[1908]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.370000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcaaeaafe0 a2=0 a3=7ffcaaeaafcc items=0 ppid=1799 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:48:19.372000 audit[1910]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1910 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.372000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc611addf0 a2=0 a3=7ffc611adddc items=0 ppid=1799 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 00:48:19.374000 audit[1913]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1913 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.374000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd1abbdb80 a2=0 a3=7ffd1abbdb6c items=0 ppid=1799 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.374000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 00:48:19.375000 audit[1914]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.375000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1b19b7a0 a2=0 a3=7ffd1b19b78c items=0 ppid=1799 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:48:19.376000 audit[1916]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.376000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda1e70820 a2=0 a3=7ffda1e7080c items=0 ppid=1799 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.376000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:48:19.377000 audit[1917]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.377000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcee41e430 a2=0 a3=7ffcee41e41c items=0 ppid=1799 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:48:19.379000 audit[1919]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.379000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcf7093740 a2=0 a3=7ffcf709372c items=0 ppid=1799 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.379000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 00:48:19.381000 audit[1922]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.381000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffda0b6a1c0 a2=0 a3=7ffda0b6a1ac items=0 ppid=1799 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:48:19.382000 audit[1923]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.382000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7f17bb90 a2=0 a3=7ffd7f17bb7c items=0 ppid=1799 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:48:19.384000 audit[1925]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.384000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe0d7190e0 a2=0 a3=7ffe0d7190cc items=0 ppid=1799 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.384000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:48:19.385000 audit[1926]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.385000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8cff7aa0 a2=0 a3=7ffd8cff7a8c items=0 ppid=1799 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:48:19.387000 audit[1928]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.387000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6d435770 a2=0 a3=7ffc6d43575c items=0 ppid=1799 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:48:19.389000 audit[1931]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.389000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc5670520 a2=0 a3=7ffdc567050c items=0 ppid=1799 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.389000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:48:19.391000 audit[1934]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.391000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1aeb64d0 a2=0 a3=7ffd1aeb64bc items=0 ppid=1799 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 00:48:19.392000 audit[1935]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1935 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.392000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff026d3040 a2=0 a3=7fff026d302c items=0 ppid=1799 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:48:19.394000 audit[1937]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.394000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcfb65e6c0 a2=0 a3=7ffcfb65e6ac items=0 ppid=1799 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:48:19.397000 audit[1940]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.397000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc876ab4e0 a2=0 a3=7ffc876ab4cc items=0 ppid=1799 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:48:19.397000 audit[1941]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1941 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.397000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5e960d30 a2=0 a3=7ffd5e960d1c items=0 ppid=1799 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:48:19.399000 audit[1943]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1943 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.399000 audit[1943]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff372a5e10 a2=0 a3=7fff372a5dfc items=0 ppid=1799 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:48:19.399000 audit[1944]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1944 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.399000 audit[1944]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbebad110 a2=0 a3=7fffbebad0fc items=0 ppid=1799 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:48:19.401000 audit[1946]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1946 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.401000 audit[1946]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffba0653f0 a2=0 a3=7fffba0653dc items=0 ppid=1799 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.401000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:48:19.403000 audit[1949]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:48:19.403000 audit[1949]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe702be920 a2=0 a3=7ffe702be90c items=0 ppid=1799 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:48:19.405000 audit[1951]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:48:19.405000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff582789e0 a2=0 a3=7fff582789cc items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.405000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:19.405000 audit[1951]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:48:19.405000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff582789e0 a2=0 a3=7fff582789cc items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.405000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:19.520721 kubelet[1639]: E0913 00:48:19.520650 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.520721 kubelet[1639]: W0913 00:48:19.520685 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.520721 kubelet[1639]: E0913 00:48:19.520704 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.520919 kubelet[1639]: E0913 00:48:19.520826 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.520919 kubelet[1639]: W0913 00:48:19.520839 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.520919 kubelet[1639]: E0913 00:48:19.520846 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.521001 kubelet[1639]: E0913 00:48:19.520943 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.521001 kubelet[1639]: W0913 00:48:19.520949 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.521001 kubelet[1639]: E0913 00:48:19.520955 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.521096 kubelet[1639]: E0913 00:48:19.521087 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.521122 kubelet[1639]: W0913 00:48:19.521093 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.521150 kubelet[1639]: E0913 00:48:19.521125 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.521442 kubelet[1639]: E0913 00:48:19.521231 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.521442 kubelet[1639]: W0913 00:48:19.521240 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.521442 kubelet[1639]: E0913 00:48:19.521256 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.521442 kubelet[1639]: E0913 00:48:19.521349 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.521442 kubelet[1639]: W0913 00:48:19.521355 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.521442 kubelet[1639]: E0913 00:48:19.521361 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.521629 kubelet[1639]: E0913 00:48:19.521467 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.521629 kubelet[1639]: W0913 00:48:19.521472 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.521629 kubelet[1639]: E0913 00:48:19.521485 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.521629 kubelet[1639]: E0913 00:48:19.521583 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.521629 kubelet[1639]: W0913 00:48:19.521589 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.521629 kubelet[1639]: E0913 00:48:19.521594 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.521822 kubelet[1639]: E0913 00:48:19.521715 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.521822 kubelet[1639]: W0913 00:48:19.521721 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.521822 kubelet[1639]: E0913 00:48:19.521726 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.521909 kubelet[1639]: E0913 00:48:19.521830 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.521909 kubelet[1639]: W0913 00:48:19.521836 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.521909 kubelet[1639]: E0913 00:48:19.521848 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.521993 kubelet[1639]: E0913 00:48:19.521948 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.521993 kubelet[1639]: W0913 00:48:19.521954 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.521993 kubelet[1639]: E0913 00:48:19.521967 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.522285 kubelet[1639]: E0913 00:48:19.522084 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.522285 kubelet[1639]: W0913 00:48:19.522097 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.522285 kubelet[1639]: E0913 00:48:19.522104 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.522285 kubelet[1639]: E0913 00:48:19.522207 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.522285 kubelet[1639]: W0913 00:48:19.522215 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.522285 kubelet[1639]: E0913 00:48:19.522229 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.522466 kubelet[1639]: E0913 00:48:19.522337 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.522466 kubelet[1639]: W0913 00:48:19.522343 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.522466 kubelet[1639]: E0913 00:48:19.522356 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.522466 kubelet[1639]: E0913 00:48:19.522466 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.522576 kubelet[1639]: W0913 00:48:19.522472 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.522576 kubelet[1639]: E0913 00:48:19.522485 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.522630 kubelet[1639]: E0913 00:48:19.522593 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.522630 kubelet[1639]: W0913 00:48:19.522599 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.522630 kubelet[1639]: E0913 00:48:19.522612 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.522766 kubelet[1639]: E0913 00:48:19.522737 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.522766 kubelet[1639]: W0913 00:48:19.522745 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.522766 kubelet[1639]: E0913 00:48:19.522754 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.523337 kubelet[1639]: E0913 00:48:19.523315 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.523337 kubelet[1639]: W0913 00:48:19.523329 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.523337 kubelet[1639]: E0913 00:48:19.523338 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.523483 kubelet[1639]: E0913 00:48:19.523462 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.523483 kubelet[1639]: W0913 00:48:19.523480 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.523555 kubelet[1639]: E0913 00:48:19.523487 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.523609 kubelet[1639]: E0913 00:48:19.523595 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.523696 kubelet[1639]: W0913 00:48:19.523613 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.523696 kubelet[1639]: E0913 00:48:19.523622 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.528913 kubelet[1639]: E0913 00:48:19.528893 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.528913 kubelet[1639]: W0913 00:48:19.528908 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.528913 kubelet[1639]: E0913 00:48:19.528919 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.529075 kubelet[1639]: E0913 00:48:19.529068 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.529075 kubelet[1639]: W0913 00:48:19.529075 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.529132 kubelet[1639]: E0913 00:48:19.529081 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.529229 kubelet[1639]: E0913 00:48:19.529216 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.529229 kubelet[1639]: W0913 00:48:19.529225 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.529311 kubelet[1639]: E0913 00:48:19.529231 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.529341 kubelet[1639]: E0913 00:48:19.529326 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.529341 kubelet[1639]: W0913 00:48:19.529331 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.529341 kubelet[1639]: E0913 00:48:19.529336 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.529442 kubelet[1639]: E0913 00:48:19.529431 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.529442 kubelet[1639]: W0913 00:48:19.529440 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.529515 kubelet[1639]: E0913 00:48:19.529455 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.529584 kubelet[1639]: E0913 00:48:19.529567 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.529627 kubelet[1639]: W0913 00:48:19.529584 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.529627 kubelet[1639]: E0913 00:48:19.529593 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.529843 kubelet[1639]: E0913 00:48:19.529829 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.529843 kubelet[1639]: W0913 00:48:19.529843 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.529937 kubelet[1639]: E0913 00:48:19.529850 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.530135 kubelet[1639]: E0913 00:48:19.530122 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.530175 kubelet[1639]: W0913 00:48:19.530131 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.530175 kubelet[1639]: E0913 00:48:19.530145 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.530257 kubelet[1639]: E0913 00:48:19.530245 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.530257 kubelet[1639]: W0913 00:48:19.530254 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.530307 kubelet[1639]: E0913 00:48:19.530265 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.530366 kubelet[1639]: E0913 00:48:19.530354 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.530366 kubelet[1639]: W0913 00:48:19.530363 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.530428 kubelet[1639]: E0913 00:48:19.530369 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.530495 kubelet[1639]: E0913 00:48:19.530482 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.530495 kubelet[1639]: W0913 00:48:19.530491 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.530548 kubelet[1639]: E0913 00:48:19.530497 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.530738 kubelet[1639]: E0913 00:48:19.530725 1639 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:48:19.530738 kubelet[1639]: W0913 00:48:19.530739 1639 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:48:19.530802 kubelet[1639]: E0913 00:48:19.530745 1639 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:48:19.580005 sshd[1779]: Invalid user 1234 from 121.132.81.3 port 34368 Sep 13 00:48:19.783769 sshd[1779]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:19.783000 audit[1779]: USER_AUTH pid=1779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="1234" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:19.784730 sshd[1779]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:48:19.784777 sshd[1779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:48:19.785080 sshd[1779]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:20.195994 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2124179168.mount: Deactivated successfully. Sep 13 00:48:20.298272 env[1256]: time="2025-09-13T00:48:20.298222145Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:20.299547 env[1256]: time="2025-09-13T00:48:20.299521601Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:20.301301 env[1256]: time="2025-09-13T00:48:20.301276703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:20.302481 env[1256]: time="2025-09-13T00:48:20.302458203Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:20.303017 env[1256]: time="2025-09-13T00:48:20.302993280Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 13 00:48:20.305736 env[1256]: time="2025-09-13T00:48:20.305704648Z" level=info msg="CreateContainer within sandbox \"b423c1712c3fddadecbc21933ac414b04a09f341efba2f6c1c3fc213d6be1578\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 00:48:20.312702 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1269205.mount: Deactivated successfully. Sep 13 00:48:20.322754 env[1256]: time="2025-09-13T00:48:20.322726085Z" level=info msg="CreateContainer within sandbox \"b423c1712c3fddadecbc21933ac414b04a09f341efba2f6c1c3fc213d6be1578\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"68a25be1b853f9d63e6b1e80d45ada880183668f2b2114db1433a9f85bd35a43\"" Sep 13 00:48:20.323357 env[1256]: time="2025-09-13T00:48:20.323330891Z" level=info msg="StartContainer for \"68a25be1b853f9d63e6b1e80d45ada880183668f2b2114db1433a9f85bd35a43\"" Sep 13 00:48:20.336229 systemd[1]: Started cri-containerd-68a25be1b853f9d63e6b1e80d45ada880183668f2b2114db1433a9f85bd35a43.scope. Sep 13 00:48:20.346000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.346000 audit[1991]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6d4011ea18 items=0 ppid=1709 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:20.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613235626531623835336639643633653662316538306434356164 Sep 13 00:48:20.346000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.346000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.346000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.346000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.346000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.346000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.346000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.346000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.346000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.346000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.346000 audit: BPF prog-id=69 op=LOAD Sep 13 00:48:20.346000 audit[1991]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00032e078 items=0 ppid=1709 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:20.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613235626531623835336639643633653662316538306434356164 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit: BPF prog-id=70 op=LOAD Sep 13 00:48:20.347000 audit[1991]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00032e0c8 items=0 ppid=1709 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:20.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613235626531623835336639643633653662316538306434356164 Sep 13 00:48:20.347000 audit: BPF prog-id=70 op=UNLOAD Sep 13 00:48:20.347000 audit: BPF prog-id=69 op=UNLOAD Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { perfmon } for pid=1991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit[1991]: AVC avc: denied { bpf } for pid=1991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:20.347000 audit: BPF prog-id=71 op=LOAD Sep 13 00:48:20.347000 audit[1991]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00032e158 items=0 ppid=1709 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:20.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638613235626531623835336639643633653662316538306434356164 Sep 13 00:48:20.359257 env[1256]: time="2025-09-13T00:48:20.359227265Z" level=info msg="StartContainer for \"68a25be1b853f9d63e6b1e80d45ada880183668f2b2114db1433a9f85bd35a43\" returns successfully" Sep 13 00:48:20.364612 systemd[1]: cri-containerd-68a25be1b853f9d63e6b1e80d45ada880183668f2b2114db1433a9f85bd35a43.scope: Deactivated successfully. Sep 13 00:48:20.365250 kubelet[1639]: E0913 00:48:20.365199 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:20.366000 audit: BPF prog-id=71 op=UNLOAD Sep 13 00:48:20.495688 kubelet[1639]: E0913 00:48:20.494970 1639 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlfxz" podUID="d4b8e069-24cf-4eee-b387-607d770984c6" Sep 13 00:48:20.906721 env[1256]: time="2025-09-13T00:48:20.906558412Z" level=info msg="shim disconnected" id=68a25be1b853f9d63e6b1e80d45ada880183668f2b2114db1433a9f85bd35a43 Sep 13 00:48:20.906721 env[1256]: time="2025-09-13T00:48:20.906587745Z" level=warning msg="cleaning up after shim disconnected" id=68a25be1b853f9d63e6b1e80d45ada880183668f2b2114db1433a9f85bd35a43 namespace=k8s.io Sep 13 00:48:20.906721 env[1256]: time="2025-09-13T00:48:20.906594500Z" level=info msg="cleaning up dead shim" Sep 13 00:48:20.911093 env[1256]: time="2025-09-13T00:48:20.911064527Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:48:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2036 runtime=io.containerd.runc.v2\n" Sep 13 00:48:20.921894 kubelet[1639]: I0913 00:48:20.921845 1639 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-fchbx" podStartSLOduration=4.558321871 podStartE2EDuration="5.921833907s" podCreationTimestamp="2025-09-13 00:48:15 +0000 UTC" firstStartedPulling="2025-09-13 00:48:17.562490833 +0000 UTC m=+2.519696818" lastFinishedPulling="2025-09-13 00:48:18.926002878 +0000 UTC m=+3.883208854" observedRunningTime="2025-09-13 00:48:19.539641291 +0000 UTC m=+4.496847278" watchObservedRunningTime="2025-09-13 00:48:20.921833907 +0000 UTC m=+5.879039892" Sep 13 00:48:21.365736 kubelet[1639]: E0913 00:48:21.365702 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:21.505368 env[1256]: time="2025-09-13T00:48:21.505339700Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 00:48:21.786711 sshd[1779]: Failed password for invalid user 1234 from 121.132.81.3 port 34368 ssh2 Sep 13 00:48:22.366156 kubelet[1639]: E0913 00:48:22.366132 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:22.495225 kubelet[1639]: E0913 00:48:22.495195 1639 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlfxz" podUID="d4b8e069-24cf-4eee-b387-607d770984c6" Sep 13 00:48:23.367425 kubelet[1639]: E0913 00:48:23.367388 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:23.700872 sshd[1779]: Connection closed by invalid user 1234 121.132.81.3 port 34368 [preauth] Sep 13 00:48:23.701574 systemd[1]: sshd@17-139.178.70.109:22-121.132.81.3:34368.service: Deactivated successfully. Sep 13 00:48:23.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.109:22-121.132.81.3:34368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:23.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.109:22-121.132.81.3:60036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:23.837411 systemd[1]: Started sshd@18-139.178.70.109:22-121.132.81.3:60036.service. Sep 13 00:48:24.368428 kubelet[1639]: E0913 00:48:24.368378 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:24.495031 kubelet[1639]: E0913 00:48:24.494991 1639 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlfxz" podUID="d4b8e069-24cf-4eee-b387-607d770984c6" Sep 13 00:48:24.519081 env[1256]: time="2025-09-13T00:48:24.519045722Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:24.520252 env[1256]: time="2025-09-13T00:48:24.520233978Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:24.521293 env[1256]: time="2025-09-13T00:48:24.521276972Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:24.522202 env[1256]: time="2025-09-13T00:48:24.522186089Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:24.522472 env[1256]: time="2025-09-13T00:48:24.522451738Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 13 00:48:24.524563 env[1256]: time="2025-09-13T00:48:24.524542116Z" level=info msg="CreateContainer within sandbox \"b423c1712c3fddadecbc21933ac414b04a09f341efba2f6c1c3fc213d6be1578\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 00:48:24.529755 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount24260851.mount: Deactivated successfully. Sep 13 00:48:24.546202 env[1256]: time="2025-09-13T00:48:24.546171136Z" level=info msg="CreateContainer within sandbox \"b423c1712c3fddadecbc21933ac414b04a09f341efba2f6c1c3fc213d6be1578\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5cebad1125e6b0f35690181b00dd2d33cacaf9d20d0ed8d3335265cc0d8c0af8\"" Sep 13 00:48:24.546613 env[1256]: time="2025-09-13T00:48:24.546600017Z" level=info msg="StartContainer for \"5cebad1125e6b0f35690181b00dd2d33cacaf9d20d0ed8d3335265cc0d8c0af8\"" Sep 13 00:48:24.559799 systemd[1]: Started cri-containerd-5cebad1125e6b0f35690181b00dd2d33cacaf9d20d0ed8d3335265cc0d8c0af8.scope. Sep 13 00:48:24.565493 systemd[1]: run-containerd-runc-k8s.io-5cebad1125e6b0f35690181b00dd2d33cacaf9d20d0ed8d3335265cc0d8c0af8-runc.F6RPf1.mount: Deactivated successfully. Sep 13 00:48:24.581340 kernel: kauditd_printk_skb: 233 callbacks suppressed Sep 13 00:48:24.581435 kernel: audit: type=1400 audit(1757724504.573:535): avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.581457 kernel: audit: type=1300 audit(1757724504.573:535): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f33e4e768d8 items=0 ppid=1709 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:24.573000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.573000 audit[2061]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f33e4e768d8 items=0 ppid=1709 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:24.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563656261643131323565366230663335363930313831623030646432 Sep 13 00:48:24.587893 kernel: audit: type=1327 audit(1757724504.573:535): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563656261643131323565366230663335363930313831623030646432 Sep 13 00:48:24.587949 kernel: audit: type=1400 audit(1757724504.573:536): avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.573000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.590791 kernel: audit: type=1400 audit(1757724504.573:536): avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.573000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.573000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.593856 kernel: audit: type=1400 audit(1757724504.573:536): avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.594703 kernel: audit: type=1400 audit(1757724504.573:536): avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.573000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.573000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.599716 kernel: audit: type=1400 audit(1757724504.573:536): avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.599970 kernel: audit: type=1400 audit(1757724504.573:536): avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.573000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.573000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.606676 kernel: audit: type=1400 audit(1757724504.573:536): avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.573000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.573000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.573000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.573000 audit: BPF prog-id=72 op=LOAD Sep 13 00:48:24.573000 audit[2061]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038c128 items=0 ppid=1709 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:24.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563656261643131323565366230663335363930313831623030646432 Sep 13 00:48:24.576000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.576000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.576000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.576000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.576000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.576000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.576000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.576000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.576000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.576000 audit: BPF prog-id=73 op=LOAD Sep 13 00:48:24.576000 audit[2061]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038c178 items=0 ppid=1709 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:24.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563656261643131323565366230663335363930313831623030646432 Sep 13 00:48:24.580000 audit: BPF prog-id=73 op=UNLOAD Sep 13 00:48:24.580000 audit: BPF prog-id=72 op=UNLOAD Sep 13 00:48:24.580000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.580000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.580000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.580000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.580000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.580000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.580000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.580000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.580000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.580000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.580000 audit: BPF prog-id=74 op=LOAD Sep 13 00:48:24.580000 audit[2061]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038c208 items=0 ppid=1709 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:24.