systemd[1]: Created slice system-modprobe.slice. [ OK ] Created slice system-modprobe.slice. [ 17.878874] systemd[1]: Created slice system-serial\x2dgetty.slice. [ OK ] Created slice system-serial\x2dgetty.slice. [ 17.884215] systemd[1]: Created slice system-system\x2dcloudinit.slice. [ OK ] Created slice system-system\x2dcloudinit.slice. [ 17.889857] systemd[1]: Created slice system-systemd\x2dfsck.slice. [ OK ] Created slice system-systemd\x2dfsck.slice. [ 17.895285] systemd[1]: Created slice user.slice. [ OK ] Created slice user.slice. [ 17.898872] systemd[1]: Started systemd-ask-password-console.path. [ OK ] Started systemd-ask-password-console.path. [ 17.903248] systemd[1]: Started systemd-ask-password-wall.path. [ OK ] Started systemd-ask-password-wall.path. [ 17.908063] systemd[1]: Set up automount boot.automount. [ OK ] Set up automount boot.automount. [ 17.912347] systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. [ OK ] Set up automount proc-sys-fs-binfmt_misc.automount. [ 17.917202] systemd[1]: Reached target integritysetup.target. [ OK ] Reached target integritysetup.target. [ 17.921184] systemd[1]: Reached target remote-cryptsetup.target. [ OK ] Reached target remote-cryptsetup.target. [ 17.925342] systemd[1]: Reached target remote-fs.target. [ OK ] Reached target remote-fs.target. [ 17.929558] systemd[1]: Reached target slices.target. [ OK ] Reached target slices.target. [ 17.933018] systemd[1]: Reached target swap.target. [ OK ] Reached target swap.target. [ 17.936482] systemd[1]: Reached target torcx.target. [ OK ] Reached target torcx.target. [ 17.940242] systemd[1]: Reached target veritysetup.target. [ OK ] Reached target veritysetup.target. [ 17.947231] systemd[1]: Listening on systemd-coredump.socket. [ OK ] Listening on systemd-coredump.socket. [ 17.951488] systemd[1]: Listening on systemd-initctl.socket. [ OK ] Listening on systemd-initctl.socket. [ 17.956189] kauditd_printk_skb: 38 callbacks suppressed [ 17.956193] audit: type=1400 audit(1696274087.227:81): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 17.956796] systemd[1]: Listening on systemd-journald-audit.socket. [ 17.958161] audit: type=1335 audit(1696274087.227:82): pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 [ OK ] Listening on systemd-journald-audit.socket. [ 17.977312] systemd[1]: Listening on systemd-journald-dev-log.socket. [ OK ] Listening on systemd-journald-dev-log.socket. [ 17.982147] systemd[1]: Listening on systemd-journald.socket. [ OK ] Listening on systemd-journald.socket. [ 17.986359] systemd[1]: Listening on systemd-networkd.socket. [ OK ] Listening on systemd-networkd.socket. [ 17.990690] systemd[1]: Listening on systemd-udevd-control.socket. [ OK ] Listening on systemd-udevd-control.socket. [ 17.995114] systemd[1]: Listening on systemd-udevd-kernel.socket. [ OK ] Listening on systemd-udevd-kernel.socket. [ 17.999560] systemd[1]: Listening on systemd-userdbd.socket. [ OK ] Listening on systemd-userdbd.socket. [ 18.005847] systemd[1]: Mounting dev-hugepages.mount... Mounting dev-hugepages.mount... [ 18.023196] systemd[1]: Mounting dev-mqueue.mount... Mounting dev-mqueue.mount... [ 18.034958] systemd[1]: Mounting media.mount... Mounting media.mount... [ 18.042107] systemd[1]: Mounting sys-kernel-debug.mount... Mounting sys-kernel-debug.mount... [ 18.050417] systemd[1]: Mounting sys-kernel-tracing.mount... Mounting sys-kernel-tracing.mount... [ 18.061457] systemd[1]: Mounting tmp.mount... Mounting tmp.mount... [ 18.079678] systemd[1]: Starting flatcar-tmpfiles.service... Starting flatcar-tmpfiles.service... [ 18.103084] systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. [ 18.117028] systemd[1]: Starting kmod-static-nodes.service... Starting kmod-static-nodes.service... [ 18.124959] systemd[1]: Starting modprobe@configfs.service... Starting modprobe@configfs.service... [ 18.133441] systemd[1]: Starting modprobe@dm_mod.service... Starting modprobe@dm_mod.service... [ 18.144740] systemd[1]: Starting modprobe@drm.service... Starting modprobe@drm.service... [ 18.164602] systemd[1]: Starting modprobe@efi_pstore.service... Starting modprobe@efi_pstore.service... [ 18.183026] systemd[1]: Starting modprobe@fuse.service... Starting modprobe@fuse.service... [ 18.195443] systemd[1]: Starting modprobe@loop.service... Starting modprobe@loop.service... [ 18.204504] systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). [ 18.214478] systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. [ 18.227373] systemd[1]: (This warning is only shown for the first unit using IP firewalling.) [ 18.233557] systemd[1]: Starting systemd-journald.service... Starting systemd-journald.service... [ 18.249908] systemd[1]: Starting systemd-modules-load.service... Starting systemd-modules-load.service... [ 18.260937] systemd[1]: Starting systemd-network-generator.service... Starting