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563656261643131323565366230663335363930313831623030646432 Sep 13 00:48:24.609647 env[1256]: time="2025-09-13T00:48:24.609627577Z" level=info msg="StartContainer for \"5cebad1125e6b0f35690181b00dd2d33cacaf9d20d0ed8d3335265cc0d8c0af8\" returns successfully" Sep 13 00:48:25.220686 sshd[2051]: Invalid user deployer from 121.132.81.3 port 60036 Sep 13 00:48:25.369412 kubelet[1639]: E0913 00:48:25.369378 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:25.408927 sshd[2051]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:25.409252 sshd[2051]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:48:25.409275 sshd[2051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:48:25.409480 sshd[2051]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:25.408000 audit[2051]: USER_AUTH pid=2051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="deployer" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:25.705704 env[1256]: time="2025-09-13T00:48:25.705659803Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:48:25.707819 systemd[1]: cri-containerd-5cebad1125e6b0f35690181b00dd2d33cacaf9d20d0ed8d3335265cc0d8c0af8.scope: Deactivated successfully. Sep 13 00:48:25.710000 audit: BPF prog-id=74 op=UNLOAD Sep 13 00:48:25.719503 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5cebad1125e6b0f35690181b00dd2d33cacaf9d20d0ed8d3335265cc0d8c0af8-rootfs.mount: Deactivated successfully. Sep 13 00:48:25.726134 kubelet[1639]: I0913 00:48:25.726117 1639 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 13 00:48:26.354301 env[1256]: time="2025-09-13T00:48:26.354271148Z" level=info msg="shim disconnected" id=5cebad1125e6b0f35690181b00dd2d33cacaf9d20d0ed8d3335265cc0d8c0af8 Sep 13 00:48:26.354431 env[1256]: time="2025-09-13T00:48:26.354417826Z" level=warning msg="cleaning up after shim disconnected" id=5cebad1125e6b0f35690181b00dd2d33cacaf9d20d0ed8d3335265cc0d8c0af8 namespace=k8s.io Sep 13 00:48:26.354482 env[1256]: time="2025-09-13T00:48:26.354472592Z" level=info msg="cleaning up dead shim" Sep 13 00:48:26.359137 env[1256]: time="2025-09-13T00:48:26.359108595Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:48:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2101 runtime=io.containerd.runc.v2\n" Sep 13 00:48:26.369661 kubelet[1639]: E0913 00:48:26.369628 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:26.498504 systemd[1]: Created slice kubepods-besteffort-podd4b8e069_24cf_4eee_b387_607d770984c6.slice. Sep 13 00:48:26.500118 env[1256]: time="2025-09-13T00:48:26.500094142Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xlfxz,Uid:d4b8e069-24cf-4eee-b387-607d770984c6,Namespace:calico-system,Attempt:0,}" Sep 13 00:48:26.519305 env[1256]: time="2025-09-13T00:48:26.519282496Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 00:48:26.538806 env[1256]: time="2025-09-13T00:48:26.538758856Z" level=error msg="Failed to destroy network for sandbox \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:48:26.539867 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e-shm.mount: Deactivated successfully. Sep 13 00:48:26.540759 env[1256]: time="2025-09-13T00:48:26.540735831Z" level=error msg="encountered an error cleaning up failed sandbox \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:48:26.540847 env[1256]: time="2025-09-13T00:48:26.540830767Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xlfxz,Uid:d4b8e069-24cf-4eee-b387-607d770984c6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:48:26.541052 kubelet[1639]: E0913 00:48:26.541025 1639 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:48:26.541099 kubelet[1639]: E0913 00:48:26.541069 1639 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xlfxz" Sep 13 00:48:26.541099 kubelet[1639]: E0913 00:48:26.541083 1639 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xlfxz" Sep 13 00:48:26.541147 kubelet[1639]: E0913 00:48:26.541115 1639 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xlfxz_calico-system(d4b8e069-24cf-4eee-b387-607d770984c6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xlfxz_calico-system(d4b8e069-24cf-4eee-b387-607d770984c6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xlfxz" podUID="d4b8e069-24cf-4eee-b387-607d770984c6" Sep 13 00:48:27.235046 sshd[2051]: Failed password for invalid user deployer from 121.132.81.3 port 60036 ssh2 Sep 13 00:48:27.370292 kubelet[1639]: E0913 00:48:27.370253 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:27.520365 kubelet[1639]: I0913 00:48:27.519761 1639 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:48:27.520738 env[1256]: time="2025-09-13T00:48:27.520718592Z" level=info msg="StopPodSandbox for \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\"" Sep 13 00:48:27.535302 env[1256]: time="2025-09-13T00:48:27.535266052Z" level=error msg="StopPodSandbox for \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\" failed" error="failed to destroy network for sandbox \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:48:27.535681 kubelet[1639]: E0913 00:48:27.535533 1639 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:48:27.535681 kubelet[1639]: E0913 00:48:27.535581 1639 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e"} Sep 13 00:48:27.535681 kubelet[1639]: E0913 00:48:27.535626 1639 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d4b8e069-24cf-4eee-b387-607d770984c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:48:27.535681 kubelet[1639]: E0913 00:48:27.535644 1639 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d4b8e069-24cf-4eee-b387-607d770984c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xlfxz" podUID="d4b8e069-24cf-4eee-b387-607d770984c6" Sep 13 00:48:28.370686 kubelet[1639]: E0913 00:48:28.370634 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:28.767596 update_engine[1239]: I0913 00:48:28.767566 1239 update_attempter.cc:509] Updating boot flags... Sep 13 00:48:28.974572 sshd[2051]: Connection closed by invalid user deployer 121.132.81.3 port 60036 [preauth] Sep 13 00:48:28.975066 systemd[1]: sshd@18-139.178.70.109:22-121.132.81.3:60036.service: Deactivated successfully. Sep 13 00:48:28.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.109:22-121.132.81.3:60036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:29.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.109:22-121.132.81.3:52432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:29.143463 systemd[1]: Started sshd@19-139.178.70.109:22-121.132.81.3:52432.service. Sep 13 00:48:29.371575 kubelet[1639]: E0913 00:48:29.371544 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:30.372437 kubelet[1639]: E0913 00:48:30.372399 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:30.663774 sshd[2179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 user=root Sep 13 00:48:30.663000 audit[2179]: ANOM_LOGIN_FAILURES pid=2179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:30.665095 sshd[2179]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 13 00:48:30.665830 kernel: kauditd_printk_skb: 37 callbacks suppressed Sep 13 00:48:30.665879 kernel: audit: type=2100 audit(1757724510.663:545): pid=2179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:30.664000 audit[2179]: USER_AUTH pid=2179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:30.671490 kernel: audit: type=1100 audit(1757724510.664:546): pid=2179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:31.372823 kubelet[1639]: E0913 00:48:31.372795 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:32.373735 kubelet[1639]: E0913 00:48:32.373703 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:32.510778 sshd[2179]: Failed password for root from 121.132.81.3 port 52432 ssh2 Sep 13 00:48:33.216690 sshd[2179]: Connection closed by authenticating user root 121.132.81.3 port 52432 [preauth] Sep 13 00:48:33.216918 systemd[1]: sshd@19-139.178.70.109:22-121.132.81.3:52432.service: Deactivated successfully. Sep 13 00:48:33.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.109:22-121.132.81.3:52432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:33.220679 kernel: audit: type=1131 audit(1757724513.216:547): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.109:22-121.132.81.3:52432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:33.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.109:22-121.132.81.3:40544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:33.353410 systemd[1]: Started sshd@20-139.178.70.109:22-121.132.81.3:40544.service. Sep 13 00:48:33.356687 kernel: audit: type=1130 audit(1757724513.352:548): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.109:22-121.132.81.3:40544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:33.373922 kubelet[1639]: E0913 00:48:33.373888 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:33.447566 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3763805794.mount: Deactivated successfully. Sep 13 00:48:33.500443 env[1256]: time="2025-09-13T00:48:33.500197477Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:33.502392 env[1256]: time="2025-09-13T00:48:33.502371692Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:33.504432 env[1256]: time="2025-09-13T00:48:33.504413088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:33.506602 env[1256]: time="2025-09-13T00:48:33.506579743Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:33.506815 env[1256]: time="2025-09-13T00:48:33.506799958Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 13 00:48:33.518444 env[1256]: time="2025-09-13T00:48:33.518414635Z" level=info msg="CreateContainer within sandbox \"b423c1712c3fddadecbc21933ac414b04a09f341efba2f6c1c3fc213d6be1578\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 00:48:33.531108 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2043327406.mount: Deactivated successfully. Sep 13 00:48:33.535077 env[1256]: time="2025-09-13T00:48:33.535046834Z" level=info msg="CreateContainer within sandbox \"b423c1712c3fddadecbc21933ac414b04a09f341efba2f6c1c3fc213d6be1578\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7a8113b745e23ddfd4ce3ab58e58141e3e1b14b728815478f9f28eddbbd75a1f\"" Sep 13 00:48:33.535430 env[1256]: time="2025-09-13T00:48:33.535412485Z" level=info msg="StartContainer for \"7a8113b745e23ddfd4ce3ab58e58141e3e1b14b728815478f9f28eddbbd75a1f\"" Sep 13 00:48:33.546609 systemd[1]: Started cri-containerd-7a8113b745e23ddfd4ce3ab58e58141e3e1b14b728815478f9f28eddbbd75a1f.scope. Sep 13 00:48:33.559000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.559000 audit[2195]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f992c605cc8 items=0 ppid=1709 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:33.565908 kernel: audit: type=1400 audit(1757724513.559:549): avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.565961 kernel: audit: type=1300 audit(1757724513.559:549): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f992c605cc8 items=0 ppid=1709 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:33.565979 kernel: audit: type=1327 audit(1757724513.559:549): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383131336237343565323364646664346365336162353865353831 Sep 13 00:48:33.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383131336237343565323364646664346365336162353865353831 Sep 13 00:48:33.559000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.571651 kernel: audit: type=1400 audit(1757724513.559:550): avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.571718 kernel: audit: type=1400 audit(1757724513.559:550): avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.559000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.559000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.576543 kernel: audit: type=1400 audit(1757724513.559:550): avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.559000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.559000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.559000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.559000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.559000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.559000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.559000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.559000 audit: BPF prog-id=75 op=LOAD Sep 13 00:48:33.559000 audit[2195]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000309c58 items=0 ppid=1709 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:33.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383131336237343565323364646664346365336162353865353831 Sep 13 00:48:33.561000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.561000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.561000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.561000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.561000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.561000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.561000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.561000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.561000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.561000 audit: BPF prog-id=76 op=LOAD Sep 13 00:48:33.561000 audit[2195]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000309ca8 items=0 ppid=1709 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:33.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383131336237343565323364646664346365336162353865353831 Sep 13 00:48:33.568000 audit: BPF prog-id=76 op=UNLOAD Sep 13 00:48:33.568000 audit: BPF prog-id=75 op=UNLOAD Sep 13 00:48:33.568000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.568000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.568000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.568000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.568000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.568000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.568000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.568000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.568000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.568000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:33.568000 audit: BPF prog-id=77 op=LOAD Sep 13 00:48:33.568000 audit[2195]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000309d38 items=0 ppid=1709 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:33.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761383131336237343565323364646664346365336162353865353831 Sep 13 00:48:33.592681 env[1256]: time="2025-09-13T00:48:33.589545785Z" level=info msg="StartContainer for \"7a8113b745e23ddfd4ce3ab58e58141e3e1b14b728815478f9f28eddbbd75a1f\" returns successfully" Sep 13 00:48:33.672580 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 00:48:33.672658 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 00:48:34.374240 kubelet[1639]: E0913 00:48:34.374206 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:34.508694 sshd[2183]: Invalid user ftp from 121.132.81.3 port 40544 Sep 13 00:48:34.541580 systemd[1]: run-containerd-runc-k8s.io-7a8113b745e23ddfd4ce3ab58e58141e3e1b14b728815478f9f28eddbbd75a1f-runc.al9cd6.mount: Deactivated successfully. Sep 13 00:48:34.749926 sshd[2183]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:34.750286 sshd[2183]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:48:34.750306 sshd[2183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:48:34.749000 audit[2183]: USER_AUTH pid=2183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftp" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:34.750548 sshd[2183]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:35.086000 audit[2304]: AVC avc: denied { write } for pid=2304 comm="tee" name="fd" dev="proc" ino=30626 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:48:35.086000 audit[2304]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd6af67d2 a2=241 a3=1b6 items=1 ppid=2279 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.086000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 00:48:35.086000 audit: PATH item=0 name="/dev/fd/63" inode=30605 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:48:35.086000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:48:35.094000 audit[2328]: AVC avc: denied { write } for pid=2328 comm="tee" name="fd" dev="proc" ino=30640 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:48:35.094000 audit[2328]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3c6a27e1 a2=241 a3=1b6 items=1 ppid=2284 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.094000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 00:48:35.094000 audit: PATH item=0 name="/dev/fd/63" inode=30632 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:48:35.094000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:48:35.101000 audit[2324]: AVC avc: denied { write } for pid=2324 comm="tee" name="fd" dev="proc" ino=30645 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:48:35.101000 audit[2324]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd048c87e2 a2=241 a3=1b6 items=1 ppid=2285 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.101000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 00:48:35.101000 audit: PATH item=0 name="/dev/fd/63" inode=30812 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:48:35.102000 audit[2335]: AVC avc: denied { write } for pid=2335 comm="tee" name="fd" dev="proc" ino=30649 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:48:35.102000 audit[2335]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff59e977d1 a2=241 a3=1b6 items=1 ppid=2283 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.103000 audit[2343]: AVC avc: denied { write } for pid=2343 comm="tee" name="fd" dev="proc" ino=30826 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:48:35.103000 audit[2336]: AVC avc: denied { write } for pid=2336 comm="tee" name="fd" dev="proc" ino=30653 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:48:35.103000 audit[2336]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2c7ad7e1 a2=241 a3=1b6 items=1 ppid=2291 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.103000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 00:48:35.103000 audit: PATH item=0 name="/dev/fd/63" inode=30636 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:48:35.103000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:48:35.101000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:48:35.102000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 00:48:35.102000 audit: PATH item=0 name="/dev/fd/63" inode=30817 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:48:35.102000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:48:35.105000 audit[2341]: AVC avc: denied { write } for pid=2341 comm="tee" name="fd" dev="proc" ino=30657 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:48:35.105000 audit[2341]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea6f277e1 a2=241 a3=1b6 items=1 ppid=2289 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.105000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 00:48:35.105000 audit: PATH item=0 name="/dev/fd/63" inode=30642 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:48:35.105000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:48:35.103000 audit[2343]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea36697e3 a2=241 a3=1b6 items=1 ppid=2290 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.103000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 00:48:35.103000 audit: PATH item=0 name="/dev/fd/63" inode=30821 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:48:35.103000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:48:35.340165 kubelet[1639]: E0913 00:48:35.339611 1639 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:35.374948 kubelet[1639]: E0913 00:48:35.374914 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:35.542917 systemd[1]: run-containerd-runc-k8s.io-7a8113b745e23ddfd4ce3ab58e58141e3e1b14b728815478f9f28eddbbd75a1f-runc.CM2uoq.mount: Deactivated successfully. Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit: BPF prog-id=78 op=LOAD Sep 13 00:48:35.577000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce44f16e0 a2=98 a3=1fffffffffffffff items=0 ppid=2299 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.577000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:48:35.577000 audit: BPF prog-id=78 op=UNLOAD Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit: BPF prog-id=79 op=LOAD Sep 13 00:48:35.577000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce44f15c0 a2=94 a3=3 items=0 ppid=2299 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.577000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:48:35.577000 audit: BPF prog-id=79 op=UNLOAD Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit: BPF prog-id=80 op=LOAD Sep 13 00:48:35.577000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce44f1600 a2=94 a3=7ffce44f17e0 items=0 ppid=2299 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.577000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:48:35.577000 audit: BPF prog-id=80 op=UNLOAD Sep 13 00:48:35.577000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.577000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffce44f16d0 a2=50 a3=a000000085 items=0 ppid=2299 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.577000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:48:35.581000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.581000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.581000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.581000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.581000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.581000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.581000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.581000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.581000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.581000 audit: BPF prog-id=81 op=LOAD Sep 13 00:48:35.581000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe667ff470 a2=98 a3=3 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.581000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.583000 audit: BPF prog-id=81 op=UNLOAD Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit: BPF prog-id=82 op=LOAD Sep 13 00:48:35.583000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe667ff260 a2=94 a3=54428f items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.583000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.583000 audit: BPF prog-id=82 op=UNLOAD Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.583000 audit: BPF prog-id=83 op=LOAD Sep 13 00:48:35.583000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe667ff290 a2=94 a3=2 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.583000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.584000 audit: BPF prog-id=83 op=UNLOAD Sep 13 00:48:35.665000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.667544 kernel: kauditd_printk_skb: 154 callbacks suppressed Sep 13 00:48:35.667587 kernel: audit: type=1400 audit(1757724515.665:576): avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.665000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.672121 kernel: audit: type=1400 audit(1757724515.665:576): avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.665000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.674678 kernel: audit: type=1400 audit(1757724515.665:576): avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.665000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.681069 kernel: audit: type=1400 audit(1757724515.665:576): avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.681100 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:48:35.681116 kernel: audit: type=1400 audit(1757724515.665:576): avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.681132 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:48:35.681146 kernel: audit: backlog limit exceeded Sep 13 00:48:35.681160 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:48:35.681173 kernel: audit: type=1400 audit(1757724515.665:576): avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.665000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.665000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.665000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.665000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.665000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.665000 audit: BPF prog-id=84 op=LOAD Sep 13 00:48:35.665000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe667ff150 a2=94 a3=1 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.665000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.669000 audit: BPF prog-id=84 op=UNLOAD Sep 13 00:48:35.669000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.669000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe667ff220 a2=50 a3=7ffe667ff300 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.669000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe667ff160 a2=28 a3=0 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe667ff190 a2=28 a3=0 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe667ff0a0 a2=28 a3=0 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe667ff1b0 a2=28 a3=0 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe667ff190 a2=28 a3=0 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe667ff180 a2=28 a3=0 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe667ff1b0 a2=28 a3=0 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe667ff190 a2=28 a3=0 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe667ff1b0 a2=28 a3=0 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe667ff180 a2=28 a3=0 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe667ff1f0 a2=28 a3=0 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe667fefa0 a2=50 a3=1 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.676000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe667fefa0 a2=94 a3=5 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.676000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.685000 audit: BPF prog-id=85 op=UNLOAD Sep 13 00:48:35.685000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.685000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe667ff050 a2=50 a3=1 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.685000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.685000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.685000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe667ff170 a2=4 a3=38 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.685000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.685000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.685000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.685000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.685000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.685000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.685000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.685000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.685000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.685000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.685000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.685000 audit[2394]: AVC avc: denied { confidentiality } for pid=2394 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:35.685000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe667ff1c0 a2=94 a3=6 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.685000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { confidentiality } for pid=2394 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:35.686000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe667fe970 a2=94 a3=88 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.686000 audit[2394]: AVC avc: denied { confidentiality } for pid=2394 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:35.686000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe667fe970 a2=94 a3=88 items=0 ppid=2299 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:48:35.691000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.691000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.691000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.691000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.691000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.691000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.691000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.691000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.691000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.691000 audit: BPF prog-id=86 op=LOAD Sep 13 00:48:35.691000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbef46630 a2=98 a3=1999999999999999 items=0 ppid=2299 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.691000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:48:35.692000 audit: BPF prog-id=86 op=UNLOAD Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit: BPF prog-id=87 op=LOAD Sep 13 00:48:35.692000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbef46510 a2=94 a3=ffff items=0 ppid=2299 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.692000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:48:35.692000 audit: BPF prog-id=87 op=UNLOAD Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.692000 audit: BPF prog-id=88 op=LOAD Sep 13 00:48:35.692000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbef46550 a2=94 a3=7ffdbef46730 items=0 ppid=2299 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.692000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:48:35.693000 audit: BPF prog-id=88 op=UNLOAD Sep 13 00:48:35.730087 systemd-networkd[1063]: vxlan.calico: Link UP Sep 13 00:48:35.730093 systemd-networkd[1063]: vxlan.calico: Gained carrier Sep 13 00:48:35.763000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.763000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.763000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.763000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.763000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.763000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.763000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.763000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.763000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.763000 audit: BPF prog-id=89 op=LOAD Sep 13 00:48:35.763000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc702d2680 a2=98 a3=0 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.763000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit: BPF prog-id=89 op=UNLOAD Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit: BPF prog-id=90 op=LOAD Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc702d2490 a2=94 a3=54428f items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit: BPF prog-id=90 op=UNLOAD Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit: BPF prog-id=91 op=LOAD Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc702d24c0 a2=94 a3=2 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit: BPF prog-id=91 op=UNLOAD Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc702d2390 a2=28 a3=0 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc702d23c0 a2=28 a3=0 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc702d22d0 a2=28 a3=0 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc702d23e0 a2=28 a3=0 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc702d23c0 a2=28 a3=0 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc702d23b0 a2=28 a3=0 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc702d23e0 a2=28 a3=0 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc702d23c0 a2=28 a3=0 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc702d23e0 a2=28 a3=0 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc702d23b0 a2=28 a3=0 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc702d2420 a2=28 a3=0 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit: BPF prog-id=92 op=LOAD Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc702d2290 a2=94 a3=0 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit: BPF prog-id=92 op=UNLOAD Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc702d2280 a2=50 a3=2800 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc702d2280 a2=50 a3=2800 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit: BPF prog-id=93 op=LOAD Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc702d1aa0 a2=94 a3=2 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.764000 audit: BPF prog-id=93 op=UNLOAD Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.764000 audit: BPF prog-id=94 op=LOAD Sep 13 00:48:35.764000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc702d1ba0 a2=94 a3=30 items=0 ppid=2299 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit: BPF prog-id=95 op=LOAD Sep 13 00:48:35.769000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd29425f50 a2=98 a3=0 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.769000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.769000 audit: BPF prog-id=95 op=UNLOAD Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit: BPF prog-id=96 op=LOAD Sep 13 00:48:35.769000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd29425d40 a2=94 a3=54428f items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.769000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.769000 audit: BPF prog-id=96 op=UNLOAD Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.769000 audit: BPF prog-id=97 op=LOAD Sep 13 00:48:35.769000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd29425d70 a2=94 a3=2 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.769000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.769000 audit: BPF prog-id=97 op=UNLOAD Sep 13 00:48:35.843000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.843000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.843000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.843000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.843000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.843000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.843000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.843000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.843000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.843000 audit: BPF prog-id=98 op=LOAD Sep 13 00:48:35.843000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd29425c30 a2=94 a3=1 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.843000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.844000 audit: BPF prog-id=98 op=UNLOAD Sep 13 00:48:35.844000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.844000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd29425d00 a2=50 a3=7ffd29425de0 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.844000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.851000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.851000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd29425c40 a2=28 a3=0 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.851000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.851000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.851000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd29425c70 a2=28 a3=0 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.851000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.852000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.852000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd29425b80 a2=28 a3=0 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.852000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.852000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.852000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd29425c90 a2=28 a3=0 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.852000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.852000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.852000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd29425c70 a2=28 a3=0 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.852000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.852000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.852000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd29425c60 a2=28 a3=0 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.852000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.852000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.852000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd29425c90 a2=28 a3=0 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.852000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.852000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.852000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd29425c70 a2=28 a3=0 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.852000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.852000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.852000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd29425c90 a2=28 a3=0 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.852000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.852000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.852000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd29425c60 a2=28 a3=0 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.852000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.852000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.852000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd29425cd0 a2=28 a3=0 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.852000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd29425a80 a2=50 a3=1 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.853000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit: BPF prog-id=99 op=LOAD Sep 13 00:48:35.853000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd29425a80 a2=94 a3=5 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.853000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.853000 audit: BPF prog-id=99 op=UNLOAD Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd29425b30 a2=50 a3=1 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.853000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd29425c50 a2=4 a3=38 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.853000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.853000 audit[2444]: AVC avc: denied { confidentiality } for pid=2444 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:35.853000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd29425ca0 a2=94 a3=6 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.853000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { confidentiality } for pid=2444 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:35.854000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd29425450 a2=94 a3=88 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.854000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.854000 audit[2444]: AVC avc: denied { confidentiality } for pid=2444 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:48:35.854000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd29425450 a2=94 a3=88 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.854000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.855000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.855000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd29426e80 a2=10 a3=f8f00800 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.855000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.855000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd29426d20 a2=10 a3=3 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.855000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.855000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd29426cc0 a2=10 a3=3 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.855000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:35.855000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd29426cc0 a2=10 a3=7 items=0 ppid=2299 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:48:35.859000 audit: BPF prog-id=94 op=UNLOAD Sep 13 00:48:35.902000 audit[2478]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:48:35.902000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff4c2be5d0 a2=0 a3=7fff4c2be5bc items=0 ppid=2299 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.902000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:48:35.910000 audit[2481]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2481 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:48:35.910000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffed8108460 a2=0 a3=7ffed810844c items=0 ppid=2299 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.910000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:48:35.911000 audit[2479]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2479 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:48:35.911000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe5196a3a0 a2=0 a3=7ffe5196a38c items=0 ppid=2299 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.911000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:48:35.912000 audit[2477]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2477 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:48:35.912000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd0ad53c10 a2=0 a3=7ffd0ad53bfc items=0 ppid=2299 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:35.912000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:48:36.375541 kubelet[1639]: E0913 00:48:36.375479 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:36.542812 systemd[1]: run-containerd-runc-k8s.io-7a8113b745e23ddfd4ce3ab58e58141e3e1b14b728815478f9f28eddbbd75a1f-runc.o9Nd5J.mount: Deactivated successfully. Sep 13 00:48:36.810972 sshd[2183]: Failed password for invalid user ftp from 121.132.81.3 port 40544 ssh2 Sep 13 00:48:37.376133 kubelet[1639]: E0913 00:48:37.376070 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:37.747886 systemd-networkd[1063]: vxlan.calico: Gained IPv6LL Sep 13 00:48:38.216729 sshd[2183]: Connection closed by invalid user ftp 121.132.81.3 port 40544 [preauth] Sep 13 00:48:38.217643 systemd[1]: sshd@20-139.178.70.109:22-121.132.81.3:40544.service: Deactivated successfully. Sep 13 00:48:38.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.109:22-121.132.81.3:40544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:38.377071 kubelet[1639]: E0913 00:48:38.377051 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:38.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.109:22-121.132.81.3:33788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:38.516838 systemd[1]: Started sshd@21-139.178.70.109:22-121.132.81.3:33788.service. Sep 13 00:48:39.378069 kubelet[1639]: E0913 00:48:39.378031 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:39.497042 env[1256]: time="2025-09-13T00:48:39.497021389Z" level=info msg="StopPodSandbox for \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\"" Sep 13 00:48:39.651713 sshd[2516]: Invalid user kali from 121.132.81.3 port 33788 Sep 13 00:48:39.668163 kubelet[1639]: I0913 00:48:39.667981 1639 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-5l6p2" podStartSLOduration=8.723692806 podStartE2EDuration="24.667966822s" podCreationTimestamp="2025-09-13 00:48:15 +0000 UTC" firstStartedPulling="2025-09-13 00:48:17.563124476 +0000 UTC m=+2.520330453" lastFinishedPulling="2025-09-13 00:48:33.507398493 +0000 UTC m=+18.464604469" observedRunningTime="2025-09-13 00:48:34.820281716 +0000 UTC m=+19.777487703" watchObservedRunningTime="2025-09-13 00:48:39.667966822 +0000 UTC m=+24.625172802" Sep 13 00:48:39.827103 sshd[2516]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:39.829983 sshd[2516]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:48:39.830004 sshd[2516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:48:39.829000 audit[2516]: USER_AUTH pid=2516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="kali" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:39.830316 sshd[2516]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:40.060999 env[1256]: 2025-09-13 00:48:39.668 [INFO][2528] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:48:40.060999 env[1256]: 2025-09-13 00:48:39.669 [INFO][2528] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" iface="eth0" netns="/var/run/netns/cni-2afd47a5-29b4-93f7-4b20-92cb231247df" Sep 13 00:48:40.060999 env[1256]: 2025-09-13 00:48:39.669 [INFO][2528] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" iface="eth0" netns="/var/run/netns/cni-2afd47a5-29b4-93f7-4b20-92cb231247df" Sep 13 00:48:40.060999 env[1256]: 2025-09-13 00:48:39.673 [INFO][2528] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" iface="eth0" netns="/var/run/netns/cni-2afd47a5-29b4-93f7-4b20-92cb231247df" Sep 13 00:48:40.060999 env[1256]: 2025-09-13 00:48:39.673 [INFO][2528] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:48:40.060999 env[1256]: 2025-09-13 00:48:39.673 [INFO][2528] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:48:40.060999 env[1256]: 2025-09-13 00:48:40.010 [INFO][2536] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" HandleID="k8s-pod-network.f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Workload="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:48:40.060999 env[1256]: 2025-09-13 00:48:40.010 [INFO][2536] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:40.060999 env[1256]: 2025-09-13 00:48:40.010 [INFO][2536] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:40.060999 env[1256]: 2025-09-13 00:48:40.056 [WARNING][2536] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" HandleID="k8s-pod-network.f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Workload="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:48:40.060999 env[1256]: 2025-09-13 00:48:40.057 [INFO][2536] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" HandleID="k8s-pod-network.f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Workload="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:48:40.060999 env[1256]: 2025-09-13 00:48:40.058 [INFO][2536] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:40.060999 env[1256]: 2025-09-13 00:48:40.060 [INFO][2528] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:48:40.063844 env[1256]: time="2025-09-13T00:48:40.061128031Z" level=info msg="TearDown network for sandbox \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\" successfully" Sep 13 00:48:40.063844 env[1256]: time="2025-09-13T00:48:40.061155082Z" level=info msg="StopPodSandbox for \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\" returns successfully" Sep 13 00:48:40.063844 env[1256]: time="2025-09-13T00:48:40.061642618Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xlfxz,Uid:d4b8e069-24cf-4eee-b387-607d770984c6,Namespace:calico-system,Attempt:1,}" Sep 13 00:48:40.062187 systemd[1]: run-netns-cni\x2d2afd47a5\x2d29b4\x2d93f7\x2d4b20\x2d92cb231247df.mount: Deactivated successfully. Sep 13 00:48:40.266414 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:48:40.266476 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7e0556e489e: link becomes ready Sep 13 00:48:40.264426 systemd-networkd[1063]: cali7e0556e489e: Link UP Sep 13 00:48:40.266718 systemd-networkd[1063]: cali7e0556e489e: Gained carrier Sep 13 00:48:40.379066 kubelet[1639]: E0913 00:48:40.378986 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.151 [INFO][2542] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.141-k8s-csi--node--driver--xlfxz-eth0 csi-node-driver- calico-system d4b8e069-24cf-4eee-b387-607d770984c6 1235 0 2025-09-13 00:48:15 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.124.141 csi-node-driver-xlfxz eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali7e0556e489e [] [] }} ContainerID="67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" Namespace="calico-system" Pod="csi-node-driver-xlfxz" WorkloadEndpoint="10.67.124.141-k8s-csi--node--driver--xlfxz-" Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.151 [INFO][2542] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" Namespace="calico-system" Pod="csi-node-driver-xlfxz" WorkloadEndpoint="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.172 [INFO][2556] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" HandleID="k8s-pod-network.67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" Workload="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.172 [INFO][2556] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" HandleID="k8s-pod-network.67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" Workload="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c90f0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.124.141", "pod":"csi-node-driver-xlfxz", "timestamp":"2025-09-13 00:48:40.172064238 +0000 UTC"}, Hostname:"10.67.124.141", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.172 [INFO][2556] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.172 [INFO][2556] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.172 [INFO][2556] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.141' Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.200 [INFO][2556] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" host="10.67.124.141" Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.208 [INFO][2556] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.141" Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.210 [INFO][2556] ipam/ipam.go 511: Trying affinity for 192.168.106.128/26 host="10.67.124.141" Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.211 [INFO][2556] ipam/ipam.go 158: Attempting to load block cidr=192.168.106.128/26 host="10.67.124.141" Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.212 [INFO][2556] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.106.128/26 host="10.67.124.141" Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.212 [INFO][2556] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.106.128/26 handle="k8s-pod-network.67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" host="10.67.124.141" Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.214 [INFO][2556] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.246 [INFO][2556] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.106.128/26 handle="k8s-pod-network.67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" host="10.67.124.141" Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.256 [INFO][2556] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.106.129/26] block=192.168.106.128/26 handle="k8s-pod-network.67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" host="10.67.124.141" Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.256 [INFO][2556] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.106.129/26] handle="k8s-pod-network.67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" host="10.67.124.141" Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.256 [INFO][2556] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:40.738217 env[1256]: 2025-09-13 00:48:40.256 [INFO][2556] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.106.129/26] IPv6=[] ContainerID="67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" HandleID="k8s-pod-network.67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" Workload="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:48:40.739036 env[1256]: 2025-09-13 00:48:40.258 [INFO][2542] cni-plugin/k8s.go 418: Populated endpoint ContainerID="67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" Namespace="calico-system" Pod="csi-node-driver-xlfxz" WorkloadEndpoint="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.141-k8s-csi--node--driver--xlfxz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d4b8e069-24cf-4eee-b387-607d770984c6", ResourceVersion:"1235", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 48, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.141", ContainerID:"", Pod:"csi-node-driver-xlfxz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.106.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7e0556e489e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:40.739036 env[1256]: 2025-09-13 00:48:40.258 [INFO][2542] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.106.129/32] ContainerID="67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" Namespace="calico-system" Pod="csi-node-driver-xlfxz" WorkloadEndpoint="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:48:40.739036 env[1256]: 2025-09-13 00:48:40.258 [INFO][2542] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7e0556e489e ContainerID="67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" Namespace="calico-system" Pod="csi-node-driver-xlfxz" WorkloadEndpoint="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:48:40.739036 env[1256]: 2025-09-13 00:48:40.266 [INFO][2542] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" Namespace="calico-system" Pod="csi-node-driver-xlfxz" WorkloadEndpoint="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:48:40.739036 env[1256]: 2025-09-13 00:48:40.267 [INFO][2542] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" Namespace="calico-system" Pod="csi-node-driver-xlfxz" WorkloadEndpoint="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.141-k8s-csi--node--driver--xlfxz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d4b8e069-24cf-4eee-b387-607d770984c6", ResourceVersion:"1235", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 48, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.141", ContainerID:"67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc", Pod:"csi-node-driver-xlfxz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.106.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7e0556e489e", MAC:"16:6a:8c:75:fe:11", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:40.739036 env[1256]: 2025-09-13 00:48:40.736 [INFO][2542] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc" Namespace="calico-system" Pod="csi-node-driver-xlfxz" WorkloadEndpoint="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:48:40.748243 env[1256]: time="2025-09-13T00:48:40.748184322Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:48:40.748243 env[1256]: time="2025-09-13T00:48:40.748224040Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:48:40.748798 env[1256]: time="2025-09-13T00:48:40.748233968Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:48:40.748798 env[1256]: time="2025-09-13T00:48:40.748359316Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc pid=2579 runtime=io.containerd.runc.v2 Sep 13 00:48:40.760120 systemd[1]: Started cri-containerd-67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc.scope. Sep 13 00:48:40.765469 systemd[1]: run-containerd-runc-k8s.io-67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc-runc.OL6kJC.mount: Deactivated successfully. Sep 13 00:48:40.777685 kernel: kauditd_printk_skb: 442 callbacks suppressed Sep 13 00:48:40.777800 kernel: audit: type=1400 audit(1757724520.773:668): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.777824 kernel: audit: type=1400 audit(1757724520.773:669): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781835 kernel: audit: type=1400 audit(1757724520.773:670): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.785023 kernel: audit: type=1400 audit(1757724520.773:671): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.787681 kernel: audit: type=1400 audit(1757724520.773:672): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.787860 systemd-resolved[1204]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 13 00:48:40.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.790281 kernel: audit: type=1400 audit(1757724520.773:673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.795790 kernel: audit: type=1400 audit(1757724520.773:674): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.795826 kernel: audit: type=1400 audit(1757724520.773:675): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.801588 kernel: audit: type=1400 audit(1757724520.773:676): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.801627 kernel: audit: type=1400 audit(1757724520.776:677): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.776000 audit: BPF prog-id=100 op=LOAD Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2579 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:40.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637303235343839663062386265623337326436376236323539343062 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2579 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:40.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637303235343839663062386265623337326436376236323539343062 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit: BPF prog-id=101 op=LOAD Sep 13 00:48:40.781000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d4b60 items=0 ppid=2579 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:40.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637303235343839663062386265623337326436376236323539343062 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit: BPF prog-id=102 op=LOAD Sep 13 00:48:40.781000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d4ba8 items=0 ppid=2579 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:40.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637303235343839663062386265623337326436376236323539343062 Sep 13 00:48:40.781000 audit: BPF prog-id=102 op=UNLOAD Sep 13 00:48:40.781000 audit: BPF prog-id=101 op=UNLOAD Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:40.781000 audit: BPF prog-id=103 op=LOAD Sep 13 00:48:40.781000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d4fb8 items=0 ppid=2579 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:40.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637303235343839663062386265623337326436376236323539343062 Sep 13 00:48:40.803019 env[1256]: time="2025-09-13T00:48:40.802995792Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xlfxz,Uid:d4b8e069-24cf-4eee-b387-607d770984c6,Namespace:calico-system,Attempt:1,} returns sandbox id \"67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc\"" Sep 13 00:48:40.804130 env[1256]: time="2025-09-13T00:48:40.804114362Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 00:48:40.795000 audit[2607]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2607 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:48:40.795000 audit[2607]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffdef7c6860 a2=0 a3=7ffdef7c684c items=0 ppid=2299 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:40.795000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:48:41.379215 kubelet[1639]: E0913 00:48:41.379185 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:41.395824 systemd-networkd[1063]: cali7e0556e489e: Gained IPv6LL Sep 13 00:48:41.911817 sshd[2516]: Failed password for invalid user kali from 121.132.81.3 port 33788 ssh2 Sep 13 00:48:42.269937 env[1256]: time="2025-09-13T00:48:42.269907669Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:42.270592 env[1256]: time="2025-09-13T00:48:42.270575860Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:42.271237 env[1256]: time="2025-09-13T00:48:42.271224815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:42.271915 env[1256]: time="2025-09-13T00:48:42.271902545Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:42.272217 env[1256]: time="2025-09-13T00:48:42.272202499Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 13 00:48:42.277287 env[1256]: time="2025-09-13T00:48:42.277259773Z" level=info msg="CreateContainer within sandbox \"67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 00:48:42.284272 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3725317849.mount: Deactivated successfully. Sep 13 00:48:42.290006 env[1256]: time="2025-09-13T00:48:42.289987435Z" level=info msg="CreateContainer within sandbox \"67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d95d2f08b362ac8c141a013c5710d9028a5cbe643a26027ac80c48d4d16c6ee5\"" Sep 13 00:48:42.290340 env[1256]: time="2025-09-13T00:48:42.290317854Z" level=info msg="StartContainer for \"d95d2f08b362ac8c141a013c5710d9028a5cbe643a26027ac80c48d4d16c6ee5\"" Sep 13 00:48:42.305658 systemd[1]: Started cri-containerd-d95d2f08b362ac8c141a013c5710d9028a5cbe643a26027ac80c48d4d16c6ee5.scope. Sep 13 00:48:42.314507 systemd[1]: run-containerd-runc-k8s.io-d95d2f08b362ac8c141a013c5710d9028a5cbe643a26027ac80c48d4d16c6ee5-runc.lbenLH.mount: Deactivated successfully. Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f544c2cc348 items=0 ppid=2579 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:42.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439356432663038623336326163386331343161303133633537313064 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit: BPF prog-id=104 op=LOAD Sep 13 00:48:42.322000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003b8508 items=0 ppid=2579 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:42.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439356432663038623336326163386331343161303133633537313064 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit: BPF prog-id=105 op=LOAD Sep 13 00:48:42.322000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003b8558 items=0 ppid=2579 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:42.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439356432663038623336326163386331343161303133633537313064 Sep 13 00:48:42.322000 audit: BPF prog-id=105 op=UNLOAD Sep 13 00:48:42.322000 audit: BPF prog-id=104 op=UNLOAD Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:42.322000 audit: BPF prog-id=106 op=LOAD Sep 13 00:48:42.322000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003b85e8 items=0 ppid=2579 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:42.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439356432663038623336326163386331343161303133633537313064 Sep 13 00:48:42.334704 env[1256]: time="2025-09-13T00:48:42.334663548Z" level=info msg="StartContainer for \"d95d2f08b362ac8c141a013c5710d9028a5cbe643a26027ac80c48d4d16c6ee5\" returns successfully" Sep 13 00:48:42.335424 env[1256]: time="2025-09-13T00:48:42.335402413Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 00:48:42.379595 kubelet[1639]: E0913 00:48:42.379569 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:43.035201 sshd[2516]: Connection closed by invalid user kali 121.132.81.3 port 33788 [preauth] Sep 13 00:48:43.040513 systemd[1]: sshd@21-139.178.70.109:22-121.132.81.3:33788.service: Deactivated successfully. Sep 13 00:48:43.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.109:22-121.132.81.3:33788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:43.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.109:22-121.132.81.3:48008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:43.226811 systemd[1]: Started sshd@22-139.178.70.109:22-121.132.81.3:48008.service. Sep 13 00:48:43.380060 kubelet[1639]: E0913 00:48:43.379781 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:43.726977 env[1256]: time="2025-09-13T00:48:43.726947017Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:43.727912 env[1256]: time="2025-09-13T00:48:43.727895175Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:43.728820 env[1256]: time="2025-09-13T00:48:43.728807314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:43.729486 env[1256]: time="2025-09-13T00:48:43.729469115Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:43.729824 env[1256]: time="2025-09-13T00:48:43.729807520Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 13 00:48:43.732576 env[1256]: time="2025-09-13T00:48:43.731934178Z" level=info msg="CreateContainer within sandbox \"67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 00:48:43.787464 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3920526105.mount: Deactivated successfully. Sep 13 00:48:43.850942 env[1256]: time="2025-09-13T00:48:43.850868458Z" level=info msg="CreateContainer within sandbox \"67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d988f5dd15f42cc01cd12eb7a2cec60b516973d11c526f6e9000b873c3bf49d6\"" Sep 13 00:48:43.851412 env[1256]: time="2025-09-13T00:48:43.851395618Z" level=info msg="StartContainer for \"d988f5dd15f42cc01cd12eb7a2cec60b516973d11c526f6e9000b873c3bf49d6\"" Sep 13 00:48:43.872337 systemd[1]: Started cri-containerd-d988f5dd15f42cc01cd12eb7a2cec60b516973d11c526f6e9000b873c3bf49d6.scope. Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9471fbfb18 items=0 ppid=2579 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:43.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383866356464313566343263633031636431326562376132636563 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit: BPF prog-id=107 op=LOAD Sep 13 00:48:43.883000 audit[2674]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028b588 items=0 ppid=2579 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:43.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383866356464313566343263633031636431326562376132636563 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit: BPF prog-id=108 op=LOAD Sep 13 00:48:43.883000 audit[2674]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028b5d8 items=0 ppid=2579 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:43.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383866356464313566343263633031636431326562376132636563 Sep 13 00:48:43.883000 audit: BPF prog-id=108 op=UNLOAD Sep 13 00:48:43.883000 audit: BPF prog-id=107 op=UNLOAD Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:43.883000 audit: BPF prog-id=109 op=LOAD Sep 13 00:48:43.883000 audit[2674]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028b668 items=0 ppid=2579 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:43.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439383866356464313566343263633031636431326562376132636563 Sep 13 00:48:43.895148 env[1256]: time="2025-09-13T00:48:43.895115581Z" level=info msg="StartContainer for \"d988f5dd15f42cc01cd12eb7a2cec60b516973d11c526f6e9000b873c3bf49d6\" returns successfully" Sep 13 00:48:44.249249 systemd[1]: Started sshd@23-139.178.70.109:22-185.255.90.135:59712.service. Sep 13 00:48:44.