systemd-network-generator.service... [ 18.272997] systemd[1]: Starting systemd-remount-fs.service... Starting systemd-remount-fs.service... [ 18.283367] systemd[1]: Starting systemd-udev-trigger.service... Startin[ 18.288606] fuse: init (API version 7.34) g systemd-udev-trigger.service... [ 18.299140] systemd[1]: Mounted dev-hugepages.mount. [ OK ] Mounted dev-hugepages.mount. [ 18.307316] systemd[1]: Mounted dev-mqueue.mount. [ OK ] Mounted dev-mqueue.mount. [ 18.313734] systemd[1]: Mounted media.mount. [ OK ] Mounted media.mount. [ 18.322573] systemd[1]: Mounted sys-kernel-debug.mount. [ OK ] Mounted sys-kernel-debug.mount. [ 18.331203] systemd[1]: Mounted sys-kernel-tracing.mount. [ 18.336054] loop: module loaded [ OK ] Mounted sys-kernel-tracing.mount. [ 18.342454] systemd[1]: Mounted tmp.mount. [ OK ] Mounted tmp.mount. [ 18.352185] systemd[1]: Finished kmod-static-nodes.service. [ OK ] Finished kmod-static-nodes.service. [ 18.358847] audit: type=1130 audit(1696274087.630:83): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 18.359392] systemd[1]: modprobe@configfs.service: Deactivated successfully. [ 18.370939] systemd[1]: Finished modprobe@configfs.service. [ OK ] Finished modprobe@configfs.service. [ 18.379223] audit: type=1130 audit(1696274087.650:84): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 18.379911] systemd[1]: modprobe@dm_mod.service: Deactivated successfully. [ 18.389883] audit: type=1131 audit(1696274087.650:85): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 18.400906] systemd[1]: Finished modprobe@dm_mod.service. [ OK ] Finished modprobe@dm_mod.service. [ 18.407646] systemd[1]: modprobe@drm.service: Deactivated successfully. [ 18.410567] systemd[1]: Finished modprobe@drm.service. [ OK ] Finished modprobe@drm.service. [ 18.417159] systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. [ 18.420043] audit: type=1130 audit(1696274087.678:86): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 18.428429] systemd[1]: Finished modprobe@efi_pstore.service. [ OK ] Finished modprobe@efi_pstore.service. [ 18.436030] systemd[1]: modprobe@fuse.service: Deactivated successfully. [ 18.438910] audit: type=1131 audit(1696274087.678:87): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 18.447388] systemd[1]: Finished modprobe@fuse.service. [ OK ] Finished modprobe@fuse.service. [ 18.454217] systemd[1]: modprobe@loop.service: Deactivated successfully. [ 18.457206] systemd[1]: Finished modprobe@loop.service. [ 18.459238] audit: type=1130 audit(1696274087.687:88): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Finished modprobe@loop.service. [ 18.472182] systemd[1]: Finished systemd-modules-load.service. [ OK ] Finished systemd-modules-load.service. [ 18.479878] systemd[1]: Finished systemd-network-generator.service. [ 18.482262] audit: type=1131 audit(1696274087.687:89): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ OK ] Finished systemd-network-generator.service. [ 18.495721] systemd[1]: Finished systemd-remount-fs.service. [ OK ] Finished systemd-remount-fs.service. [ 18.502876] systemd[1]: Reached target network-pre.target. [ OK ] Reached target network-pre.target. [ 18.511467] systemd[1]: Mounting sys-fs-fuse-connections.mount... [ 18.513823] audit: type=1130 audit(1696274087.706:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mounting sys-fs-fuse-connections.mount... [ 18.530194] systemd[1]: Mounting sys-kernel-config.mount... Mounting sys-kernel-config.mount... [ 18.535862] systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). [ 18.560975] systemd[1]: Starting systemd-hwdb-update.service... Starting systemd-hwdb-update.service... [ 18.567895] systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). [ 18.580905] systemd[1]: Starting systemd-random-seed.service... Starting systemd-random-seed.service... [ 18.587370] systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. [ 18.595617] systemd[1]: Starting systemd-sysctl.service... Starting systemd-sysctl.service... [ 18.604328] systemd[1]: Started systemd-journald.service. [ OK ] Started systemd-journald.service. [ OK ] Mounted sys-fs-fuse-connections.mount. [ OK ] Mounted sys-kernel-config.mount. Starting systemd-journal-flush.service... [ OK ] Finished systemd-random-seed.service. [ OK ] Reached target first-boot-complete.target. [ 18.683018] systemd-journald[1359]: Received client request to flush runtime journal. [ OK ] Finished systemd-sysctl.service. [ OK ] Finished flatcar-tmpfiles.service. Starting systemd-sysusers.service... [ OK ] Finished systemd-journal-flush.service. [ OK ] Finished systemd-udev-trigger.service. Starting systemd-udev-settle.service... [ OK ] Finished systemd-sysusers.service. Starting systemd-tmpfiles-setup-dev.service... [ OK ] Finished systemd-tmpfiles-setup-dev.service. [ OK ] Finished systemd-hwdb-update.service. Starting systemd-udevd.service... [ OK ] Started