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.109:22-185.255.90.135:59712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:44.380849 kubelet[1639]: E0913 00:48:44.380823 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:44.464359 kubelet[1639]: I0913 00:48:44.464340 1639 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 00:48:44.473950 kubelet[1639]: I0913 00:48:44.473931 1639 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 00:48:44.666179 sshd[2663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 user=root Sep 13 00:48:44.665000 audit[2663]: USER_AUTH pid=2663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:44.779031 kubelet[1639]: I0913 00:48:44.779000 1639 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-xlfxz" podStartSLOduration=26.852304717 podStartE2EDuration="29.778990309s" podCreationTimestamp="2025-09-13 00:48:15 +0000 UTC" firstStartedPulling="2025-09-13 00:48:40.803836455 +0000 UTC m=+25.761042433" lastFinishedPulling="2025-09-13 00:48:43.730522048 +0000 UTC m=+28.687728025" observedRunningTime="2025-09-13 00:48:44.771629115 +0000 UTC m=+29.728835102" watchObservedRunningTime="2025-09-13 00:48:44.778990309 +0000 UTC m=+29.736196290" Sep 13 00:48:44.784311 systemd[1]: run-containerd-runc-k8s.io-d988f5dd15f42cc01cd12eb7a2cec60b516973d11c526f6e9000b873c3bf49d6-runc.JUHvuj.mount: Deactivated successfully. Sep 13 00:48:45.381180 kubelet[1639]: E0913 00:48:45.381159 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:45.638461 sshd[2704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.255.90.135 user=root Sep 13 00:48:45.638000 audit[2704]: USER_AUTH pid=2704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=185.255.90.135 addr=185.255.90.135 terminal=ssh res=failed' Sep 13 00:48:46.381468 kubelet[1639]: E0913 00:48:46.381445 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:46.432057 sshd[2663]: Failed password for root from 121.132.81.3 port 48008 ssh2 Sep 13 00:48:47.382131 kubelet[1639]: E0913 00:48:47.382106 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:47.484688 sshd[2663]: Connection closed by authenticating user root 121.132.81.3 port 48008 [preauth] Sep 13 00:48:47.485491 systemd[1]: sshd@22-139.178.70.109:22-121.132.81.3:48008.service: Deactivated successfully. Sep 13 00:48:47.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.109:22-121.132.81.3:48008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:47.489205 kernel: kauditd_printk_skb: 141 callbacks suppressed Sep 13 00:48:47.489250 kernel: audit: type=1131 audit(1757724527.485:704): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.109:22-121.132.81.3:48008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:47.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.109:22-121.132.81.3:39200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:47.747359 systemd[1]: Started sshd@24-139.178.70.109:22-121.132.81.3:39200.service. Sep 13 00:48:47.750676 kernel: audit: type=1130 audit(1757724527.746:705): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.109:22-121.132.81.3:39200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:47.875992 sshd[2704]: Failed password for root from 185.255.90.135 port 59712 ssh2 Sep 13 00:48:48.228624 sshd[2704]: Received disconnect from 185.255.90.135 port 59712:11: Bye Bye [preauth] Sep 13 00:48:48.228744 sshd[2704]: Disconnected from authenticating user root 185.255.90.135 port 59712 [preauth] Sep 13 00:48:48.229516 systemd[1]: sshd@23-139.178.70.109:22-185.255.90.135:59712.service: Deactivated successfully. Sep 13 00:48:48.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.109:22-185.255.90.135:59712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:48.233681 kernel: audit: type=1131 audit(1757724528.228:706): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.109:22-185.255.90.135:59712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:48.382816 kubelet[1639]: E0913 00:48:48.382791 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:49.016730 sshd[2717]: Invalid user x from 121.132.81.3 port 39200 Sep 13 00:48:49.200346 sshd[2717]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:49.200817 sshd[2717]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:48:49.200847 sshd[2717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:48:49.201259 sshd[2717]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:49.200000 audit[2717]: USER_AUTH pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="x" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:49.205701 kernel: audit: type=1100 audit(1757724529.200:707): pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="x" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:49.383835 kubelet[1639]: E0913 00:48:49.383747 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:50.383825 kubelet[1639]: E0913 00:48:50.383801 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:51.322458 sshd[2717]: Failed password for invalid user x from 121.132.81.3 port 39200 ssh2 Sep 13 00:48:51.384201 kubelet[1639]: E0913 00:48:51.384181 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:52.077901 sshd[2717]: Connection closed by invalid user x 121.132.81.3 port 39200 [preauth] Sep 13 00:48:52.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.109:22-121.132.81.3:39200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:52.078839 systemd[1]: sshd@24-139.178.70.109:22-121.132.81.3:39200.service: Deactivated successfully. Sep 13 00:48:52.083695 kernel: audit: type=1131 audit(1757724532.078:708): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.109:22-121.132.81.3:39200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:52.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.70.109:22-121.132.81.3:55710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:52.282480 systemd[1]: Started sshd@25-139.178.70.109:22-121.132.81.3:55710.service. Sep 13 00:48:52.286688 kernel: audit: type=1130 audit(1757724532.281:709): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.70.109:22-121.132.81.3:55710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:52.385095 kubelet[1639]: E0913 00:48:52.384785 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:53.385901 kubelet[1639]: E0913 00:48:53.385873 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:53.614356 sshd[2726]: Invalid user mcserver from 121.132.81.3 port 55710 Sep 13 00:48:53.865992 sshd[2726]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:53.866336 sshd[2726]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:48:53.866359 sshd[2726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:48:53.866689 sshd[2726]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:53.866000 audit[2726]: USER_AUTH pid=2726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mcserver" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:53.869679 kernel: audit: type=1100 audit(1757724533.866:710): pid=2726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mcserver" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:54.311446 systemd[1]: Created slice kubepods-besteffort-podd66efa28_5293_4183_b3e8_4644cc9cb9b2.slice. Sep 13 00:48:54.386642 kubelet[1639]: E0913 00:48:54.386584 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:54.406986 kubelet[1639]: I0913 00:48:54.406899 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-scrgj\" (UniqueName: \"kubernetes.io/projected/d66efa28-5293-4183-b3e8-4644cc9cb9b2-kube-api-access-scrgj\") pod \"nginx-deployment-7fcdb87857-j754k\" (UID: \"d66efa28-5293-4183-b3e8-4644cc9cb9b2\") " pod="default/nginx-deployment-7fcdb87857-j754k" Sep 13 00:48:54.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.70.109:22-23.228.85.111:36414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:54.882309 systemd[1]: Started sshd@26-139.178.70.109:22-23.228.85.111:36414.service. Sep 13 00:48:54.886691 kernel: audit: type=1130 audit(1757724534.881:711): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.70.109:22-23.228.85.111:36414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:55.044520 sshd[2729]: Invalid user system from 23.228.85.111 port 36414 Sep 13 00:48:55.046264 sshd[2729]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:55.046771 sshd[2729]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:48:55.046846 sshd[2729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.228.85.111 Sep 13 00:48:55.047220 sshd[2729]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:55.046000 audit[2729]: USER_AUTH pid=2729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="system" exe="/usr/sbin/sshd" hostname=23.228.85.111 addr=23.228.85.111 terminal=ssh res=failed' Sep 13 00:48:55.050707 kernel: audit: type=1100 audit(1757724535.046:712): pid=2729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="system" exe="/usr/sbin/sshd" hostname=23.228.85.111 addr=23.228.85.111 terminal=ssh res=failed' Sep 13 00:48:55.214175 env[1256]: time="2025-09-13T00:48:55.213877526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-j754k,Uid:d66efa28-5293-4183-b3e8-4644cc9cb9b2,Namespace:default,Attempt:0,}" Sep 13 00:48:55.339367 kubelet[1639]: E0913 00:48:55.339338 1639 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:55.386867 kubelet[1639]: E0913 00:48:55.386832 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:55.422766 systemd-networkd[1063]: cali2203574e0ee: Link UP Sep 13 00:48:55.426484 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:48:55.426520 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2203574e0ee: link becomes ready Sep 13 00:48:55.426562 systemd-networkd[1063]: cali2203574e0ee: Gained carrier Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.346 [INFO][2732] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-eth0 nginx-deployment-7fcdb87857- default d66efa28-5293-4183-b3e8-4644cc9cb9b2 1285 0 2025-09-13 00:48:54 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.141 nginx-deployment-7fcdb87857-j754k eth0 default [] [] [kns.default ksa.default.default] cali2203574e0ee [] [] }} ContainerID="1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" Namespace="default" Pod="nginx-deployment-7fcdb87857-j754k" WorkloadEndpoint="10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-" Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.346 [INFO][2732] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" Namespace="default" Pod="nginx-deployment-7fcdb87857-j754k" WorkloadEndpoint="10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-eth0" Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.365 [INFO][2745] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" HandleID="k8s-pod-network.1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" Workload="10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-eth0" Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.365 [INFO][2745] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" HandleID="k8s-pod-network.1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" Workload="10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.141", "pod":"nginx-deployment-7fcdb87857-j754k", "timestamp":"2025-09-13 00:48:55.365373418 +0000 UTC"}, Hostname:"10.67.124.141", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.365 [INFO][2745] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.365 [INFO][2745] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.365 [INFO][2745] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.141' Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.386 [INFO][2745] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" host="10.67.124.141" Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.391 [INFO][2745] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.141" Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.394 [INFO][2745] ipam/ipam.go 511: Trying affinity for 192.168.106.128/26 host="10.67.124.141" Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.395 [INFO][2745] ipam/ipam.go 158: Attempting to load block cidr=192.168.106.128/26 host="10.67.124.141" Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.396 [INFO][2745] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.106.128/26 host="10.67.124.141" Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.396 [INFO][2745] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.106.128/26 handle="k8s-pod-network.1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" host="10.67.124.141" Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.399 [INFO][2745] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.411 [INFO][2745] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.106.128/26 handle="k8s-pod-network.1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" host="10.67.124.141" Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.420 [INFO][2745] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.106.130/26] block=192.168.106.128/26 handle="k8s-pod-network.1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" host="10.67.124.141" Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.420 [INFO][2745] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.106.130/26] handle="k8s-pod-network.1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" host="10.67.124.141" Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.420 [INFO][2745] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:55.483903 env[1256]: 2025-09-13 00:48:55.420 [INFO][2745] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.106.130/26] IPv6=[] ContainerID="1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" HandleID="k8s-pod-network.1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" Workload="10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-eth0" Sep 13 00:48:55.484374 env[1256]: 2025-09-13 00:48:55.421 [INFO][2732] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" Namespace="default" Pod="nginx-deployment-7fcdb87857-j754k" WorkloadEndpoint="10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"d66efa28-5293-4183-b3e8-4644cc9cb9b2", ResourceVersion:"1285", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 48, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.141", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-j754k", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.106.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2203574e0ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:55.484374 env[1256]: 2025-09-13 00:48:55.421 [INFO][2732] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.106.130/32] ContainerID="1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" Namespace="default" Pod="nginx-deployment-7fcdb87857-j754k" WorkloadEndpoint="10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-eth0" Sep 13 00:48:55.484374 env[1256]: 2025-09-13 00:48:55.421 [INFO][2732] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2203574e0ee ContainerID="1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" Namespace="default" Pod="nginx-deployment-7fcdb87857-j754k" WorkloadEndpoint="10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-eth0" Sep 13 00:48:55.484374 env[1256]: 2025-09-13 00:48:55.427 [INFO][2732] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" Namespace="default" Pod="nginx-deployment-7fcdb87857-j754k" WorkloadEndpoint="10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-eth0" Sep 13 00:48:55.484374 env[1256]: 2025-09-13 00:48:55.427 [INFO][2732] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" Namespace="default" Pod="nginx-deployment-7fcdb87857-j754k" WorkloadEndpoint="10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"d66efa28-5293-4183-b3e8-4644cc9cb9b2", ResourceVersion:"1285", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 48, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.141", ContainerID:"1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d", Pod:"nginx-deployment-7fcdb87857-j754k", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.106.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2203574e0ee", MAC:"d6:4a:43:da:51:09", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:55.484374 env[1256]: 2025-09-13 00:48:55.473 [INFO][2732] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d" Namespace="default" Pod="nginx-deployment-7fcdb87857-j754k" WorkloadEndpoint="10.67.124.141-k8s-nginx--deployment--7fcdb87857--j754k-eth0" Sep 13 00:48:55.490338 env[1256]: time="2025-09-13T00:48:55.490293745Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:48:55.490416 env[1256]: time="2025-09-13T00:48:55.490341166Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:48:55.490416 env[1256]: time="2025-09-13T00:48:55.490356388Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:48:55.490525 env[1256]: time="2025-09-13T00:48:55.490504518Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d pid=2768 runtime=io.containerd.runc.v2 Sep 13 00:48:55.503140 systemd[1]: Started cri-containerd-1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d.scope. Sep 13 00:48:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.515408 kernel: audit: type=1400 audit(1757724535.509:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.515436 kernel: audit: type=1400 audit(1757724535.509:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.515454 kernel: audit: type=1400 audit(1757724535.509:715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.518467 systemd-resolved[1204]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 13 00:48:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.520995 kernel: audit: type=1400 audit(1757724535.509:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.523490 kernel: audit: type=1400 audit(1757724535.509:717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.532584 kernel: audit: type=1400 audit(1757724535.509:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.532609 kernel: audit: type=1400 audit(1757724535.509:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.512000 audit: BPF prog-id=110 op=LOAD Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2768 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:55.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163306136383134373030323435653764316465353034316632623637 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2768 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:55.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163306136383134373030323435653764316465353034316632623637 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit: BPF prog-id=111 op=LOAD Sep 13 00:48:55.517000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001e3a20 items=0 ppid=2768 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:55.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163306136383134373030323435653764316465353034316632623637 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit: BPF prog-id=112 op=LOAD Sep 13 00:48:55.517000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001e3a68 items=0 ppid=2768 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:55.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163306136383134373030323435653764316465353034316632623637 Sep 13 00:48:55.517000 audit: BPF prog-id=112 op=UNLOAD Sep 13 00:48:55.517000 audit: BPF prog-id=111 op=UNLOAD Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:55.517000 audit: BPF prog-id=113 op=LOAD Sep 13 00:48:55.517000 audit[2777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001e3e78 items=0 ppid=2768 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:55.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163306136383134373030323435653764316465353034316632623637 Sep 13 00:48:55.537929 sshd[2726]: Failed password for invalid user mcserver from 121.132.81.3 port 55710 ssh2 Sep 13 00:48:55.544857 env[1256]: time="2025-09-13T00:48:55.544831223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-j754k,Uid:d66efa28-5293-4183-b3e8-4644cc9cb9b2,Namespace:default,Attempt:0,} returns sandbox id \"1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d\"" Sep 13 00:48:55.545942 env[1256]: time="2025-09-13T00:48:55.545928515Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:48:55.598000 audit[2804]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=2804 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:48:55.598000 audit[2804]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7fffda6ad710 a2=0 a3=7fffda6ad6fc items=0 ppid=2299 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:55.598000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:48:56.141688 systemd[1]: run-containerd-runc-k8s.io-1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d-runc.Ay4ZsO.mount: Deactivated successfully. Sep 13 00:48:56.387222 kubelet[1639]: E0913 00:48:56.387182 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:56.657328 sshd[2729]: Failed password for invalid user system from 23.228.85.111 port 36414 ssh2 Sep 13 00:48:56.884025 systemd-networkd[1063]: cali2203574e0ee: Gained IPv6LL Sep 13 00:48:57.388116 kubelet[1639]: E0913 00:48:57.388084 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:57.397143 sshd[2726]: Connection closed by invalid user mcserver 121.132.81.3 port 55710 [preauth] Sep 13 00:48:57.397809 systemd[1]: sshd@25-139.178.70.109:22-121.132.81.3:55710.service: Deactivated successfully. Sep 13 00:48:57.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.70.109:22-121.132.81.3:55710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:57.428564 sshd[2729]: Received disconnect from 23.228.85.111 port 36414:11: Bye Bye [preauth] Sep 13 00:48:57.428564 sshd[2729]: Disconnected from invalid user system 23.228.85.111 port 36414 [preauth] Sep 13 00:48:57.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.70.109:22-23.228.85.111:36414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:57.429253 systemd[1]: sshd@26-139.178.70.109:22-23.228.85.111:36414.service: Deactivated successfully. Sep 13 00:48:57.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.70.109:22-121.132.81.3:49344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:57.581824 systemd[1]: Started sshd@27-139.178.70.109:22-121.132.81.3:49344.service. Sep 13 00:48:58.023460 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2376493780.mount: Deactivated successfully. Sep 13 00:48:58.389129 kubelet[1639]: E0913 00:48:58.388852 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:59.268323 sshd[2814]: Invalid user azureuser from 121.132.81.3 port 49344 Sep 13 00:48:59.389214 kubelet[1639]: E0913 00:48:59.389175 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:48:59.547740 sshd[2814]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:59.554227 sshd[2814]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:48:59.558822 kernel: kauditd_printk_skb: 56 callbacks suppressed Sep 13 00:48:59.558880 kernel: audit: type=1100 audit(1757724539.554:735): pid=2814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="azureuser" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:59.554000 audit[2814]: USER_AUTH pid=2814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="azureuser" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:48:59.554260 sshd[2814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:48:59.554772 sshd[2814]: pam_faillock(sshd:auth): User unknown Sep 13 00:48:59.764571 env[1256]: time="2025-09-13T00:48:59.764528487Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:59.767010 env[1256]: time="2025-09-13T00:48:59.766987074Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:59.768350 env[1256]: time="2025-09-13T00:48:59.768328158Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:59.769808 env[1256]: time="2025-09-13T00:48:59.769782028Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:59.770545 env[1256]: time="2025-09-13T00:48:59.770523784Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 13 00:48:59.773861 env[1256]: time="2025-09-13T00:48:59.773842152Z" level=info msg="CreateContainer within sandbox \"1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 13 00:48:59.784079 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2125530558.mount: Deactivated successfully. Sep 13 00:48:59.788477 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2894328001.mount: Deactivated successfully. Sep 13 00:48:59.793906 env[1256]: time="2025-09-13T00:48:59.793879206Z" level=info msg="CreateContainer within sandbox \"1c0a6814700245e7d1de5041f2b6771f9b10d05c2ea8bc112f004a4eb919ba4d\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"78191039a966b09a7a7f14e0b624896f871819c7a7787213f3e69a624cda1d31\"" Sep 13 00:48:59.794301 env[1256]: time="2025-09-13T00:48:59.794288536Z" level=info msg="StartContainer for \"78191039a966b09a7a7f14e0b624896f871819c7a7787213f3e69a624cda1d31\"" Sep 13 00:48:59.806341 systemd[1]: Started cri-containerd-78191039a966b09a7a7f14e0b624896f871819c7a7787213f3e69a624cda1d31.scope. Sep 13 00:48:59.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.824407 kernel: audit: type=1400 audit(1757724539.817:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.824452 kernel: audit: type=1400 audit(1757724539.817:737): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.824470 kernel: audit: type=1400 audit(1757724539.817:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.829645 kernel: audit: type=1400 audit(1757724539.817:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.829702 kernel: audit: type=1400 audit(1757724539.817:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.831985 kernel: audit: type=1400 audit(1757724539.817:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.836856 kernel: audit: type=1400 audit(1757724539.817:742): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.836895 kernel: audit: type=1400 audit(1757724539.817:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.842174 kernel: audit: type=1400 audit(1757724539.817:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit: BPF prog-id=114 op=LOAD Sep 13 00:48:59.817000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[2825]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2768 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:59.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738313931303339613936366230396137613766313465306236323438 Sep 13 00:48:59.817000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[2825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2768 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:59.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738313931303339613936366230396137613766313465306236323438 Sep 13 00:48:59.817000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.817000 audit: BPF prog-id=115 op=LOAD Sep 13 00:48:59.817000 audit[2825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032ebf0 items=0 ppid=2768 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:59.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738313931303339613936366230396137613766313465306236323438 Sep 13 00:48:59.820000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.820000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.820000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.820000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.820000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.820000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.820000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.820000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.820000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.820000 audit: BPF prog-id=116 op=LOAD Sep 13 00:48:59.820000 audit[2825]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032ec38 items=0 ppid=2768 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:59.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738313931303339613936366230396137613766313465306236323438 Sep 13 00:48:59.829000 audit: BPF prog-id=116 op=UNLOAD Sep 13 00:48:59.829000 audit: BPF prog-id=115 op=UNLOAD Sep 13 00:48:59.829000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.829000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.829000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.829000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.829000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.829000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.829000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.829000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.829000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.829000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:59.829000 audit: BPF prog-id=117 op=LOAD Sep 13 00:48:59.829000 audit[2825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032f048 items=0 ppid=2768 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:59.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738313931303339613936366230396137613766313465306236323438 Sep 13 00:48:59.854804 env[1256]: time="2025-09-13T00:48:59.854772194Z" level=info msg="StartContainer for \"78191039a966b09a7a7f14e0b624896f871819c7a7787213f3e69a624cda1d31\" returns successfully" Sep 13 00:49:00.390227 kubelet[1639]: E0913 00:49:00.390159 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:01.390334 kubelet[1639]: E0913 00:49:01.390296 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:01.716388 sshd[2814]: Failed password for invalid user azureuser from 121.132.81.3 port 49344 ssh2 Sep 13 00:49:02.391077 kubelet[1639]: E0913 00:49:02.391047 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:03.391967 kubelet[1639]: E0913 00:49:03.391930 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:03.934582 sshd[2814]: Connection closed by invalid user azureuser 121.132.81.3 port 49344 [preauth] Sep 13 00:49:03.935255 systemd[1]: sshd@27-139.178.70.109:22-121.132.81.3:49344.service: Deactivated successfully. Sep 13 00:49:03.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.70.109:22-121.132.81.3:49344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:04.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.70.109:22-121.132.81.3:46434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:04.191908 systemd[1]: Started sshd@28-139.178.70.109:22-121.132.81.3:46434.service. Sep 13 00:49:04.392168 kubelet[1639]: E0913 00:49:04.392142 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:05.392999 kubelet[1639]: E0913 00:49:05.392973 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:05.778783 sshd[2876]: Invalid user admin from 121.132.81.3 port 46434 Sep 13 00:49:05.970567 sshd[2876]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:05.971116 sshd[2876]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:49:05.971149 sshd[2876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:49:05.971466 sshd[2876]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:05.970000 audit[2876]: USER_AUTH pid=2876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:06.000320 kernel: kauditd_printk_skb: 50 callbacks suppressed Sep 13 00:49:06.000381 kernel: audit: type=1100 audit(1757724545.970:756): pid=2876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:06.394478 kubelet[1639]: E0913 00:49:06.394445 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:06.544499 systemd[1]: run-containerd-runc-k8s.io-7a8113b745e23ddfd4ce3ab58e58141e3e1b14b728815478f9f28eddbbd75a1f-runc.6Wtuxa.mount: Deactivated successfully. Sep 13 00:49:07.395048 kubelet[1639]: E0913 00:49:07.395006 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:07.621542 sshd[2876]: Failed password for invalid user admin from 121.132.81.3 port 46434 ssh2 Sep 13 00:49:08.101750 sshd[2876]: Connection closed by invalid user admin 121.132.81.3 port 46434 [preauth] Sep 13 00:49:08.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.70.109:22-121.132.81.3:46434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:08.102406 systemd[1]: sshd@28-139.178.70.109:22-121.132.81.3:46434.service: Deactivated successfully. Sep 13 00:49:08.514155 kubelet[1639]: E0913 00:49:08.514033 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:08.515038 kernel: audit: type=1131 audit(1757724548.101:757): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.70.109:22-121.132.81.3:46434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:08.516883 systemd[1]: Started sshd@29-139.178.70.109:22-121.132.81.3:38716.service. Sep 13 00:49:08.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.70.109:22-121.132.81.3:38716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:08.520694 kernel: audit: type=1130 audit(1757724548.516:758): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.70.109:22-121.132.81.3:38716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:09.455501 kubelet[1639]: I0913 00:49:09.455453 1639 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-j754k" podStartSLOduration=11.229530251 podStartE2EDuration="15.455437518s" podCreationTimestamp="2025-09-13 00:48:54 +0000 UTC" firstStartedPulling="2025-09-13 00:48:55.545493877 +0000 UTC m=+40.502699857" lastFinishedPulling="2025-09-13 00:48:59.771401143 +0000 UTC m=+44.728607124" observedRunningTime="2025-09-13 00:49:00.672080006 +0000 UTC m=+45.629285998" watchObservedRunningTime="2025-09-13 00:49:09.455437518 +0000 UTC m=+54.412643506" Sep 13 00:49:09.514707 kubelet[1639]: E0913 00:49:09.514662 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:09.738408 sshd[2902]: Invalid user admin from 121.132.81.3 port 38716 Sep 13 00:49:10.006947 sshd[2902]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:10.007541 sshd[2902]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:49:10.007661 sshd[2902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:49:10.007000 audit[2902]: USER_AUTH pid=2902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:10.007986 sshd[2902]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:10.011695 kernel: audit: type=1100 audit(1757724550.007:759): pid=2902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:10.515641 kubelet[1639]: E0913 00:49:10.515616 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:11.516499 kubelet[1639]: E0913 00:49:11.516478 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:12.343200 sshd[2902]: Failed password for invalid user admin from 121.132.81.3 port 38716 ssh2 Sep 13 00:49:12.517219 kubelet[1639]: E0913 00:49:12.517193 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:13.518295 kubelet[1639]: E0913 00:49:13.518279 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:14.083409 sshd[2902]: Connection closed by invalid user admin 121.132.81.3 port 38716 [preauth] Sep 13 00:49:14.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.70.109:22-121.132.81.3:38716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:14.084402 systemd[1]: sshd@29-139.178.70.109:22-121.132.81.3:38716.service: Deactivated successfully. Sep 13 00:49:14.088695 kernel: audit: type=1131 audit(1757724554.083:760): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.70.109:22-121.132.81.3:38716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:14.519412 kubelet[1639]: E0913 00:49:14.519377 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:14.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.70.109:22-121.132.81.3:36524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:14.557998 systemd[1]: Started sshd@30-139.178.70.109:22-121.132.81.3:36524.service. Sep 13 00:49:14.562687 kernel: audit: type=1130 audit(1757724554.557:761): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.70.109:22-121.132.81.3:36524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:15.339349 kubelet[1639]: E0913 00:49:15.339312 1639 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:15.374765 sshd[2909]: Invalid user zjw from 121.132.81.3 port 36524 Sep 13 00:49:15.407811 env[1256]: time="2025-09-13T00:49:15.407783397Z" level=info msg="StopPodSandbox for \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\"" Sep 13 00:49:15.520090 kubelet[1639]: E0913 00:49:15.520068 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:15.647345 sshd[2909]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:15.647980 sshd[2909]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:49:15.648008 sshd[2909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:49:15.647000 audit[2909]: USER_AUTH pid=2909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zjw" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:15.648406 sshd[2909]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:15.652691 kernel: audit: type=1100 audit(1757724555.647:762): pid=2909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zjw" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:16.520757 kubelet[1639]: E0913 00:49:16.520732 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:17.521956 kubelet[1639]: E0913 00:49:17.521936 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:18.005818 sshd[2909]: Failed password for invalid user zjw from 121.132.81.3 port 36524 ssh2 Sep 13 00:49:18.522708 kubelet[1639]: E0913 00:49:18.522686 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:19.523382 kubelet[1639]: E0913 00:49:19.523361 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:20.218406 sshd[2909]: Connection closed by invalid user zjw 121.132.81.3 port 36524 [preauth] Sep 13 00:49:20.227684 kernel: audit: type=1131 audit(1757724560.218:763): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.70.109:22-121.132.81.3:36524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:20.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.70.109:22-121.132.81.3:36524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:20.219251 systemd[1]: sshd@30-139.178.70.109:22-121.132.81.3:36524.service: Deactivated successfully. Sep 13 00:49:20.364381 systemd[1]: Started sshd@31-139.178.70.109:22-121.132.81.3:59922.service. Sep 13 00:49:20.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.70.109:22-121.132.81.3:59922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:20.368711 kernel: audit: type=1130 audit(1757724560.363:764): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.70.109:22-121.132.81.3:59922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:20.524312 kubelet[1639]: E0913 00:49:20.524189 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:21.204125 sshd[2938]: Invalid user ubuntu from 121.132.81.3 port 59922 Sep 13 00:49:21.441658 sshd[2938]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:21.442054 sshd[2938]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:49:21.442080 sshd[2938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:49:21.442409 sshd[2938]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:21.441000 audit[2938]: USER_AUTH pid=2938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:21.447695 kernel: audit: type=1100 audit(1757724561.441:765): pid=2938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:21.525205 kubelet[1639]: E0913 00:49:21.524862 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:22.525743 kubelet[1639]: E0913 00:49:22.525701 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:23.526467 kubelet[1639]: E0913 00:49:23.526440 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:23.622240 sshd[2938]: Failed password for invalid user ubuntu from 121.132.81.3 port 59922 ssh2 Sep 13 00:49:24.106715 sshd[2938]: Connection closed by invalid user ubuntu 121.132.81.3 port 59922 [preauth] Sep 13 00:49:24.106946 systemd[1]: sshd@31-139.178.70.109:22-121.132.81.3:59922.service: Deactivated successfully. Sep 13 00:49:24.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.70.109:22-121.132.81.3:59922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:24.110707 kernel: audit: type=1131 audit(1757724564.106:766): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.70.109:22-121.132.81.3:59922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:24.527421 kubelet[1639]: E0913 00:49:24.527396 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:24.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.70.109:22-121.132.81.3:50060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:24.735757 systemd[1]: Started sshd@32-139.178.70.109:22-121.132.81.3:50060.service. Sep 13 00:49:24.739685 kernel: audit: type=1130 audit(1757724564.735:767): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.70.109:22-121.132.81.3:50060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:25.528505 kubelet[1639]: E0913 00:49:25.528485 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:26.529848 kubelet[1639]: E0913 00:49:26.529817 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:26.878390 sshd[2950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 user=root Sep 13 00:49:26.878000 audit[2950]: USER_AUTH pid=2950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:26.881697 kernel: audit: type=1100 audit(1757724566.878:768): pid=2950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:27.338213 env[1256]: 2025-09-13 00:49:23.008 [WARNING][2919] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.141-k8s-csi--node--driver--xlfxz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d4b8e069-24cf-4eee-b387-607d770984c6", ResourceVersion:"1254", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 48, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.141", ContainerID:"67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc", Pod:"csi-node-driver-xlfxz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.106.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7e0556e489e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:49:27.338213 env[1256]: 2025-09-13 00:49:23.008 [INFO][2919] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:49:27.338213 env[1256]: 2025-09-13 00:49:23.008 [INFO][2919] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" iface="eth0" netns="" Sep 13 00:49:27.338213 env[1256]: 2025-09-13 00:49:23.008 [INFO][2919] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:49:27.338213 env[1256]: 2025-09-13 00:49:23.008 [INFO][2919] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:49:27.338213 env[1256]: 2025-09-13 00:49:23.072 [INFO][2942] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" HandleID="k8s-pod-network.f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Workload="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:49:27.338213 env[1256]: 2025-09-13 00:49:23.072 [INFO][2942] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:49:27.338213 env[1256]: 2025-09-13 00:49:23.072 [INFO][2942] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:49:27.338213 env[1256]: 2025-09-13 00:49:26.419 [WARNING][2942] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" HandleID="k8s-pod-network.f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Workload="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:49:27.338213 env[1256]: 2025-09-13 00:49:26.419 [INFO][2942] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" HandleID="k8s-pod-network.f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Workload="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:49:27.338213 env[1256]: 2025-09-13 00:49:27.336 [INFO][2942] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:49:27.338213 env[1256]: 2025-09-13 00:49:27.337 [INFO][2919] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:49:27.338739 env[1256]: time="2025-09-13T00:49:27.338227545Z" level=info msg="TearDown network for sandbox \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\" successfully" Sep 13 00:49:27.338739 env[1256]: time="2025-09-13T00:49:27.338245661Z" level=info msg="StopPodSandbox for \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\" returns successfully" Sep 13 00:49:27.338739 env[1256]: time="2025-09-13T00:49:27.338599244Z" level=info msg="RemovePodSandbox for \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\"" Sep 13 00:49:27.338739 env[1256]: time="2025-09-13T00:49:27.338615003Z" level=info msg="Forcibly stopping sandbox \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\"" Sep 13 00:49:27.530163 kubelet[1639]: E0913 00:49:27.530121 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:27.639763 env[1256]: 2025-09-13 00:49:27.619 [WARNING][2961] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.141-k8s-csi--node--driver--xlfxz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d4b8e069-24cf-4eee-b387-607d770984c6", ResourceVersion:"1254", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 48, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.141", ContainerID:"67025489f0b8beb372d67b625940bee89f1e631ad082283a9ca4d31594f08edc", Pod:"csi-node-driver-xlfxz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.106.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7e0556e489e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:49:27.639763 env[1256]: 2025-09-13 00:49:27.619 [INFO][2961] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:49:27.639763 env[1256]: 2025-09-13 00:49:27.619 [INFO][2961] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" iface="eth0" netns="" Sep 13 00:49:27.639763 env[1256]: 2025-09-13 00:49:27.619 [INFO][2961] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:49:27.639763 env[1256]: 2025-09-13 00:49:27.619 [INFO][2961] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:49:27.639763 env[1256]: 2025-09-13 00:49:27.632 [INFO][2968] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" HandleID="k8s-pod-network.f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Workload="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:49:27.639763 env[1256]: 2025-09-13 00:49:27.632 [INFO][2968] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:49:27.639763 env[1256]: 2025-09-13 00:49:27.632 [INFO][2968] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:49:27.639763 env[1256]: 2025-09-13 00:49:27.636 [WARNING][2968] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" HandleID="k8s-pod-network.f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Workload="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:49:27.639763 env[1256]: 2025-09-13 00:49:27.636 [INFO][2968] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" HandleID="k8s-pod-network.f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Workload="10.67.124.141-k8s-csi--node--driver--xlfxz-eth0" Sep 13 00:49:27.639763 env[1256]: 2025-09-13 00:49:27.637 [INFO][2968] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:49:27.639763 env[1256]: 2025-09-13 00:49:27.638 [INFO][2961] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e" Sep 13 00:49:27.640200 env[1256]: time="2025-09-13T00:49:27.640177069Z" level=info msg="TearDown network for sandbox \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\" successfully" Sep 13 00:49:27.658774 env[1256]: time="2025-09-13T00:49:27.658754942Z" level=info msg="RemovePodSandbox \"f157929bc9d9f20d15a2b90237f05e6053cb2fd1eb258f3b9c0de31ef5fcb62e\" returns successfully" Sep 13 00:49:28.531291 kubelet[1639]: E0913 00:49:28.531256 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:28.743662 sshd[2950]: Failed password for root from 121.132.81.3 port 50060 ssh2 Sep 13 00:49:29.205513 sshd[2950]: Connection closed by authenticating user root 121.132.81.3 port 50060 [preauth] Sep 13 00:49:29.206455 systemd[1]: sshd@32-139.178.70.109:22-121.132.81.3:50060.service: Deactivated successfully. Sep 13 00:49:29.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.70.109:22-121.132.81.3:50060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:29.211705 kernel: audit: type=1131 audit(1757724569.205:769): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.70.109:22-121.132.81.3:50060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:29.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.70.109:22-121.132.81.3:41256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:29.380290 systemd[1]: Started sshd@33-139.178.70.109:22-121.132.81.3:41256.service. Sep 13 00:49:29.384692 kernel: audit: type=1130 audit(1757724569.379:770): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.70.109:22-121.132.81.3:41256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:29.531577 kubelet[1639]: E0913 00:49:29.531459 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:29.689000 audit[2979]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=2979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:29.689000 audit[2979]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc68d8a8b0 a2=0 a3=7ffc68d8a89c items=0 ppid=1799 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:29.696810 kernel: audit: type=1325 audit(1757724569.689:771): table=filter:71 family=2 entries=12 op=nft_register_rule pid=2979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:29.696870 kernel: audit: type=1300 audit(1757724569.689:771): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc68d8a8b0 a2=0 a3=7ffc68d8a89c items=0 ppid=1799 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:29.689000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:29.699021 kernel: audit: type=1327 audit(1757724569.689:771): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:29.701000 audit[2979]: NETFILTER_CFG table=nat:72 family=2 entries=34 op=nft_unregister_chain pid=2979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:29.701000 audit[2979]: SYSCALL arch=c000003e syscall=46 success=yes exit=6284 a0=3 a1=7ffc68d8a8b0 a2=0 a3=7ffc68d8a89c items=0 ppid=1799 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:29.707972 kernel: audit: type=1325 audit(1757724569.701:772): table=nat:72 family=2 entries=34 op=nft_unregister_chain pid=2979 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:29.708029 kernel: audit: type=1300 audit(1757724569.701:772): arch=c000003e syscall=46 success=yes exit=6284 a0=3 a1=7ffc68d8a8b0 a2=0 a3=7ffc68d8a89c items=0 ppid=1799 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:29.708046 kernel: audit: type=1327 audit(1757724569.701:772): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:29.701000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:29.740000 audit[2981]: NETFILTER_CFG table=filter:73 family=2 entries=14 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:29.740000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff18bb5820 a2=0 a3=7fff18bb580c items=0 ppid=1799 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:29.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:29.743685 kernel: audit: type=1325 audit(1757724569.740:773): table=filter:73 family=2 entries=14 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:29.748000 audit[2981]: NETFILTER_CFG table=nat:74 family=2 entries=68 op=nft_unregister_chain pid=2981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:29.748000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=17516 a0=3 a1=7fff18bb5820 a2=0 a3=7fff18bb580c items=0 ppid=1799 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:29.748000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:30.340752 sshd[2976]: Invalid user minecraft from 121.132.81.3 port 41256 Sep 13 00:49:30.532114 kubelet[1639]: E0913 00:49:30.532093 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:30.547990 sshd[2976]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:30.548343 sshd[2976]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:49:30.548375 sshd[2976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:49:30.548623 sshd[2976]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:30.548000 audit[2976]: USER_AUTH pid=2976 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="minecraft" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:30.866000 audit[2983]: NETFILTER_CFG table=filter:75 family=2 entries=18 op=nft_register_rule pid=2983 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:30.866000 audit[2983]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fff37a8e1b0 a2=0 a3=7fff37a8e19c items=0 ppid=1799 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:30.866000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:30.873000 audit[2983]: NETFILTER_CFG table=nat:76 family=2 entries=40 op=nft_unregister_chain pid=2983 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:30.873000 audit[2983]: SYSCALL arch=c000003e syscall=46 success=yes exit=3724 a0=3 a1=7fff37a8e1b0 a2=0 a3=7fff37a8e19c items=0 ppid=1799 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:30.873000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:31.532663 kubelet[1639]: E0913 00:49:31.532639 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:32.534096 kubelet[1639]: E0913 00:49:32.534063 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:32.630274 sshd[2976]: Failed password for invalid user minecraft from 121.132.81.3 port 41256 ssh2 Sep 13 00:49:33.534371 kubelet[1639]: E0913 00:49:33.534339 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:33.685542 sshd[2976]: Connection closed by invalid user minecraft 121.132.81.3 port 41256 [preauth] Sep 13 00:49:33.686257 systemd[1]: sshd@33-139.178.70.109:22-121.132.81.3:41256.service: Deactivated successfully. Sep 13 00:49:33.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.70.109:22-121.132.81.3:41256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:33.690471 kernel: kauditd_printk_skb: 12 callbacks suppressed Sep 13 00:49:33.690537 kernel: audit: type=1131 audit(1757724573.685:778): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.70.109:22-121.132.81.3:41256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:34.175365 systemd[1]: Started sshd@34-139.178.70.109:22-121.132.81.3:32790.service. Sep 13 00:49:34.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.70.109:22-121.132.81.3:32790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:34.178821 kernel: audit: type=1130 audit(1757724574.174:779): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.70.109:22-121.132.81.3:32790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:34.534930 kubelet[1639]: E0913 00:49:34.534809 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:34.976420 systemd[1]: Started sshd@35-139.178.70.109:22-194.0.234.19:52614.service. Sep 13 00:49:34.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.70.109:22-194.0.234.19:52614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:34.979679 kernel: audit: type=1130 audit(1757724574.975:780): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.70.109:22-194.0.234.19:52614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:35.286510 sshd[2986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 user=root Sep 13 00:49:35.286000 audit[2986]: USER_AUTH pid=2986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:35.290684 kernel: audit: type=1100 audit(1757724575.286:781): pid=2986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:35.339151 kubelet[1639]: E0913 00:49:35.339123 1639 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:35.535562 kubelet[1639]: E0913 00:49:35.535525 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:36.456109 sshd[2989]: Invalid user prueba from 194.0.234.19 port 52614 Sep 13 00:49:36.536385 kubelet[1639]: E0913 00:49:36.536353 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:36.543749 systemd[1]: run-containerd-runc-k8s.io-7a8113b745e23ddfd4ce3ab58e58141e3e1b14b728815478f9f28eddbbd75a1f-runc.50Yzil.mount: Deactivated successfully. Sep 13 00:49:36.680816 sshd[2989]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:36.683197 sshd[2989]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:49:36.683222 sshd[2989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.0.234.19 Sep 13 00:49:36.684076 sshd[2989]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:36.683000 audit[2989]: USER_AUTH pid=2989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="prueba" exe="/usr/sbin/sshd" hostname=194.0.234.19 addr=194.0.234.19 terminal=ssh res=failed' Sep 13 00:49:36.687705 kernel: audit: type=1100 audit(1757724576.683:782): pid=2989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="prueba" exe="/usr/sbin/sshd" hostname=194.0.234.19 addr=194.0.234.19 terminal=ssh res=failed' Sep 13 00:49:37.387420 sshd[2986]: Failed password for root from 121.132.81.3 port 32790 ssh2 Sep 13 00:49:37.537050 kubelet[1639]: E0913 00:49:37.537008 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:37.860971 sshd[2986]: Connection closed by authenticating user root 121.132.81.3 port 32790 [preauth] Sep 13 00:49:37.861584 systemd[1]: sshd@34-139.178.70.109:22-121.132.81.3:32790.service: Deactivated successfully. Sep 13 00:49:37.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.70.109:22-121.132.81.3:32790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:37.865694 kernel: audit: type=1131 audit(1757724577.861:783): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.70.109:22-121.132.81.3:32790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:38.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.70.109:22-121.132.81.3:50734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:38.035399 systemd[1]: Started sshd@36-139.178.70.109:22-121.132.81.3:50734.service. Sep 13 00:49:38.039687 kernel: audit: type=1130 audit(1757724578.034:784): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.70.109:22-121.132.81.3:50734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:38.528000 audit[3020]: NETFILTER_CFG table=filter:77 family=2 entries=21 op=nft_register_rule pid=3020 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:38.528000 audit[3020]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcf58c64b0 a2=0 a3=7ffcf58c649c items=0 ppid=1799 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:38.536735 kernel: audit: type=1325 audit(1757724578.528:785): table=filter:77 family=2 entries=21 op=nft_register_rule pid=3020 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:38.536857 kernel: audit: type=1300 audit(1757724578.528:785): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcf58c64b0 a2=0 a3=7ffcf58c649c items=0 ppid=1799 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:38.536880 kernel: audit: type=1327 audit(1757724578.528:785): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:38.528000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:38.538083 kubelet[1639]: E0913 00:49:38.538052 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:38.536000 audit[3020]: NETFILTER_CFG table=nat:78 family=2 entries=19 op=nft_register_chain pid=3020 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:38.536000 audit[3020]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffcf58c64b0 a2=0 a3=7ffcf58c649c items=0 ppid=1799 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:38.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:38.589963 sshd[2989]: Failed password for invalid user prueba from 194.0.234.19 port 52614 ssh2 Sep 13 00:49:39.024173 sshd[3017]: Invalid user cs2server from 121.132.81.3 port 50734 Sep 13 00:49:39.235506 sshd[3017]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:39.236122 sshd[3017]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:49:39.236198 sshd[3017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:49:39.236601 sshd[3017]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:39.236000 audit[3017]: USER_AUTH pid=3017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cs2server" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:39.241427 kernel: kauditd_printk_skb: 3 callbacks suppressed Sep 13 00:49:39.241503 kernel: audit: type=1100 audit(1757724579.236:787): pid=3017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cs2server" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:39.538582 kubelet[1639]: E0913 00:49:39.538517 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:40.185870 sshd[2989]: Connection closed by invalid user prueba 194.0.234.19 port 52614 [preauth] Sep 13 00:49:40.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.70.109:22-194.0.234.19:52614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:40.186723 systemd[1]: sshd@35-139.178.70.109:22-194.0.234.19:52614.service: Deactivated successfully. Sep 13 00:49:40.190676 kernel: audit: type=1131 audit(1757724580.186:788): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.70.109:22-194.0.234.19:52614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:40.539335 kubelet[1639]: E0913 00:49:40.539305 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:40.775000 audit[3023]: NETFILTER_CFG table=filter:79 family=2 entries=32 op=nft_register_rule pid=3023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:40.775000 audit[3023]: SYSCALL arch=c000003e syscall=46 success=yes exit=16408 a0=3 a1=7ffe589b12a0 a2=0 a3=7ffe589b128c items=0 ppid=1799 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:40.783066 kernel: audit: type=1325 audit(1757724580.775:789): table=filter:79 family=2 entries=32 op=nft_register_rule pid=3023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:40.783110 kernel: audit: type=1300 audit(1757724580.775:789): arch=c000003e syscall=46 success=yes exit=16408 a0=3 a1=7ffe589b12a0 a2=0 a3=7ffe589b128c items=0 ppid=1799 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:40.783133 kernel: audit: type=1327 audit(1757724580.775:789): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:40.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:40.783000 audit[3023]: NETFILTER_CFG table=nat:80 family=2 entries=14 op=nft_register_rule pid=3023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:40.787465 kernel: audit: type=1325 audit(1757724580.783:790): table=nat:80 family=2 entries=14 op=nft_register_rule pid=3023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:40.787493 kernel: audit: type=1300 audit(1757724580.783:790): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe589b12a0 a2=0 a3=0 items=0 ppid=1799 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:40.783000 audit[3023]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe589b12a0 a2=0 a3=0 items=0 ppid=1799 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:40.783000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:40.794219 kernel: audit: type=1327 audit(1757724580.783:790): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:41.150000 audit[3025]: NETFILTER_CFG table=filter:81 family=2 entries=44 op=nft_register_rule pid=3025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:41.153706 kernel: audit: type=1325 audit(1757724581.150:791): table=filter:81 family=2 entries=44 op=nft_register_rule pid=3025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:41.153825 kernel: audit: type=1300 audit(1757724581.150:791): arch=c000003e syscall=46 success=yes exit=16408 a0=3 a1=7fff393edb30 a2=0 a3=7fff393edb1c items=0 ppid=1799 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:41.150000 audit[3025]: SYSCALL arch=c000003e syscall=46 success=yes exit=16408 a0=3 a1=7fff393edb30 a2=0 a3=7fff393edb1c items=0 ppid=1799 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:41.150000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:41.157000 audit[3025]: NETFILTER_CFG table=nat:82 family=2 entries=14 op=nft_register_rule pid=3025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:41.157000 audit[3025]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff393edb30 a2=0 a3=0 items=0 ppid=1799 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:41.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:41.338320 systemd[1]: Started sshd@37-139.178.70.109:22-185.255.90.135:39338.service. Sep 13 00:49:41.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.70.109:22-185.255.90.135:39338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:41.540181 kubelet[1639]: E0913 00:49:41.540064 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:41.554090 sshd[3017]: Failed password for invalid user cs2server from 121.132.81.3 port 50734 ssh2 Sep 13 00:49:42.540440 kubelet[1639]: E0913 00:49:42.540403 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:42.628184 sshd[3027]: Invalid user system from 185.255.90.135 port 39338 Sep 13 00:49:42.630014 sshd[3027]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:42.630442 sshd[3027]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:49:42.630469 sshd[3027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.255.90.135 Sep 13 00:49:42.630832 sshd[3027]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:42.630000 audit[3027]: USER_AUTH pid=3027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="system" exe="/usr/sbin/sshd" hostname=185.255.90.135 addr=185.255.90.135 terminal=ssh res=failed' Sep 13 00:49:43.313216 sshd[3017]: Connection closed by invalid user cs2server 121.132.81.3 port 50734 [preauth] Sep 13 00:49:43.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.70.109:22-121.132.81.3:50734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:43.313972 systemd[1]: sshd@36-139.178.70.109:22-121.132.81.3:50734.service: Deactivated successfully. Sep 13 00:49:43.541290 kubelet[1639]: E0913 00:49:43.541254 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:43.685321 systemd[1]: Started sshd@38-139.178.70.109:22-121.132.81.3:44366.service. Sep 13 00:49:43.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.70.109:22-121.132.81.3:44366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:44.541902 kubelet[1639]: E0913 00:49:44.541868 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:44.691906 sshd[3027]: Failed password for invalid user system from 185.255.90.135 port 39338 ssh2 Sep 13 00:49:44.829249 sshd[3033]: Invalid user db2inst1 from 121.132.81.3 port 44366 Sep 13 00:49:45.238332 sshd[3027]: Received disconnect from 185.255.90.135 port 39338:11: Bye Bye [preauth] Sep 13 00:49:45.238453 sshd[3027]: Disconnected from invalid user system 185.255.90.135 port 39338 [preauth] Sep 13 00:49:45.239058 systemd[1]: sshd@37-139.178.70.109:22-185.255.90.135:39338.service: Deactivated successfully. Sep 13 00:49:45.239972 kernel: kauditd_printk_skb: 8 callbacks suppressed Sep 13 00:49:45.240005 kernel: audit: type=1131 audit(1757724585.238:797): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.70.109:22-185.255.90.135:39338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:45.