systemd-udevd.service. Starting systemd-networkd.service... Starting systemd-userdbd.service... [ OK ] Started systemd-userdbd.service. [ OK ] Found device dev-ttyS0.device. [ OK ] Started systemd-networkd.service. Starting systemd-networkd-wait-online.service... [ 20.102905] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 20.160944] BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1425) [ OK ] Finished systemd-udev-settle.service. Starting lvm2-activation-early.service... [ OK ] Finished lvm2-activation-early.service. [ OK ] Reached target cryptsetup.target. Starting lvm2-activation.service... [ OK ] Finished lvm2-activation.service. [ OK ] Reached target local-fs-pre.target. [ OK ] Reached target local-fs.target. [ OK ] Reached target machines.target. Starting ldconfig.service... Starting systemd-boot-update.service... Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Starting systemd-machine-id-commit.service... Starting systemd-tmpfiles-setup.service... Starting systemd-fsck@dev-…label-EFI\x2dSYSTEM.service... [ OK ] Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. [ OK ] Finished systemd-fsck@dev-…2dlabel-EFI\x2dSYSTEM.service. Mounting boot.mount... [ OK ] Mounted boot.mount. [ OK ] Finished systemd-boot-update.service. [ OK ] Finished systemd-tmpfiles-setup.service. Starting audit-rules.service... Starting clean-ca-certificates.service... Starting systemd-journal-catalog-update.service... Starting systemd-resolved.service... Starting systemd-timesyncd.service... Starting systemd-update-utmp.service... [ OK ] Finished clean-ca-certificates.service. [ OK ] Finished systemd-update-utmp.service. [ OK ] Finished systemd-journal-catalog-update.service. [ OK ] Started systemd-timesyncd.service. [ OK ] Reached target time-set.target. [ OK ] Started systemd-resolved.service. [ OK ] Reached target network.target. [ OK ] Reached target nss-lookup.target. [ OK ] Finished audit-rules.service. [ OK ] Finished ldconfig.service. Starting systemd-update-done.service... [ OK ] Finished systemd-update-done.service. [ OK ] Reached target sysinit.target. [ OK ] Started motdgen.path. [ OK ] Started user-cloudinit@var…car\x2dinstall-user_data.path. [ OK ] Started logrotate.timer. [ OK ] Started mdadm.timer. [ OK ] Started systemd-tmpfiles-clean.timer. [ OK ] Reached target paths.target. [ OK ] Reached target timers.target. [ OK ] Listening on dbus.socket. Starting docker.socket... [ OK ] Listening on sshd.socket. [ OK ] Finished systemd-networkd-wait-online.service. [ OK ] Reached target network-online.target. [ OK ] Listening on docker.socket. [ OK ] Reached target sockets.target. [ OK ] Reached target basic.target. [ OK ] Started amazon-ssm-agent.service. Starting containerd.service... Starting coreos-metadata-sshkeys@core.service... Starting dbus.service... Starting enable-oem-cloudinit.service... Starting extend-filesystems.service... Starting motdgen.service... [ OK ] Started nvidia.service. Starting prepare-cni-plugins.service... Starting prepare-critools.service... Starting ssh-key-proc-cmdline.service... Starting sshd-keygen.service... Starting systemd-logind.service... Starting update-engine.service... Starting update-ssh-keys-after-ignition.service... [ OK ] Finished systemd-machine-id-commit.service. [ OK ] Finished ssh-key-proc-cmdline.service. [ OK ] Started dbus.service. [ OK ] Reached target system-config.target. [ OK ] Reached target user-config.target. Starting systemd-hostnamed.service... [ 22.418095] extend-filesystems[1615]: Found nvme0n1 [ 22.420738] extend-filesystems[1615]: Found nvme0n1p1 [ 22.423027] extend-filesystems[1615]: Found nvme0n1p2 [ 22.427426] extend-filesystems[1615]: Found nvme0n1p3 [ 22.430084] extend-filesystems[1615]: Found usr [ 22.433795] extend-filesystems[1615]: Found nvme0n1p4 [ 22.439358] extend-filesystems[1615]: Found nvme0n1p6 [ 22.441447] extend-filesystems[1615]: Found nvme0n1p7 [ 22.447424] extend-filesystems[1615]: Found nvme0n1p9 [ 22.450560] extend-filesystems[1615]: Checking size of /dev/nvme0n1p9 [ OK ] Finished motdgen.service. [ OK ] Started update-engine.service. [ OK ] Started locksmithd.service. [ 22.600080] extend-filesystems[1615]: Resized partition /dev/nvme0n1p9 [ 22.612855] extend-filesystems[1702]: resize2fs 1.46.5 (30-Dec-2021) [ 22.734781] EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks [ 22.804504] EXT4-fs (nvme0n1p9): resized filesystem to 1489915 [ 22.748807] extend-filesystems[1702]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required [ 22.752264] extend-filesystems[1702]: old_desc_blocks = 1, new_desc_blocks = 1 [ OK ] Finished extend-filesystems.service. [ 22.770587] extend-filesystems[1702]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. [ 22.773553] extend-filesystems[1615]: Resized filesystem in /dev/nvme0n1p9 [ OK ] Finished update-ssh-keys-after-ignition.service. [ OK ] Started systemd-logind.service. [ OK ] Started containerd.service. [ OK ] Started systemd-hostnamed.service. Starting polkit.service... [ OK ] Started polkit.service. [ OK ] Finished coreos-metadata-sshkeys@core.service. [ OK ] Finished prepare-critools.service. [ OK ] Finished prepare-cni-plugins.service. [* ] Job sshd-keygen.service/start running (9s / no limit) M [** ] Job sshd-keygen.service/start running (9s / no limit) M [*** ] Job sshd-keygen.service/start running (10s / no limit) M [ OK ] Finished sshd-keygen.service.  Starting issuegen.service... [ OK ] Finished issuegen.service. Starting systemd-user-sessions.service... [ OK ] Finished systemd-user-sessions.service. [ OK ] Started getty@tty1.service. [ OK ] Started serial-getty@ttyS0.service. [ OK ] Reached target getty.target. [ OK ] Reached target multi-user.target. Starting systemd-update-utmp-runlevel.service... [ OK ] Finished systemd-update-utmp-runlevel.service. This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:14:58 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: [ 34.226403] kauditd_printk_skb: 39 callbacks suppressed [ 34.226408] audit: type=1305 audit(1696274103.799:126): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 [ 34.238898] audit: type=1300 audit(1696274103.799:126): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc6b44060 a2=420 a3=0 items=0 ppid=1 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) [ 34.251099] audit: type=1327 audit(1696274103.799:126): proctitle=2F7362696E2F617564697463746C002D44 [ 34.254922] audit: type=1131 audit(1696274103.808:127): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 34.315011] audit: type=1130 audit(1696274103.888:128): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 34.328051] audit: type=1106 audit(1696274103.900:129): pid=1898 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 34.337803] audit: type=1104 audit(1696274103.901:130): pid=1898 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 34.363996] audit: type=1106 audit(1696274103.937:131): pid=1894 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 34.381041] audit: type=1104 audit(1696274103.937:132): pid=1894 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 34.390285] audit: type=1131 audit(1696274103.951:133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.24.48:22-139.178.89.65:54492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 39.378918] kauditd_printk_skb: 17 callbacks suppressed [ 39.378924] audit: type=1400 audit(1696274108.987:149): avc: denied { mac_admin } for pid=2151 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 39.388879] audit: type=1401 audit(1696274108.987:149): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" [ 39.393202] audit: type=1300 audit(1696274108.987:149): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e0a000 a1=4000d44780 a2=4000b37fb0 a3=25 items=0 ppid=1 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) [ 39.404790] audit: type=1327 audit(1696274108.987:149): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 [ 39.415292] audit: type=1400 audit(1696274108.987:150): avc: denied { mac_admin } for pid=2151 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 39.423191] audit: type=1401 audit(1696274108.987:150): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" [ 39.427987] audit: type=1300 audit(1696274108.987:150): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e063c0 a1=4000d44798 a2=4000e0a090 a3=25 items=0 ppid=1 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) [ 39.447045] audit: type=1327 audit(1696274108.987:150): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 [ 39.485460] audit: type=1325 audit(1696274109.093:151): table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 39.491930] audit: type=1300 audit(1696274109.093:151): arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffae6ac60 a2=0 a3=1 items=0 ppid=2151 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 52.765494] kauditd_printk_skb: 101 callbacks suppressed [ 52.765498] audit: type=1106 audit(1696274122.401:185): pid=1931 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 52.777039] audit: type=1104 audit(1696274122.404:186): pid=1931 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 52.802400] audit: type=1106 audit(1696274122.437:187): pid=1927 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 52.816037] audit: type=1104 audit(1696274122.437:188): pid=1927 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 52.826689] audit: type=1131 audit(1696274122.451:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.24.48:22-139.178.89.65:54500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 53.172547] audit: type=1131 audit(1696274122.807:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 63.679507] IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP) [ 63.681867] IPVS: Connection hash table configured (size=4096, memory=32Kbytes) [ 63.685024] IPVS: ipvs loaded. [ 63.706280] IPVS: [rr] scheduler registered. [ 63.719367] IPVS: [wrr] scheduler registered. [ 63.735972] IPVS: [sh] scheduler registered. [ 63.845967] audit: type=1325 audit(1696274133.491:191): table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 63.855957] audit: type=1300 audit(1696274133.491:191): arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc0a03040 a2=0 a3=ffff89d816c0 items=0 ppid=2340 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 63.873635] audit: type=1327 audit(1696274133.491:191): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 [ 63.882492] audit: type=1325 audit(1696274133.501:192): table=mangle:36 family=10 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" [ 63.888243] audit: type=1300 audit(1696274133.501:192): arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc50c9350 a2=0 a3=ffff8c7b36c0 items=0 ppid=2340 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 63.900075] audit: type=1327 audit(1696274133.501:192): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 [ 63.905921] audit: type=1325 audit(1696274133.519:193): table=nat:37 family=2 entries=1 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 63.911515] audit: type=1300 audit(1696274133.519:193): arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff6757670 a2=0 a3=ffff97ae76c0 items=0 ppid=2340 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 63.923415] audit: type=1327 audit(1696274133.519:193): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 [ 63.928978] audit: type=1325 audit(1696274133.519:194): table=nat:38 family=10 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" [ 76.090645] kauditd_printk_skb: 122 callbacks suppressed [ 76.090650] audit: type=1131 audit(1696274145.740:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 76.140542] audit: type=1130 audit(1696274145.792:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 79.342062] WARNING: Unprivileged eBPF is enabled, data leaks possible via Spectre v2 BHB attacks! [ 79.348371] audit: type=1334 audit(1696274149.001:237): prog-id=10 op=LOAD [ 79.351375] audit: type=1300 audit(1696274149.001:237): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef684fe8 a2=74 a3=0 items=0 ppid=2832 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 79.363863] audit: type=1327 audit(1696274149.001:237): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 79.367959] audit: type=1334 audit(1696274149.004:238): prog-id=10 op=UNLOAD [ 79.370944] audit: type=1334 audit(1696274149.004:239): prog-id=11 op=LOAD [ 79.373873] audit: type=1300 audit(1696274149.004:239): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef684028 a2=90 a3=2 items=0 ppid=2832 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 79.385345] audit: type=1327 audit(1696274149.004:239): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 79.389381] audit: type=1334 audit(1696274149.004:240): prog-id=11 op=UNLOAD [ 80.205879] Initializing XFRM netlink socket [ 80.212260] WARNING: Unprivileged eBPF is enabled, data leaks possible via Spectre v2 BHB attacks! [ 82.015180] IPv6: ADDRCONF(NETDEV_CHANGE): cilium_host: link becomes ready [ 82.872668] NET: Registered PF_ALG protocol family [ 82.882748] kauditd_printk_skb: 3820 callbacks suppressed [ 82.882753] audit: type=1334 audit(1696274152.537:2055): prog-id=823 op=LOAD [ 82.887469] audit: type=1300 audit(1696274152.537:2055): arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc88df368 a2=74 a3=d items=0 ppid=2946 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tc" exe="/usr/local/bin/tc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 82.898546] audit: type=1327 audit(1696274152.537:2055): proctitle=74630066696C746572007265706C616365006465760063696C69756D5F76786C616E00696E6772657373007072696F00310068616E646C65003100627066006461006F626A006270665F6F7665726C61792E6F007365630066726F6D2D6F7665726C6179 [ 82.907407] audit: type=1334 audit(1696274152.537:2056): prog-id=823 op=UNLOAD [ 82.910396] audit: type=1334 audit(1696274152.537:2057): prog-id=824 op=LOAD [ 82.913410] audit: type=1300 audit(1696274152.537:2057): arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc88df348 a2=80 a3=0 items=0 ppid=2946 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tc" exe="/usr/local/bin/tc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 82.924845] audit: type=1327 audit(1696274152.537:2057): proctitle=74630066696C746572007265706C616365006465760063696C69756D5F76786C616E00696E6772657373007072696F00310068616E646C65003100627066006461006F626A006270665F6F7665726C61792E6F007365630066726F6D2D6F7665726C6179 [ 82.933818] audit: type=1334 audit(1696274152.539:2058): prog-id=824 op=UNLOAD [ 82.936930] audit: type=1334 audit(1696274152.539:2059): prog-id=825 op=LOAD [ 82.939641] audit: type=1300 audit(1696274152.539:2059): arch=c00000b7 