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.70.109:22-185.255.90.135:39338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:45.243478 sshd[3033]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:45.243823 sshd[3033]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:49:45.243844 sshd[3033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:49:45.244134 sshd[3033]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:45.243000 audit[3033]: USER_AUTH pid=3033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="db2inst1" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:45.247800 kernel: audit: type=1100 audit(1757724585.243:798): pid=3033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="db2inst1" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:45.543121 kubelet[1639]: E0913 00:49:45.542737 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:46.543939 kubelet[1639]: E0913 00:49:46.543865 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:47.387897 sshd[3033]: Failed password for invalid user db2inst1 from 121.132.81.3 port 44366 ssh2 Sep 13 00:49:47.544415 kubelet[1639]: E0913 00:49:47.544388 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:48.545252 kubelet[1639]: E0913 00:49:48.545203 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:48.609010 sshd[3033]: Connection closed by invalid user db2inst1 121.132.81.3 port 44366 [preauth] Sep 13 00:49:48.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.70.109:22-121.132.81.3:44366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:48.612762 kernel: audit: type=1131 audit(1757724588.609:799): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.70.109:22-121.132.81.3:44366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:48.609585 systemd[1]: sshd@38-139.178.70.109:22-121.132.81.3:44366.service: Deactivated successfully. Sep 13 00:49:48.759051 systemd[1]: Started sshd@39-139.178.70.109:22-121.132.81.3:38592.service. Sep 13 00:49:48.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.70.109:22-121.132.81.3:38592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:48.763725 kernel: audit: type=1130 audit(1757724588.758:800): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.70.109:22-121.132.81.3:38592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:49.545745 kubelet[1639]: E0913 00:49:49.545722 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:49.679268 sshd[3038]: Invalid user hadoop from 121.132.81.3 port 38592 Sep 13 00:49:50.030726 sshd[3038]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:50.031024 sshd[3038]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:49:50.031046 sshd[3038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:49:50.031330 sshd[3038]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:50.030000 audit[3038]: USER_AUTH pid=3038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hadoop" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:50.034712 kernel: audit: type=1100 audit(1757724590.030:801): pid=3038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hadoop" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:50.546837 kubelet[1639]: E0913 00:49:50.546789 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:51.547059 kubelet[1639]: E0913 00:49:51.547013 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:52.008612 systemd[1]: Created slice kubepods-besteffort-podb6074df2_0544_454d_8439_67b6face3212.slice. Sep 13 00:49:52.038828 kubelet[1639]: I0913 00:49:52.038799 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/b6074df2-0544-454d-8439-67b6face3212-data\") pod \"nfs-server-provisioner-0\" (UID: \"b6074df2-0544-454d-8439-67b6face3212\") " pod="default/nfs-server-provisioner-0" Sep 13 00:49:52.038991 kubelet[1639]: I0913 00:49:52.038976 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gsh28\" (UniqueName: \"kubernetes.io/projected/b6074df2-0544-454d-8439-67b6face3212-kube-api-access-gsh28\") pod \"nfs-server-provisioner-0\" (UID: \"b6074df2-0544-454d-8439-67b6face3212\") " pod="default/nfs-server-provisioner-0" Sep 13 00:49:52.065280 kubelet[1639]: I0913 00:49:52.065235 1639 status_manager.go:895] "Failed to get status for pod" podUID="b6074df2-0544-454d-8439-67b6face3212" pod="default/nfs-server-provisioner-0" err="pods \"nfs-server-provisioner-0\" is forbidden: User \"system:node:10.67.124.141\" cannot get resource \"pods\" in API group \"\" in the namespace \"default\": no relationship found between node '10.67.124.141' and this object" Sep 13 00:49:52.193144 sshd[3038]: Failed password for invalid user hadoop from 121.132.81.3 port 38592 ssh2 Sep 13 00:49:52.547432 kubelet[1639]: E0913 00:49:52.547381 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:52.611397 env[1256]: time="2025-09-13T00:49:52.611368436Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:b6074df2-0544-454d-8439-67b6face3212,Namespace:default,Attempt:0,}" Sep 13 00:49:52.842811 sshd[3038]: Connection closed by invalid user hadoop 121.132.81.3 port 38592 [preauth] Sep 13 00:49:52.843490 systemd[1]: sshd@39-139.178.70.109:22-121.132.81.3:38592.service: Deactivated successfully. Sep 13 00:49:52.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.70.109:22-121.132.81.3:38592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:52.847840 kernel: audit: type=1131 audit(1757724592.842:802): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.70.109:22-121.132.81.3:38592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:52.991595 systemd[1]: Started sshd@40-139.178.70.109:22-121.132.81.3:55078.service. Sep 13 00:49:52.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.70.109:22-121.132.81.3:55078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:52.995853 kernel: audit: type=1130 audit(1757724592.991:803): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.70.109:22-121.132.81.3:55078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:53.165449 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:49:53.165548 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 13 00:49:53.166265 systemd-networkd[1063]: cali60e51b789ff: Link UP Sep 13 00:49:53.166408 systemd-networkd[1063]: cali60e51b789ff: Gained carrier Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:52.971 [INFO][3043] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.141-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default b6074df2-0544-454d-8439-67b6face3212 1475 0 2025-09-13 00:49:41 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.124.141 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.141-k8s-nfs--server--provisioner--0-" Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:52.971 [INFO][3043] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.141-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.018 [INFO][3060] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" HandleID="k8s-pod-network.1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" Workload="10.67.124.141-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.019 [INFO][3060] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" HandleID="k8s-pod-network.1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" Workload="10.67.124.141-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ccff0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.141", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-13 00:49:53.018903538 +0000 UTC"}, Hostname:"10.67.124.141", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.019 [INFO][3060] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.019 [INFO][3060] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.019 [INFO][3060] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.141' Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.089 [INFO][3060] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" host="10.67.124.141" Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.101 [INFO][3060] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.141" Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.110 [INFO][3060] ipam/ipam.go 511: Trying affinity for 192.168.106.128/26 host="10.67.124.141" Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.114 [INFO][3060] ipam/ipam.go 158: Attempting to load block cidr=192.168.106.128/26 host="10.67.124.141" Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.118 [INFO][3060] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.106.128/26 host="10.67.124.141" Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.118 [INFO][3060] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.106.128/26 handle="k8s-pod-network.1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" host="10.67.124.141" Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.122 [INFO][3060] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3 Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.138 [INFO][3060] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.106.128/26 handle="k8s-pod-network.1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" host="10.67.124.141" Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.159 [INFO][3060] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.106.131/26] block=192.168.106.128/26 handle="k8s-pod-network.1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" host="10.67.124.141" Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.159 [INFO][3060] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.106.131/26] handle="k8s-pod-network.1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" host="10.67.124.141" Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.159 [INFO][3060] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:49:53.260331 env[1256]: 2025-09-13 00:49:53.159 [INFO][3060] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.106.131/26] IPv6=[] ContainerID="1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" HandleID="k8s-pod-network.1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" Workload="10.67.124.141-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:49:53.261110 env[1256]: 2025-09-13 00:49:53.161 [INFO][3043] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.141-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.141-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"b6074df2-0544-454d-8439-67b6face3212", ResourceVersion:"1475", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 49, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.141", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.106.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:49:53.261110 env[1256]: 2025-09-13 00:49:53.161 [INFO][3043] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.106.131/32] ContainerID="1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.141-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:49:53.261110 env[1256]: 2025-09-13 00:49:53.161 [INFO][3043] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.141-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:49:53.261110 env[1256]: 2025-09-13 00:49:53.165 [INFO][3043] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.141-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:49:53.261289 env[1256]: 2025-09-13 00:49:53.167 [INFO][3043] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.141-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.141-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"b6074df2-0544-454d-8439-67b6face3212", ResourceVersion:"1475", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 49, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.141", ContainerID:"1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.106.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"32:eb:68:39:9c:28", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:49:53.261289 env[1256]: 2025-09-13 00:49:53.258 [INFO][3043] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.141-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:49:53.269797 env[1256]: time="2025-09-13T00:49:53.269739030Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:49:53.269797 env[1256]: time="2025-09-13T00:49:53.269774084Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:49:53.269973 env[1256]: time="2025-09-13T00:49:53.269942035Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:49:53.270128 env[1256]: time="2025-09-13T00:49:53.270099774Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3 pid=3082 runtime=io.containerd.runc.v2 Sep 13 00:49:53.285736 systemd[1]: Started cri-containerd-1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3.scope. Sep 13 00:49:53.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300892 kernel: audit: type=1400 audit(1757724593.295:804): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300932 kernel: audit: type=1400 audit(1757724593.295:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.304120 kernel: audit: type=1400 audit(1757724593.295:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.306842 kernel: audit: type=1400 audit(1757724593.295:807): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.309695 kernel: audit: type=1400 audit(1757724593.295:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.309866 systemd-resolved[1204]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 13 00:49:53.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.312530 kernel: audit: type=1400 audit(1757724593.295:809): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.319259 kernel: audit: type=1400 audit(1757724593.295:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.319333 kernel: audit: type=1400 audit(1757724593.295:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.297000 audit: BPF prog-id=118 op=LOAD Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3082 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:53.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165353434663339613839343564646439373166383537343266363230 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3082 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:53.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165353434663339613839343564646439373166383537343266363230 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit: BPF prog-id=119 op=LOAD Sep 13 00:49:53.300000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00026ba20 items=0 ppid=3082 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:53.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165353434663339613839343564646439373166383537343266363230 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit: BPF prog-id=120 op=LOAD Sep 13 00:49:53.300000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00026ba68 items=0 ppid=3082 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:53.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165353434663339613839343564646439373166383537343266363230 Sep 13 00:49:53.300000 audit: BPF prog-id=120 op=UNLOAD Sep 13 00:49:53.300000 audit: BPF prog-id=119 op=UNLOAD Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:53.300000 audit: BPF prog-id=121 op=LOAD Sep 13 00:49:53.300000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00026be78 items=0 ppid=3082 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:53.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165353434663339613839343564646439373166383537343266363230 Sep 13 00:49:53.339000 audit[3112]: NETFILTER_CFG table=filter:83 family=2 entries=40 op=nft_register_chain pid=3112 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:49:53.339000 audit[3112]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7fff62013d00 a2=0 a3=7fff62013cec items=0 ppid=2299 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:53.339000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:49:53.349824 env[1256]: time="2025-09-13T00:49:53.349364207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:b6074df2-0544-454d-8439-67b6face3212,Namespace:default,Attempt:0,} returns sandbox id \"1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3\"" Sep 13 00:49:53.351353 env[1256]: time="2025-09-13T00:49:53.351322710Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 13 00:49:53.548409 kubelet[1639]: E0913 00:49:53.548370 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:53.811820 sshd[3058]: Invalid user hduser from 121.132.81.3 port 55078 Sep 13 00:49:54.005237 sshd[3058]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:54.009793 sshd[3058]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:49:54.009827 sshd[3058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:49:54.010046 sshd[3058]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:54.009000 audit[3058]: USER_AUTH pid=3058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hduser" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:54.483807 systemd-networkd[1063]: cali60e51b789ff: Gained IPv6LL Sep 13 00:49:54.548676 kubelet[1639]: E0913 00:49:54.548633 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:55.339001 kubelet[1639]: E0913 00:49:55.338973 1639 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:55.478624 systemd[1]: Started sshd@41-139.178.70.109:22-23.228.85.111:33628.service. Sep 13 00:49:55.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.70.109:22-23.228.85.111:33628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:55.549150 kubelet[1639]: E0913 00:49:55.549129 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:55.951856 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3970161176.mount: Deactivated successfully. Sep 13 00:49:55.952866 sshd[3120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.228.85.111 user=root Sep 13 00:49:55.952000 audit[3120]: USER_AUTH pid=3120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=23.228.85.111 addr=23.228.85.111 terminal=ssh res=failed' Sep 13 00:49:56.387789 sshd[3058]: Failed password for invalid user hduser from 121.132.81.3 port 55078 ssh2 Sep 13 00:49:56.549973 kubelet[1639]: E0913 00:49:56.549940 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:57.364535 sshd[3058]: Connection closed by invalid user hduser 121.132.81.3 port 55078 [preauth] Sep 13 00:49:57.365361 systemd[1]: sshd@40-139.178.70.109:22-121.132.81.3:55078.service: Deactivated successfully. Sep 13 00:49:57.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.70.109:22-121.132.81.3:55078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:57.550223 kubelet[1639]: E0913 00:49:57.550192 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:57.609899 systemd[1]: Started sshd@42-139.178.70.109:22-121.132.81.3:47166.service. Sep 13 00:49:57.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.70.109:22-121.132.81.3:47166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:58.132514 sshd[3120]: Failed password for root from 23.228.85.111 port 33628 ssh2 Sep 13 00:49:58.293391 env[1256]: time="2025-09-13T00:49:58.293354605Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:49:58.326681 env[1256]: time="2025-09-13T00:49:58.326628947Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:49:58.346351 env[1256]: time="2025-09-13T00:49:58.346300022Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:49:58.366760 env[1256]: time="2025-09-13T00:49:58.366723873Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:49:58.367216 env[1256]: time="2025-09-13T00:49:58.367190471Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Sep 13 00:49:58.461859 env[1256]: time="2025-09-13T00:49:58.461830562Z" level=info msg="CreateContainer within sandbox \"1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 13 00:49:58.542410 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2505743150.mount: Deactivated successfully. Sep 13 00:49:58.550568 kubelet[1639]: E0913 00:49:58.550538 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:49:58.594797 env[1256]: time="2025-09-13T00:49:58.594757120Z" level=info msg="CreateContainer within sandbox \"1e544f39a8945ddd971f85742f620c0a159e0807deae165a05b31b2068acafe3\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"17a68df657795b941192368facab33680063a5889a3b85b379fe4bb5f697c924\"" Sep 13 00:49:58.595246 env[1256]: time="2025-09-13T00:49:58.595233209Z" level=info msg="StartContainer for \"17a68df657795b941192368facab33680063a5889a3b85b379fe4bb5f697c924\"" Sep 13 00:49:58.624738 systemd[1]: Started cri-containerd-17a68df657795b941192368facab33680063a5889a3b85b379fe4bb5f697c924.scope. Sep 13 00:49:58.641687 kernel: kauditd_printk_skb: 57 callbacks suppressed Sep 13 00:49:58.641762 kernel: audit: type=1400 audit(1757724598.637:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.641786 kernel: audit: type=1400 audit(1757724598.637:829): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.646699 kernel: audit: type=1400 audit(1757724598.637:830): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.650686 kernel: audit: type=1400 audit(1757724598.637:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.650746 sshd[3130]: Invalid user john from 121.132.81.3 port 47166 Sep 13 00:49:58.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.653709 kernel: audit: type=1400 audit(1757724598.637:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.660390 kernel: audit: type=1400 audit(1757724598.637:833): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.660456 kernel: audit: type=1400 audit(1757724598.637:834): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.660476 kernel: audit: type=1400 audit(1757724598.637:835): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.665238 kernel: audit: type=1400 audit(1757724598.637:836): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.667887 kernel: audit: type=1400 audit(1757724598.640:837): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.640000 audit: BPF prog-id=122 op=LOAD Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3082 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:58.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613638646636353737393562393431313932333638666163616233 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3082 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:58.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613638646636353737393562393431313932333638666163616233 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit: BPF prog-id=123 op=LOAD Sep 13 00:49:58.642000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003e6c00 items=0 ppid=3082 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:58.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613638646636353737393562393431313932333638666163616233 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.642000 audit: BPF prog-id=124 op=LOAD Sep 13 00:49:58.642000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003e6c48 items=0 ppid=3082 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:58.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613638646636353737393562393431313932333638666163616233 Sep 13 00:49:58.643000 audit: BPF prog-id=124 op=UNLOAD Sep 13 00:49:58.643000 audit: BPF prog-id=123 op=UNLOAD Sep 13 00:49:58.643000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.643000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.643000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.643000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.643000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.643000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.643000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.643000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.643000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.643000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:58.643000 audit: BPF prog-id=125 op=LOAD Sep 13 00:49:58.643000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003e7058 items=0 ppid=3082 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:58.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613638646636353737393562393431313932333638666163616233 Sep 13 00:49:58.683890 env[1256]: time="2025-09-13T00:49:58.683857274Z" level=info msg="StartContainer for \"17a68df657795b941192368facab33680063a5889a3b85b379fe4bb5f697c924\" returns successfully" Sep 13 00:49:58.702000 audit[3170]: AVC avc: denied { search } for pid=3170 comm="rpcbind" name="crypto" dev="proc" ino=36162 scontext=system_u:system_r:svirt_lxc_net_t:s0:c102,c663 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:49:58.702000 audit[3170]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f726f5300c0 a2=0 a3=0 items=0 ppid=3152 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c102,c663 key=(null) Sep 13 00:49:58.702000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 13 00:49:58.789000 audit[3175]: AVC avc: denied { search } for pid=3175 comm="dbus-daemon" name="crypto" dev="proc" ino=36162 scontext=system_u:system_r:svirt_lxc_net_t:s0:c102,c663 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:49:58.789000 audit[3175]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fd77860a0c0 a2=0 a3=0 items=0 ppid=3152 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c102,c663 key=(null) Sep 13 00:49:58.789000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:49:58.792000 audit[3176]: AVC avc: denied { watch } for pid=3176 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=532849 scontext=system_u:system_r:svirt_lxc_net_t:s0:c102,c663 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c102,c663 tclass=dir permissive=0 Sep 13 00:49:58.792000 audit[3176]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=564969f35ca0 a2=2c8 a3=7ffeb3a568bc items=0 ppid=3152 pid=3176 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c102,c663 key=(null) Sep 13 00:49:58.792000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:49:58.818000 audit[3177]: AVC avc: denied { read } for pid=3177 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=36193 scontext=system_u:system_r:svirt_lxc_net_t:s0:c102,c663 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 13 00:49:58.818000 audit[3177]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f2d55895320 a1=80000 a2=d a3=7ffd0f7d1aa0 items=0 ppid=3152 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c102,c663 key=(null) Sep 13 00:49:58.818000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:49:58.818000 audit[3177]: AVC avc: denied { search } for pid=3177 comm="ganesha.nfsd" name="crypto" dev="proc" ino=36162 scontext=system_u:system_r:svirt_lxc_net_t:s0:c102,c663 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:49:58.818000 audit[3177]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2d54de90c0 a2=0 a3=0 items=0 ppid=3152 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c102,c663 key=(null) Sep 13 00:49:58.818000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:49:58.867655 sshd[3130]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:58.873939 sshd[3130]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:49:58.873969 sshd[3130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:49:58.874190 sshd[3130]: pam_faillock(sshd:auth): User unknown Sep 13 00:49:58.873000 audit[3130]: USER_AUTH pid=3130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="john" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:49:59.551391 kubelet[1639]: E0913 00:49:59.551364 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:00.002000 audit[3195]: NETFILTER_CFG table=filter:84 family=2 entries=32 op=nft_register_rule pid=3195 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:50:00.002000 audit[3195]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd313ca680 a2=0 a3=7ffd313ca66c items=0 ppid=1799 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:00.002000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:50:00.012000 audit[3195]: NETFILTER_CFG table=nat:85 family=2 entries=98 op=nft_register_chain pid=3195 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:50:00.012000 audit[3195]: SYSCALL arch=c000003e syscall=46 success=yes exit=46380 a0=3 a1=7ffd313ca680 a2=0 a3=7ffd313ca66c items=0 ppid=1799 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:00.012000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:50:00.486991 sshd[3120]: Received disconnect from 23.228.85.111 port 33628:11: Bye Bye [preauth] Sep 13 00:50:00.486991 sshd[3120]: Disconnected from authenticating user root 23.228.85.111 port 33628 [preauth] Sep 13 00:50:00.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.70.109:22-23.228.85.111:33628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:00.487883 systemd[1]: sshd@41-139.178.70.109:22-23.228.85.111:33628.service: Deactivated successfully. Sep 13 00:50:00.551992 kubelet[1639]: E0913 00:50:00.551968 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:01.467296 sshd[3130]: Failed password for invalid user john from 121.132.81.3 port 47166 ssh2 Sep 13 00:50:01.552983 kubelet[1639]: E0913 00:50:01.552944 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:02.553431 kubelet[1639]: E0913 00:50:02.553404 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:02.796735 sshd[3130]: Connection closed by invalid user john 121.132.81.3 port 47166 [preauth] Sep 13 00:50:02.797643 systemd[1]: sshd@42-139.178.70.109:22-121.132.81.3:47166.service: Deactivated successfully. Sep 13 00:50:02.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.70.109:22-121.132.81.3:47166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:02.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.70.109:22-121.132.81.3:41814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:02.924430 systemd[1]: Started sshd@43-139.178.70.109:22-121.132.81.3:41814.service. Sep 13 00:50:03.553910 kubelet[1639]: E0913 00:50:03.553887 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:03.781906 sshd[3199]: Invalid user nagios from 121.132.81.3 port 41814 Sep 13 00:50:04.059946 sshd[3199]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:04.060600 sshd[3199]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:50:04.060694 sshd[3199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:50:04.061170 sshd[3199]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:04.060000 audit[3199]: USER_AUTH pid=3199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nagios" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:04.062188 kernel: kauditd_printk_skb: 72 callbacks suppressed Sep 13 00:50:04.062244 kernel: audit: type=1100 audit(1757724604.060:857): pid=3199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nagios" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:04.555312 kubelet[1639]: E0913 00:50:04.555272 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:05.556274 kubelet[1639]: E0913 00:50:05.556242 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:06.141990 sshd[3199]: Failed password for invalid user nagios from 121.132.81.3 port 41814 ssh2 Sep 13 00:50:06.556510 kubelet[1639]: E0913 00:50:06.556482 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:07.556958 kubelet[1639]: E0913 00:50:07.556921 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:07.824596 sshd[3199]: Connection closed by invalid user nagios 121.132.81.3 port 41814 [preauth] Sep 13 00:50:07.824816 systemd[1]: sshd@43-139.178.70.109:22-121.132.81.3:41814.service: Deactivated successfully. Sep 13 00:50:07.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.70.109:22-121.132.81.3:41814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:07.828683 kernel: audit: type=1131 audit(1757724607.824:858): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.70.109:22-121.132.81.3:41814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:07.957873 systemd[1]: Started sshd@44-139.178.70.109:22-121.132.81.3:34826.service. Sep 13 00:50:07.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.70.109:22-121.132.81.3:34826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:07.961681 kernel: audit: type=1130 audit(1757724607.957:859): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.70.109:22-121.132.81.3:34826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:08.557653 kubelet[1639]: E0913 00:50:08.557616 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:08.635937 kubelet[1639]: I0913 00:50:08.635896 1639 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=22.618661911 podStartE2EDuration="27.635883248s" podCreationTimestamp="2025-09-13 00:49:41 +0000 UTC" firstStartedPulling="2025-09-13 00:49:53.350935153 +0000 UTC m=+98.308141132" lastFinishedPulling="2025-09-13 00:49:58.368156488 +0000 UTC m=+103.325362469" observedRunningTime="2025-09-13 00:49:59.733205205 +0000 UTC m=+104.690411185" watchObservedRunningTime="2025-09-13 00:50:08.635883248 +0000 UTC m=+113.593089230" Sep 13 00:50:08.640223 systemd[1]: Created slice kubepods-besteffort-pod66bf282f_2fbe_4a88_92c4_8ef6c1ad6af1.slice. Sep 13 00:50:08.731075 kubelet[1639]: I0913 00:50:08.731017 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zzlhz\" (UniqueName: \"kubernetes.io/projected/66bf282f-2fbe-4a88-92c4-8ef6c1ad6af1-kube-api-access-zzlhz\") pod \"test-pod-1\" (UID: \"66bf282f-2fbe-4a88-92c4-8ef6c1ad6af1\") " pod="default/test-pod-1" Sep 13 00:50:08.731256 kubelet[1639]: I0913 00:50:08.731239 1639 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-0eba3b71-84a8-43d1-ba57-cd9a800bfff5\" (UniqueName: \"kubernetes.io/nfs/66bf282f-2fbe-4a88-92c4-8ef6c1ad6af1-pvc-0eba3b71-84a8-43d1-ba57-cd9a800bfff5\") pod \"test-pod-1\" (UID: \"66bf282f-2fbe-4a88-92c4-8ef6c1ad6af1\") " pod="default/test-pod-1" Sep 13 00:50:08.853000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.856687 kernel: Failed to create system directory netfs Sep 13 00:50:08.856760 kernel: audit: type=1400 audit(1757724608.853:860): avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.859820 kernel: Failed to create system directory netfs Sep 13 00:50:08.859847 kernel: audit: type=1400 audit(1757724608.853:860): avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.853000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.863062 kernel: Failed to create system directory netfs Sep 13 00:50:08.863091 kernel: audit: type=1400 audit(1757724608.853:860): avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.853000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.866291 kernel: Failed to create system directory netfs Sep 13 00:50:08.866318 kernel: audit: type=1400 audit(1757724608.853:860): avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.853000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.853000 audit[3237]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5576b09d75e0 a1=153bc a2=55769b3982b0 a3=5 items=0 ppid=2031 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:08.853000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:50:08.876279 kernel: audit: type=1300 audit(1757724608.853:860): arch=c000003e syscall=175 success=yes exit=0 a0=5576b09d75e0 a1=153bc a2=55769b3982b0 a3=5 items=0 ppid=2031 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:08.876321 kernel: audit: type=1327 audit(1757724608.853:860): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.882467 kernel: Failed to create system directory fscache Sep 13 00:50:08.882506 kernel: audit: type=1400 audit(1757724608.876:861): avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.882525 kernel: Failed to create system directory fscache Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.883680 kernel: Failed to create system directory fscache Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.884957 kernel: Failed to create system directory fscache Sep 13 00:50:08.884985 kernel: Failed to create system directory fscache Sep 13 00:50:08.885000 kernel: Failed to create system directory fscache Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.886180 kernel: Failed to create system directory fscache Sep 13 00:50:08.886209 kernel: Failed to create system directory fscache Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.888029 kernel: Failed to create system directory fscache Sep 13 00:50:08.888056 kernel: Failed to create system directory fscache Sep 13 00:50:08.888070 kernel: Failed to create system directory fscache Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.889253 kernel: Failed to create system directory fscache Sep 13 00:50:08.889277 kernel: Failed to create system directory fscache Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.876000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.890680 kernel: Failed to create system directory fscache Sep 13 00:50:08.891680 kernel: FS-Cache: Loaded Sep 13 00:50:08.876000 audit[3237]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5576b0bec9c0 a1=4c0fc a2=55769b3982b0 a3=5 items=0 ppid=2031 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:08.876000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.917226 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.917262 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.917278 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.917291 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.919037 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.919068 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.919082 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.919680 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.920884 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.920910 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.922087 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.922114 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.923898 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.923925 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.923940 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.925106 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.925131 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.926914 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.926941 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.926956 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.928114 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.928142 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.929927 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.929954 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.929968 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.931125 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.931148 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.932947 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.932982 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.932998 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.934208 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.934238 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.936029 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.936057 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.936072 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.937228 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.937254 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.939047 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.939073 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.939093 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.940250 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.940276 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.942069 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.942097 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.942110 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.942682 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.943877 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.943905 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.945083 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.945113 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.946888 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.946916 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.946931 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.948086 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.948114 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.948772 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.949889 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.949915 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.951089 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.951117 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.952897 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.952920 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.952933 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.954104 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.954133 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.955916 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.955942 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.955957 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.957116 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.957140 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.958925 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.958951 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.958965 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.960129 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.960156 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.961935 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.961962 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.961980 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.963137 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.963159 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.964940 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.964966 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.964979 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.966146 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.966173 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.967950 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.967978 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.967992 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.969152 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.969178 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.970960 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.970982 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.971002 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.972159 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.972187 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.973962 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.973988 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.974000 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.975184 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.975212 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.977017 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.977041 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.977056 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.978229 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.978262 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.980036 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.980064 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.980082 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.981237 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.981267 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.983038 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.983072 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.983088 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.984236 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.984265 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.986053 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.986080 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.986097 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.987416 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.987447 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.989180 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.989212 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.989224 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.990967 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.990999 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.991014 kernel: Failed to create system directory sunrpc Sep 13 00:50:08.906000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:08.997805 kernel: RPC: Registered named UNIX socket transport module. Sep 13 00:50:08.997833 kernel: RPC: Registered udp transport module. Sep 13 00:50:08.997849 kernel: RPC: Registered tcp transport module. Sep 13 00:50:08.999134 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 13 00:50:08.906000 audit[3237]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5576b0c38ad0 a1=1a8274 a2=55769b3982b0 a3=5 items=6 ppid=2031 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:08.906000 audit: CWD cwd="/" Sep 13 00:50:08.906000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:08.906000 audit: PATH item=1 name=(null) inode=36444 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:08.906000 audit: PATH item=2 name=(null) inode=36444 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:08.906000 audit: PATH item=3 name=(null) inode=36445 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:08.906000 audit: PATH item=4 name=(null) inode=36444 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:08.906000 audit: PATH item=5 name=(null) inode=36446 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:50:08.906000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.028934 kernel: Failed to create system directory nfs Sep 13 00:50:09.028966 kernel: Failed to create system directory nfs Sep 13 00:50:09.028980 kernel: Failed to create system directory nfs Sep 13 00:50:09.028999 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.030095 kernel: Failed to create system directory nfs Sep 13 00:50:09.030120 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.031242 kernel: Failed to create system directory nfs Sep 13 00:50:09.031266 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.032980 kernel: Failed to create system directory nfs Sep 13 00:50:09.033005 kernel: Failed to create system directory nfs Sep 13 00:50:09.033017 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.034123 kernel: Failed to create system directory nfs Sep 13 00:50:09.034147 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.034697 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.035845 kernel: Failed to create system directory nfs Sep 13 00:50:09.035865 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.036993 kernel: Failed to create system directory nfs Sep 13 00:50:09.037014 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.038132 kernel: Failed to create system directory nfs Sep 13 00:50:09.038152 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.039847 kernel: Failed to create system directory nfs Sep 13 00:50:09.039872 kernel: Failed to create system directory nfs Sep 13 00:50:09.039892 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.040989 kernel: Failed to create system directory nfs Sep 13 00:50:09.041014 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.042127 kernel: Failed to create system directory nfs Sep 13 00:50:09.042151 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.042708 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.043853 kernel: Failed to create system directory nfs Sep 13 00:50:09.043877 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.044998 kernel: Failed to create system directory nfs Sep 13 00:50:09.045019 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.046144 kernel: Failed to create system directory nfs Sep 13 00:50:09.046165 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.047865 kernel: Failed to create system directory nfs Sep 13 00:50:09.047890 kernel: Failed to create system directory nfs Sep 13 00:50:09.047905 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.049047 kernel: Failed to create system directory nfs Sep 13 00:50:09.049071 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.050190 kernel: Failed to create system directory nfs Sep 13 00:50:09.050216 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.050767 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.051917 kernel: Failed to create system directory nfs Sep 13 00:50:09.051942 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.053062 kernel: Failed to create system directory nfs Sep 13 00:50:09.053087 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.054207 kernel: Failed to create system directory nfs Sep 13 00:50:09.054235 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.054793 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.055926 kernel: Failed to create system directory nfs Sep 13 00:50:09.055950 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.057081 kernel: Failed to create system directory nfs Sep 13 00:50:09.057140 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.058230 kernel: Failed to create system directory nfs Sep 13 00:50:09.058250 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.059910 kernel: Failed to create system directory nfs Sep 13 00:50:09.059936 kernel: Failed to create system directory nfs Sep 13 00:50:09.059950 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.061067 kernel: Failed to create system directory nfs Sep 13 00:50:09.061096 kernel: Failed to create system directory nfs Sep 13 00:50:09.020000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.075684 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 13 00:50:09.075723 kernel: kauditd_printk_skb: 210 callbacks suppressed Sep 13 00:50:09.075741 kernel: audit: type=1300 audit(1757724609.020:863): arch=c000003e syscall=175 success=yes exit=0 a0=5576b0e59c10 a1=16eb2c a2=55769b3982b0 a3=5 items=0 ppid=2031 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:09.020000 audit[3237]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5576b0e59c10 a1=16eb2c a2=55769b3982b0 a3=5 items=0 ppid=2031 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:09.020000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:50:09.080101 kernel: audit: type=1327 audit(1757724609.020:863): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.107737 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.107757 kernel: audit: type=1400 audit(1757724609.097:864): avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.111003 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.113694 kernel: audit: type=1400 audit(1757724609.097:864): avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.117566 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.117597 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.117609 kernel: audit: type=1400 audit(1757724609.097:864): avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.117623 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.120792 kernel: audit: type=1400 audit(1757724609.097:864): avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.120813 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.123984 kernel: audit: type=1400 audit(1757724609.097:864): avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.124004 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.127182 kernel: audit: type=1400 audit(1757724609.097:864): avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.127205 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.130379 kernel: audit: type=1400 audit(1757724609.097:864): avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.130402 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.133594 kernel: audit: type=1400 audit(1757724609.097:864): avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.133621 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.134866 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.134896 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.136041 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.136678 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.136696 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.137930 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.139166 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.139184 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.139203 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.140992 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.141014 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.141029 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.142217 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.142850 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.144105 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.144127 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.144731 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.145934 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.145952 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.145970 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.147151 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.147774 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.149002 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.149024 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.150223 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.150243 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.150259 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.152054 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.152072 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.152091 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.153893 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.153916 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.155122 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.155146 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.155161 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.156940 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.156959 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.158161 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.158183 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.158795 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.159998 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.160017 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.161214 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.161236 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.161840 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.163071 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.163093 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.163108 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.164897 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.164919 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.164937 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.166103 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.166713 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.167913 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.167930 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.169146 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.169168 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.169186 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.171111 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.171130 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.171735 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.173032 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.173051 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.173855 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.173878 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.174961 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.175097 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.176223 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.176461 sshd[3232]: Invalid user z from 121.132.81.3 port 34826 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.176988 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.177898 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.178064 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.179226 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.179334 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.181155 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.181179 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.181257 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.183164 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.183189 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.183206 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.184995 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.185019 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.185035 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.186217 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.097000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.186837 kernel: Failed to create system directory nfs4 Sep 13 00:50:09.275839 kernel: NFS: Registering the id_resolver key type Sep 13 00:50:09.275945 kernel: Key type id_resolver registered Sep 13 00:50:09.275962 kernel: Key type id_legacy registered Sep 13 00:50:09.097000 audit[3242]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f828671b010 a1=2095c4 a2=55b951f3a2b0 a3=5 items=0 ppid=2031 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:09.097000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.288268 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.288301 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.288991 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.289696 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.290979 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.291000 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.291697 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.292998 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.293025 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.293685 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.294993 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.295014 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.295701 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.296982 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.297007 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.297695 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.298974 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.299038 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.299702 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.301023 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.301044 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.301709 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.303049 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.303076 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.303735 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.284000 audit[3243]: AVC avc: denied { confidentiality } for pid=3243 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:50:09.304688 kernel: Failed to create system directory rpcgss Sep 13 00:50:09.284000 audit[3243]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe655760010 a1=70bf4 a2=5623ca8292b0 a3=5 items=0 ppid=2031 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:09.284000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 13 00:50:09.321995 nfsidmap[3253]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Sep 13 00:50:09.323138 nfsidmap[3254]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Sep 13 00:50:09.331000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:50:09.331000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:50:09.331000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:50:09.331000 audit[1364]: AVC avc: denied { watch_reads } for pid=1364 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:50:09.331000 audit[1364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a4f43ddd50 a2=10 a3=6bd3878955b94bc6 items=0 ppid=1 pid=1364 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:09.331000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:50:09.331000 audit[1364]: AVC avc: denied { watch_reads } for pid=1364 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:50:09.331000 audit[1364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a4f43ddd50 a2=10 a3=6bd3878955b94bc6 items=0 ppid=1 pid=1364 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:09.331000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:50:09.331000 audit[1364]: AVC avc: denied { watch_reads } for pid=1364 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:50:09.331000 audit[1364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a4f43ddd50 a2=10 a3=6bd3878955b94bc6 items=0 ppid=1 pid=1364 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:09.331000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:50:09.475885 sshd[3232]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:09.476632 sshd[3232]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:50:09.476655 sshd[3232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:50:09.476914 sshd[3232]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:09.476000 audit[3232]: USER_AUTH pid=3232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="z" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:09.542206 env[1256]: time="2025-09-13T00:50:09.542155195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:66bf282f-2fbe-4a88-92c4-8ef6c1ad6af1,Namespace:default,Attempt:0,}" Sep 13 00:50:09.559170 kubelet[1639]: E0913 00:50:09.559139 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:09.777207 systemd-networkd[1063]: cali5ec59c6bf6e: Link UP Sep 13 00:50:09.779192 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:50:09.779497 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 13 00:50:09.779341 systemd-networkd[1063]: cali5ec59c6bf6e: Gained carrier Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.612 [INFO][3256] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.141-k8s-test--pod--1-eth0 default 66bf282f-2fbe-4a88-92c4-8ef6c1ad6af1 1529 0 2025-09-13 00:50:07 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.141 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.141-k8s-test--pod--1-" Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.613 [INFO][3256] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.141-k8s-test--pod--1-eth0" Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.639 [INFO][3267] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" HandleID="k8s-pod-network.2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" Workload="10.67.124.141-k8s-test--pod--1-eth0" Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.639 [INFO][3267] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" HandleID="k8s-pod-network.2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" Workload="10.67.124.141-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5020), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.141", "pod":"test-pod-1", "timestamp":"2025-09-13 00:50:09.639513862 +0000 UTC"}, Hostname:"10.67.124.141", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.639 [INFO][3267] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.639 [INFO][3267] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.639 [INFO][3267] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.141' Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.666 [INFO][3267] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" host="10.67.124.141" Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.673 [INFO][3267] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.124.141" Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.675 [INFO][3267] ipam/ipam.go 511: Trying affinity for 192.168.106.128/26 host="10.67.124.141" Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.675 [INFO][3267] ipam/ipam.go 158: Attempting to load block cidr=192.168.106.128/26 host="10.67.124.141" Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.677 [INFO][3267] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.106.128/26 host="10.67.124.141" Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.677 [INFO][3267] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.106.128/26 handle="k8s-pod-network.2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" host="10.67.124.141" Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.679 [INFO][3267] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14 Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.737 [INFO][3267] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.106.128/26 handle="k8s-pod-network.2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" host="10.67.124.141" Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.772 [INFO][3267] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.106.132/26] block=192.168.106.128/26 handle="k8s-pod-network.2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" host="10.67.124.141" Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.772 [INFO][3267] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.106.132/26] handle="k8s-pod-network.2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" host="10.67.124.141" Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.772 [INFO][3267] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.772 [INFO][3267] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.106.132/26] IPv6=[] ContainerID="2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" HandleID="k8s-pod-network.2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" Workload="10.67.124.141-k8s-test--pod--1-eth0" Sep 13 00:50:09.810416 env[1256]: 2025-09-13 00:50:09.775 [INFO][3256] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.141-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.141-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"66bf282f-2fbe-4a88-92c4-8ef6c1ad6af1", ResourceVersion:"1529", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 50, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.141", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.106.