syscall=280 success=yes exit=8 a0=5 a1=ffffc88df008 a2=80 a3=ffff815351b4 items=0 ppid=2946 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tc" exe="/usr/local/bin/tc" subj=system_u:system_r:kernel_t:s0 key=(null) This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:15:52 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:15:53 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: [ 84.662640] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:15:54 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:15:57 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: [ 88.363039] kauditd_printk_skb: 289 callbacks suppressed [ 88.363043] audit: type=1334 audit(1696274158.018:2168): prog-id=861 op=LOAD [ 88.367927] audit: type=1300 audit(1696274158.018:2168): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe9548cf8 a2=74 a3=0 items=0 ppid=3346 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 88.379292] audit: type=1327 audit(1696274158.018:2168): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 88.383214] audit: type=1334 audit(1696274158.018:2169): prog-id=861 op=UNLOAD [ 88.385943] audit: type=1334 audit(1696274158.018:2170): prog-id=862 op=LOAD [ 88.388610] audit: type=1300 audit(1696274158.018:2170): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe9547d38 a2=90 a3=2 items=0 ppid=3346 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 88.399916] audit: type=1327 audit(1696274158.018:2170): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 88.403793] audit: type=1334 audit(1696274158.021:2171): prog-id=862 op=UNLOAD [ 88.406522] audit: type=1334 audit(1696274158.021:2172): prog-id=863 op=LOAD [ 88.409188] audit: type=1300 audit(1696274158.021:2172): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe9547d38 a2=90 a3=2 items=0 ppid=3346 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:15:58 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: [ 93.395121] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready [ 93.598190] kauditd_printk_skb: 4167 callbacks suppressed [ 93.598195] audit: type=1400 audit(1696274163.255:4109): avc: denied { open } for pid=3346 comm="cilium-agent" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=0 [ 93.609448] audit: type=1300 audit(1696274163.255:4109): arch=c00000b7 syscall=241 success=no exit=-13 a0=4000b37728 a1=ffffffffffffffff a2=0 a3=ffffffffffffffff items=0 ppid=2253 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cilium-agent" exe="/usr/bin/cilium-agent" subj=system_u:system_r:kernel_t:s0 key=(null) [ 93.622333] audit: type=1327 audit(1696274163.255:4109): proctitle=63696C69756D2D6167656E74002D2D636F6E6669672D6469723D2F746D702F63696C69756D2F636F6E6669672D6D6170 [ 93.722767] eth0: renamed from tmp5e7b1 [ 93.729728] IPv6: ADDRCONF(NETDEV_CHANGE): lxc48d1349791b5: link becomes ready This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:16:06 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:16:07 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: [ 114.187221] audit: type=1334 audit(1696274183.847:4110): prog-id=1688 op=LOAD [ 114.189932] audit: type=1300 audit(1696274183.847:4110): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe37bc668 a2=74 a3=0 items=0 ppid=3875 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 114.201274] audit: type=1327 audit(1696274183.847:4110): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 114.205580] audit: type=1334 audit(1696274183.847:4111): prog-id=1688 op=UNLOAD [ 114.208353] audit: type=1334 audit(1696274183.847:4112): prog-id=1689 op=LOAD [ 114.211108] audit: type=1300 audit(1696274183.847:4112): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe37bb6a8 a2=90 a3=2 items=0 ppid=3875 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 114.222521] audit: type=1327 audit(1696274183.847:4112): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 114.226491] audit: type=1334 audit(1696274183.850:4113): prog-id=1689 op=UNLOAD [ 114.229258] audit: type=1334 audit(1696274183.850:4114): prog-id=1690 op=LOAD [ 114.231969] audit: type=1300 audit(1696274183.850:4114): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe37bb6a8 a2=90 a3=2 items=0 ppid=3875 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 119.177072] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready [ 119.408592] kauditd_printk_skb: 4191 callbacks suppressed [ 119.408598] audit: type=1400 audit(1696274189.069:6027): avc: denied { open } for pid=3875 comm="cilium-agent" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=0 [ 119.426029] audit: type=1300 audit(1696274189.069:6027): arch=c00000b7 syscall=241 success=no exit=-13 a0=4000bd1728 a1=ffffffffffffffff a2=0 a3=ffffffffffffffff items=0 ppid=2253 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cilium-agent" exe="/usr/bin/cilium-agent" subj=system_u:system_r:kernel_t:s0 key=(null) [ 119.438586] audit: type=1327 audit(1696274189.069:6027): proctitle=63696C69756D2D6167656E74002D2D636F6E6669672D6469723D2F746D702F63696C69756D2F636F6E6669672D6D6170 [ 121.387655] audit: type=1334 audit(1696274191.048:6028): prog-id=2515 op=LOAD [ 121.391585] audit: type=1300 audit(1696274191.048:6028): arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffeacd18d8 a2=74 a3=10 items=0 ppid=3875 pid=4337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tc" exe="/usr/local/bin/tc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 121.405824] audit: type=1327 audit(1696274191.048:6028): proctitle=74630066696C746572007265706C616365006465760063696C69756D5F686F737400696E6772657373007072696F00310068616E646C65003100627066006461006F626A0038395F6E6578742F6270665F686F73742E6F0073656300746F2D686F7374 [ 121.420439] audit: type=1334 audit(1696274191.063:6029): prog-id=2515 op=UNLOAD [ 121.423462] audit: type=1334 audit(1696274191.063:6030): prog-id=2516 op=LOAD [ 121.426326] audit: type=1300 audit(1696274191.063:6030): arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffeacd18b8 a2=80 a3=0 items=0 ppid=3875 pid=4337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tc" exe="/usr/local/bin/tc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 121.437395] audit: type=1327 audit(1696274191.063:6030): proctitle=74630066696C746572007265706C616365006465760063696C69756D5F686F737400696E6772657373007072696F00310068616E646C65003100627066006461006F626A0038395F6E6578742F6270665F686F73742E6F0073656300746F2D686F7374 This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:16:31 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:16:32 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: [ 146.203666] kauditd_printk_skb: 31 callbacks suppressed [ 146.203671] audit: type=1334 audit(1696274215.862:6044): prog-id=2523 op=LOAD [ 146.209675] audit: type=1300 audit(1696274215.862:6044): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe62b49e8 a2=74 a3=0 items=0 ppid=4397 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 146.222288] audit: type=1327 audit(1696274215.862:6044): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 146.226297] audit: audit_backlog=65 > audit_backlog_limit=64 [ 146.226425] audit: type=1334 audit(1696274215.862:6045): prog-id=2523 op=UNLOAD [ 146.228577] audit: audit_lost=25 audit_rate_limit=0 audit_backlog_limit=64 [ 146.231918] audit: type=1334 audit(1696274215.862:6046): prog-id=2524 op=LOAD [ 146.234459] audit: backlog limit exceeded [ 146.237467] audit: type=1300 audit(1696274215.862:6046): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe62b3a28 a2=90 a3=2 items=0 ppid=4397 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 146.250499] audit: type=1327 audit(1696274215.862:6046): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 151.248470] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready [ 151.503095] kauditd_printk_skb: 4181 callbacks suppressed [ 151.503100] audit: type=1400 audit(1696274221.161:7972): avc: denied { open } for pid=4397 comm="cilium-agent" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=0 [ 151.513969] audit: type=1300 audit(1696274221.161:7972): arch=c00000b7 syscall=241 success=no exit=-13 a0=4000c71728 a1=ffffffffffffffff a2=0 a3=ffffffffffffffff items=0 ppid=2253 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cilium-agent" exe="/usr/bin/cilium-agent" subj=system_u:system_r:kernel_t:s0 key=(null) [ 151.526476] audit: type=1327 audit(1696274221.161:7972): proctitle=63696C69756D2D6167656E74002D2D636F6E6669672D6469723D2F746D702F63696C69756D2F636F6E6669672D6D6170 [ 151.881111] eth0: renamed from tmp4261d [ 151.893187] IPv6: ADDRCONF(NETDEV_CHANGE): lxc32a8ec8b01a1: link becomes ready This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:17:03 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:17:04 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: [ 193.706098] audit: type=1334 audit(1696274263.366:7973): prog-id=3350 op=LOAD [ 193.708892] audit: type=1300 audit(1696274263.366:7973): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcafa6578 a2=74 a3=0 items=0 ppid=5484 pid=5541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 193.720142] audit: type=1327 audit(1696274263.366:7973): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 193.724048] audit: type=1334 audit(1696274263.366:7974): prog-id=3350 op=UNLOAD [ 193.726793] audit: type=1334 audit(1696274263.366:7975): prog-id=3351 op=LOAD [ 193.729544] audit: type=1300 audit(1696274263.366:7975): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcafa55b8 a2=90 a3=2 items=0 ppid=5484 pid=5541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 193.741085] audit: type=1327 audit(1696274263.366:7975): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 193.745282] audit: type=1334 audit(1696274263.370:7976): prog-id=3351 op=UNLOAD [ 193.748238] audit: type=1334 