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:50:09.811124 env[1256]: 2025-09-13 00:50:09.775 [INFO][3256] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.106.132/32] ContainerID="2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.141-k8s-test--pod--1-eth0" Sep 13 00:50:09.811124 env[1256]: 2025-09-13 00:50:09.775 [INFO][3256] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.141-k8s-test--pod--1-eth0" Sep 13 00:50:09.811124 env[1256]: 2025-09-13 00:50:09.779 [INFO][3256] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.141-k8s-test--pod--1-eth0" Sep 13 00:50:09.811124 env[1256]: 2025-09-13 00:50:09.780 [INFO][3256] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.141-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.141-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"66bf282f-2fbe-4a88-92c4-8ef6c1ad6af1", ResourceVersion:"1529", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 50, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.141", ContainerID:"2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.106.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"5a:c6:5e:e1:0f:c0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:50:09.811124 env[1256]: 2025-09-13 00:50:09.809 [INFO][3256] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.141-k8s-test--pod--1-eth0" Sep 13 00:50:09.816262 env[1256]: time="2025-09-13T00:50:09.816220095Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:50:09.816262 env[1256]: time="2025-09-13T00:50:09.816244088Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:50:09.816391 env[1256]: time="2025-09-13T00:50:09.816367608Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:50:09.816544 env[1256]: time="2025-09-13T00:50:09.816521090Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14 pid=3288 runtime=io.containerd.runc.v2 Sep 13 00:50:09.826495 systemd[1]: Started cri-containerd-2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14.scope. Sep 13 00:50:09.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.835000 audit: BPF prog-id=126 op=LOAD Sep 13 00:50:09.836000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.836000 audit[3296]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3288 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:09.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366531356465393432363161373639376261393435356661626262 Sep 13 00:50:09.836000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.836000 audit[3296]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3288 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:09.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366531356465393432363161373639376261393435356661626262 Sep 13 00:50:09.836000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.836000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.836000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.836000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.836000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.836000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.836000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.836000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.836000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.836000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.836000 audit: BPF prog-id=127 op=LOAD Sep 13 00:50:09.836000 audit[3296]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003f4a30 items=0 ppid=3288 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:09.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366531356465393432363161373639376261393435356661626262 Sep 13 00:50:09.837000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.837000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.837000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.837000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.837000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.837000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.837000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.837000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.837000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.837000 audit: BPF prog-id=128 op=LOAD Sep 13 00:50:09.837000 audit[3296]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003f4a78 items=0 ppid=3288 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:09.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366531356465393432363161373639376261393435356661626262 Sep 13 00:50:09.837000 audit: BPF prog-id=128 op=UNLOAD Sep 13 00:50:09.838000 audit: BPF prog-id=127 op=UNLOAD Sep 13 00:50:09.838000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.838000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.838000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.838000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.838000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.838000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.838000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.838000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.838000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.838000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:09.838000 audit: BPF prog-id=129 op=LOAD Sep 13 00:50:09.838000 audit[3296]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003f4e88 items=0 ppid=3288 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:09.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366531356465393432363161373639376261393435356661626262 Sep 13 00:50:09.839686 systemd-resolved[1204]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Sep 13 00:50:09.853000 audit[3315]: NETFILTER_CFG table=filter:86 family=2 entries=40 op=nft_register_chain pid=3315 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:50:09.853000 audit[3315]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffce06a7110 a2=0 a3=7ffce06a70fc items=0 ppid=2299 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:09.853000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:50:09.864498 env[1256]: time="2025-09-13T00:50:09.864468459Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:66bf282f-2fbe-4a88-92c4-8ef6c1ad6af1,Namespace:default,Attempt:0,} returns sandbox id \"2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14\"" Sep 13 00:50:09.865310 env[1256]: time="2025-09-13T00:50:09.865211751Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:50:10.232955 env[1256]: time="2025-09-13T00:50:10.232928621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:50:10.233765 env[1256]: time="2025-09-13T00:50:10.233751825Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:50:10.235029 env[1256]: time="2025-09-13T00:50:10.235011661Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:50:10.236339 env[1256]: time="2025-09-13T00:50:10.236326958Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:50:10.236807 env[1256]: time="2025-09-13T00:50:10.236535416Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 13 00:50:10.239003 env[1256]: time="2025-09-13T00:50:10.238984806Z" level=info msg="CreateContainer within sandbox \"2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 13 00:50:10.245019 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2514515553.mount: Deactivated successfully. Sep 13 00:50:10.248741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2669294062.mount: Deactivated successfully. Sep 13 00:50:10.250804 env[1256]: time="2025-09-13T00:50:10.250781566Z" level=info msg="CreateContainer within sandbox \"2a6e15de94261a7697ba9455fabbb6831df55ade90e38303b31be77a8e3f2c14\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"6a90f74d5b37dff2581e42032d3832aceee5f1990d65ac7264ddd83fa7665d65\"" Sep 13 00:50:10.251204 env[1256]: time="2025-09-13T00:50:10.251192476Z" level=info msg="StartContainer for \"6a90f74d5b37dff2581e42032d3832aceee5f1990d65ac7264ddd83fa7665d65\"" Sep 13 00:50:10.265220 systemd[1]: Started cri-containerd-6a90f74d5b37dff2581e42032d3832aceee5f1990d65ac7264ddd83fa7665d65.scope. Sep 13 00:50:10.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.274000 audit: BPF prog-id=130 op=LOAD Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3288 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:10.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661393066373464356233376466663235383165343230333264333833 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3288 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:10.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661393066373464356233376466663235383165343230333264333833 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit: BPF prog-id=131 op=LOAD Sep 13 00:50:10.275000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000280b30 items=0 ppid=3288 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:10.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661393066373464356233376466663235383165343230333264333833 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.275000 audit: BPF prog-id=132 op=LOAD Sep 13 00:50:10.275000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000280b78 items=0 ppid=3288 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:10.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661393066373464356233376466663235383165343230333264333833 Sep 13 00:50:10.276000 audit: BPF prog-id=132 op=UNLOAD Sep 13 00:50:10.276000 audit: BPF prog-id=131 op=UNLOAD Sep 13 00:50:10.276000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.276000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.276000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.276000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.276000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.276000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.276000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.276000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.276000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.276000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:50:10.276000 audit: BPF prog-id=133 op=LOAD Sep 13 00:50:10.276000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000280f88 items=0 ppid=3288 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:10.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661393066373464356233376466663235383165343230333264333833 Sep 13 00:50:10.293564 env[1256]: time="2025-09-13T00:50:10.293539251Z" level=info msg="StartContainer for \"6a90f74d5b37dff2581e42032d3832aceee5f1990d65ac7264ddd83fa7665d65\" returns successfully" Sep 13 00:50:10.559652 kubelet[1639]: E0913 00:50:10.559570 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:10.733326 kubelet[1639]: I0913 00:50:10.733095 1639 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=3.360728797 podStartE2EDuration="3.73308302s" podCreationTimestamp="2025-09-13 00:50:07 +0000 UTC" firstStartedPulling="2025-09-13 00:50:09.865061293 +0000 UTC m=+114.822267272" lastFinishedPulling="2025-09-13 00:50:10.237415518 +0000 UTC m=+115.194621495" observedRunningTime="2025-09-13 00:50:10.732364036 +0000 UTC m=+115.689570019" watchObservedRunningTime="2025-09-13 00:50:10.73308302 +0000 UTC m=+115.690289003" Sep 13 00:50:10.996169 systemd-networkd[1063]: cali5ec59c6bf6e: Gained IPv6LL Sep 13 00:50:11.560532 kubelet[1639]: E0913 00:50:11.560502 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:11.914600 sshd[3232]: Failed password for invalid user z from 121.132.81.3 port 34826 ssh2 Sep 13 00:50:12.561273 kubelet[1639]: E0913 00:50:12.561244 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:13.561679 kubelet[1639]: E0913 00:50:13.561643 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:14.294847 sshd[3232]: Connection closed by invalid user z 121.132.81.3 port 34826 [preauth] Sep 13 00:50:14.296252 kernel: kauditd_printk_skb: 246 callbacks suppressed Sep 13 00:50:14.296297 kernel: audit: type=1131 audit(1757724614.294:910): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.70.109:22-121.132.81.3:34826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:14.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.70.109:22-121.132.81.3:34826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:14.295401 systemd[1]: sshd@44-139.178.70.109:22-121.132.81.3:34826.service: Deactivated successfully. Sep 13 00:50:14.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.70.109:22-121.132.81.3:34836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:14.452440 systemd[1]: Started sshd@45-139.178.70.109:22-121.132.81.3:34836.service. Sep 13 00:50:14.455717 kernel: audit: type=1130 audit(1757724614.451:911): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.70.109:22-121.132.81.3:34836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:14.562537 kubelet[1639]: E0913 00:50:14.562452 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:15.338911 kubelet[1639]: E0913 00:50:15.338872 1639 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:15.562848 kubelet[1639]: E0913 00:50:15.562814 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:15.571000 audit[3397]: NETFILTER_CFG table=filter:87 family=2 entries=17 op=nft_register_rule pid=3397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:50:15.571000 audit[3397]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe587e1dd0 a2=0 a3=7ffe587e1dbc items=0 ppid=1799 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:15.578255 kernel: audit: type=1325 audit(1757724615.571:912): table=filter:87 family=2 entries=17 op=nft_register_rule pid=3397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:50:15.578308 kernel: audit: type=1300 audit(1757724615.571:912): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe587e1dd0 a2=0 a3=7ffe587e1dbc items=0 ppid=1799 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:15.578895 kernel: audit: type=1327 audit(1757724615.571:912): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:50:15.571000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:50:15.580000 audit[3397]: NETFILTER_CFG table=nat:88 family=2 entries=59 op=nft_register_chain pid=3397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:50:15.580000 audit[3397]: SYSCALL arch=c000003e syscall=46 success=yes exit=23412 a0=3 a1=7ffe587e1dd0 a2=0 a3=7ffe587e1dbc items=0 ppid=1799 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:15.586939 kernel: audit: type=1325 audit(1757724615.580:913): table=nat:88 family=2 entries=59 op=nft_register_chain pid=3397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:50:15.587015 kernel: audit: type=1300 audit(1757724615.580:913): arch=c000003e syscall=46 success=yes exit=23412 a0=3 a1=7ffe587e1dd0 a2=0 a3=7ffe587e1dbc items=0 ppid=1799 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:50:15.587036 kernel: audit: type=1327 audit(1757724615.580:913): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:50:15.580000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:50:15.633525 sshd[3390]: Invalid user appuser from 121.132.81.3 port 34836 Sep 13 00:50:15.840780 sshd[3390]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:15.841468 sshd[3390]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:50:15.841495 sshd[3390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:50:15.841000 audit[3390]: USER_AUTH pid=3390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="appuser" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:15.842012 sshd[3390]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:15.845711 kernel: audit: type=1100 audit(1757724615.841:914): pid=3390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="appuser" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:16.563427 kubelet[1639]: E0913 00:50:16.563395 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:17.564095 kubelet[1639]: E0913 00:50:17.564066 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:17.767123 sshd[3390]: Failed password for invalid user appuser from 121.132.81.3 port 34836 ssh2 Sep 13 00:50:18.564895 kubelet[1639]: E0913 00:50:18.564870 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:18.801773 sshd[3390]: Connection closed by invalid user appuser 121.132.81.3 port 34836 [preauth] Sep 13 00:50:18.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.70.109:22-121.132.81.3:34836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:18.802601 systemd[1]: sshd@45-139.178.70.109:22-121.132.81.3:34836.service: Deactivated successfully. Sep 13 00:50:18.806688 kernel: audit: type=1131 audit(1757724618.801:915): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.70.109:22-121.132.81.3:34836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:18.933236 systemd[1]: Started sshd@46-139.178.70.109:22-121.132.81.3:55558.service. Sep 13 00:50:18.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.70.109:22-121.132.81.3:55558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:19.566227 kubelet[1639]: E0913 00:50:19.566206 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:19.839693 sshd[3401]: Invalid user user from 121.132.81.3 port 55558 Sep 13 00:50:20.052918 sshd[3401]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:20.053190 sshd[3401]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:50:20.053210 sshd[3401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:50:20.053448 sshd[3401]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:20.055709 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:50:20.055751 kernel: audit: type=1100 audit(1757724620.051:917): pid=3401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:20.051000 audit[3401]: USER_AUTH pid=3401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:20.566596 kubelet[1639]: E0913 00:50:20.566566 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:21.566862 kubelet[1639]: E0913 00:50:21.566836 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:21.997906 sshd[3401]: Failed password for invalid user user from 121.132.81.3 port 55558 ssh2 Sep 13 00:50:22.236087 sshd[3401]: Connection closed by invalid user user 121.132.81.3 port 55558 [preauth] Sep 13 00:50:22.236951 systemd[1]: sshd@46-139.178.70.109:22-121.132.81.3:55558.service: Deactivated successfully. Sep 13 00:50:22.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.70.109:22-121.132.81.3:55558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.241687 kernel: audit: type=1131 audit(1757724622.235:918): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.70.109:22-121.132.81.3:55558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.70.109:22-121.132.81.3:40024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.385843 systemd[1]: Started sshd@47-139.178.70.109:22-121.132.81.3:40024.service. Sep 13 00:50:22.389747 kernel: audit: type=1130 audit(1757724622.384:919): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.70.109:22-121.132.81.3:40024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:22.567637 kubelet[1639]: E0913 00:50:22.567605 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:23.386248 sshd[3409]: Invalid user pi from 121.132.81.3 port 40024 Sep 13 00:50:23.568264 kubelet[1639]: E0913 00:50:23.568232 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:23.575452 sshd[3409]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:23.576072 sshd[3409]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:50:23.576164 sshd[3409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:50:23.576552 sshd[3409]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:23.575000 audit[3409]: USER_AUTH pid=3409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pi" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:23.580699 kernel: audit: type=1100 audit(1757724623.575:920): pid=3409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pi" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:24.569345 kubelet[1639]: E0913 00:50:24.569321 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:25.266521 sshd[3409]: Failed password for invalid user pi from 121.132.81.3 port 40024 ssh2 Sep 13 00:50:25.532302 sshd[3409]: Connection closed by invalid user pi 121.132.81.3 port 40024 [preauth] Sep 13 00:50:25.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.70.109:22-121.132.81.3:40024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.535729 kernel: audit: type=1131 audit(1757724625.531:921): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.70.109:22-121.132.81.3:40024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.532599 systemd[1]: sshd@47-139.178.70.109:22-121.132.81.3:40024.service: Deactivated successfully. Sep 13 00:50:25.570404 kubelet[1639]: E0913 00:50:25.570366 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:25.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.70.109:22-121.132.81.3:56098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:25.680183 systemd[1]: Started sshd@48-139.178.70.109:22-121.132.81.3:56098.service. Sep 13 00:50:25.683703 kernel: audit: type=1130 audit(1757724625.678:922): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.70.109:22-121.132.81.3:56098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:26.570864 kubelet[1639]: E0913 00:50:26.570838 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:26.651395 sshd[3414]: Invalid user alex from 121.132.81.3 port 56098 Sep 13 00:50:26.856651 sshd[3414]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:26.857300 sshd[3414]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:50:26.857368 sshd[3414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:50:26.857656 sshd[3414]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:26.856000 audit[3414]: USER_AUTH pid=3414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="alex" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:26.860689 kernel: audit: type=1100 audit(1757724626.856:923): pid=3414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="alex" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:27.572107 kubelet[1639]: E0913 00:50:27.572081 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:28.572640 kubelet[1639]: E0913 00:50:28.572620 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:28.959558 sshd[3414]: Failed password for invalid user alex from 121.132.81.3 port 56098 ssh2 Sep 13 00:50:29.573950 kubelet[1639]: E0913 00:50:29.573913 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:30.574341 kubelet[1639]: E0913 00:50:30.574313 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:31.127701 sshd[3414]: Connection closed by invalid user alex 121.132.81.3 port 56098 [preauth] Sep 13 00:50:31.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.70.109:22-121.132.81.3:56098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:31.128772 systemd[1]: sshd@48-139.178.70.109:22-121.132.81.3:56098.service: Deactivated successfully. Sep 13 00:50:31.134713 kernel: audit: type=1131 audit(1757724631.127:924): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.70.109:22-121.132.81.3:56098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:31.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.70.109:22-121.132.81.3:51562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:31.306025 systemd[1]: Started sshd@49-139.178.70.109:22-121.132.81.3:51562.service. Sep 13 00:50:31.309677 kernel: audit: type=1130 audit(1757724631.304:925): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.70.109:22-121.132.81.3:51562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:31.575172 kubelet[1639]: E0913 00:50:31.575095 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:32.463365 sshd[3420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 user=root Sep 13 00:50:32.462000 audit[3420]: USER_AUTH pid=3420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:32.467697 kernel: audit: type=1100 audit(1757724632.462:926): pid=3420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:32.575503 kubelet[1639]: E0913 00:50:32.575478 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:33.576006 kubelet[1639]: E0913 00:50:33.575978 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:34.387912 sshd[3420]: Failed password for root from 121.132.81.3 port 51562 ssh2 Sep 13 00:50:34.577330 kubelet[1639]: E0913 00:50:34.577303 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:34.996650 sshd[3420]: Connection closed by authenticating user root 121.132.81.3 port 51562 [preauth] Sep 13 00:50:34.997832 systemd[1]: sshd@49-139.178.70.109:22-121.132.81.3:51562.service: Deactivated successfully. Sep 13 00:50:34.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.70.109:22-121.132.81.3:51562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:35.002702 kernel: audit: type=1131 audit(1757724634.996:927): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.70.109:22-121.132.81.3:51562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:35.125570 systemd[1]: Started sshd@50-139.178.70.109:22-121.132.81.3:40914.service. Sep 13 00:50:35.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.70.109:22-121.132.81.3:40914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:35.129695 kernel: audit: type=1130 audit(1757724635.124:928): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.70.109:22-121.132.81.3:40914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:35.339245 kubelet[1639]: E0913 00:50:35.339160 1639 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:35.577812 kubelet[1639]: E0913 00:50:35.577771 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:35.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.70.109:22-185.255.90.135:38546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:35.721834 systemd[1]: Started sshd@51-139.178.70.109:22-185.255.90.135:38546.service. Sep 13 00:50:35.725676 kernel: audit: type=1130 audit(1757724635.720:929): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.70.109:22-185.255.90.135:38546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:36.544535 systemd[1]: run-containerd-runc-k8s.io-7a8113b745e23ddfd4ce3ab58e58141e3e1b14b728815478f9f28eddbbd75a1f-runc.S5zukY.mount: Deactivated successfully. Sep 13 00:50:36.578809 kubelet[1639]: E0913 00:50:36.578769 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:36.701118 sshd[3424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 user=root Sep 13 00:50:36.700000 audit[3424]: USER_AUTH pid=3424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:36.704683 kernel: audit: type=1100 audit(1757724636.700:930): pid=3424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:37.056828 sshd[3427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.255.90.135 user=root Sep 13 00:50:37.055000 audit[3427]: USER_AUTH pid=3427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=185.255.90.135 addr=185.255.90.135 terminal=ssh res=failed' Sep 13 00:50:37.060682 kernel: audit: type=1100 audit(1757724637.055:931): pid=3427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=185.255.90.135 addr=185.255.90.135 terminal=ssh res=failed' Sep 13 00:50:37.579799 kubelet[1639]: E0913 00:50:37.579770 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:38.580332 kubelet[1639]: E0913 00:50:38.580305 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:38.842015 sshd[3424]: Failed password for root from 121.132.81.3 port 40914 ssh2 Sep 13 00:50:39.002971 sshd[3427]: Failed password for root from 185.255.90.135 port 38546 ssh2 Sep 13 00:50:39.375634 sshd[3424]: Connection closed by authenticating user root 121.132.81.3 port 40914 [preauth] Sep 13 00:50:39.376351 systemd[1]: sshd@50-139.178.70.109:22-121.132.81.3:40914.service: Deactivated successfully. Sep 13 00:50:39.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.70.109:22-121.132.81.3:40914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:39.380679 kernel: audit: type=1131 audit(1757724639.374:932): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.70.109:22-121.132.81.3:40914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:39.564481 systemd[1]: Started sshd@52-139.178.70.109:22-121.132.81.3:60496.service. Sep 13 00:50:39.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.70.109:22-121.132.81.3:60496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:39.567684 kernel: audit: type=1130 audit(1757724639.562:933): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.70.109:22-121.132.81.3:60496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:39.580856 kubelet[1639]: E0913 00:50:39.580842 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:39.615654 sshd[3427]: Received disconnect from 185.255.90.135 port 38546:11: Bye Bye [preauth] Sep 13 00:50:39.615654 sshd[3427]: Disconnected from authenticating user root 185.255.90.135 port 38546 [preauth] Sep 13 00:50:39.616215 systemd[1]: sshd@51-139.178.70.109:22-185.255.90.135:38546.service: Deactivated successfully. Sep 13 00:50:39.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.70.109:22-185.255.90.135:38546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:39.619684 kernel: audit: type=1131 audit(1757724639.614:934): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.70.109:22-185.255.90.135:38546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:40.581553 kubelet[1639]: E0913 00:50:40.581527 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:40.808919 sshd[3451]: Invalid user abc from 121.132.81.3 port 60496 Sep 13 00:50:40.990139 sshd[3451]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:40.990689 sshd[3451]: pam_unix(sshd:auth): check pass; user unknown Sep 13 00:50:40.990806 sshd[3451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.132.81.3 Sep 13 00:50:40.991147 sshd[3451]: pam_faillock(sshd:auth): User unknown Sep 13 00:50:40.989000 audit[3451]: USER_AUTH pid=3451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="abc" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:40.994687 kernel: audit: type=1100 audit(1757724640.989:935): pid=3451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="abc" exe="/usr/sbin/sshd" hostname=121.132.81.3 addr=121.132.81.3 terminal=ssh res=failed' Sep 13 00:50:41.582578 kubelet[1639]: E0913 00:50:41.582549 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:42.583598 kubelet[1639]: E0913 00:50:42.583538 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:43.584231 kubelet[1639]: E0913 00:50:43.584204 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:43.686550 sshd[3451]: Failed password for invalid user abc from 121.132.81.3 port 60496 ssh2 Sep 13 00:50:44.585238 kubelet[1639]: E0913 00:50:44.585210 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:44.634554 sshd[3451]: Connection closed by invalid user abc 121.132.81.3 port 60496 [preauth] Sep 13 00:50:44.635150 systemd[1]: sshd@52-139.178.70.109:22-121.132.81.3:60496.service: Deactivated successfully. Sep 13 00:50:44.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.70.109:22-121.132.81.3:60496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:44.638697 kernel: audit: type=1131 audit(1757724644.633:936): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.70.109:22-121.132.81.3:60496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:44.799695 kernel: audit: type=1130 audit(1757724644.794:937): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.70.109:22-121.132.81.3:55212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:44.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.70.109:22-121.132.81.3:55212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:50:44.796131 systemd[1]: Started sshd@53-139.178.70.109:22-121.132.81.3:55212.service. Sep 13 00:50:45.586081 kubelet[1639]: E0913 00:50:45.586047 1639 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:50:45.710932 sshd[3459]: Invalid user admin from 121.132.81.3 port 55212