audit(1696274263.370:7977): prog-id=3352 op=LOAD [ 193.751176] audit: type=1300 audit(1696274263.370:7977): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcafa55b8 a2=90 a3=2 items=0 ppid=5484 pid=5541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 194.402369] alg: No test for seqiv(rfc4106(gcm(aes))) (seqiv(rfc4106(gcm-aes-ce))) [ 194.615853] systemd-journald[1359]: Data hash table of /var/log/journal/ec220aff2a652962faeb877f6f546f28/system.journal has a fill level at 75.0 (33394 of 44522 items, 25165824 file size, 753 bytes per hash table item), suggesting rotation. [ 194.623803] systemd-journald[1359]: /var/log/journal/ec220aff2a652962faeb877f6f546f28/system.journal: Journal header limits reached or header out-of-date, rotating. [ 198.716956] kauditd_printk_skb: 4198 callbacks suppressed [ 198.716962] audit: type=1325 audit(1696274268.377:9923): table=filter:503 family=2 entries=1 op=nft_unregister_rule pid=5933 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 198.724971] audit: type=1300 audit(1696274268.377:9923): arch=c00000b7 syscall=211 success=yes exit=592 a0=3 a1=ffffe7824700 a2=0 a3=ffffaa1015c0 items=0 ppid=5484 pid=5933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 198.736902] audit: type=1327 audit(1696274268.377:9923): proctitle=69707461626C6573002D770035002D740066696C746572002D44004F4C445F43494C49554D5F464F5257415244002D69006C78632B002D6D00636F6D6D656E74002D2D636F6D6D656E740063696C69756D3A20636C75737465722D3E616E79206F6E206C78632B20666F727761726420616363657074002D6A00414343455054 [ 198.747834] audit: type=1325 audit(1696274268.385:9924): table=filter:504 family=2 entries=1 op=nft_unregister_rule pid=5934 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 198.753703] audit: type=1300 audit(1696274268.385:9924): arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffefa682a0 a2=0 a3=ffff854aa5c0 items=0 ppid=5484 pid=5934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 198.765863] audit: type=1327 audit(1696274268.385:9924): proctitle=69707461626C6573002D770035002D740066696C746572002D44004F4C445F43494C49554D5F464F5257415244002D690063696C69756D5F6E6574002D6D00636F6D6D656E74002D2D636F6D6D656E740063696C69756D3A20636C75737465722D3E616E79206F6E2063696C69756D5F6E657420666F72776172642061636365 [ 198.780993] audit: type=1325 audit(1696274268.441:9925): table=filter:505 family=2 entries=1 op=nft_unregister_rule pid=5935 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 198.786819] audit: type=1300 audit(1696274268.441:9925): arch=c00000b7 syscall=211 success=yes exit=592 a0=3 a1=ffffe3ada240 a2=0 a3=ffffa23ce5c0 items=0 ppid=5484 pid=5935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 198.798767] audit: type=1327 audit(1696274268.441:9925): proctitle=69707461626C6573002D770035002D740066696C746572002D44004F4C445F43494C49554D5F464F5257415244002D6F006C78632B002D6D00636F6D6D656E74002D2D636F6D6D656E740063696C69756D3A20616E792D3E636C7573746572206F6E206C78632B20666F727761726420616363657074002D6A00414343455054 [ 198.814970] audit: type=1325 audit(1696274268.475:9926): table=filter:506 family=2 entries=1 op=nft_unregister_rule pid=5936 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 199.104523] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready [ 199.902470] eth0: renamed from tmp9e483 [ 199.910656] IPv6: ADDRCONF(NETDEV_CHANGE): lxc10b301a35622: link becomes ready This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:17:51 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:17:52 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: [ 203.720969] kauditd_printk_skb: 3783 callbacks suppressed [ 203.720973] audit: type=1400 audit(1696274273.383:11716): avc: denied { confidentiality } for pid=6197 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 [ 203.750411] audit: type=1300 audit(1696274273.383:11716): arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe48d49d8 a2=90 a3=2 items=0 ppid=6101 pid=6197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 203.762687] audit: type=1327 audit(1696274273.383:11716): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 203.767260] audit: type=1400 audit(1696274273.395:11717): avc: denied { confidentiality } for pid=6197 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 [ 203.780873] audit: type=1300 audit(1696274273.395:11717): arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe48d49d8 a2=90 a3=2 items=0 ppid=6101 pid=6197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 203.792949] audit: type=1327 audit(1696274273.395:11717): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 203.796866] audit: type=1400 audit(1696274273.406:11718): avc: denied { confidentiality } for pid=6197 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 [ 203.805858] audit: type=1300 audit(1696274273.406:11718): arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe48d49d8 a2=90 a3=2 items=0 ppid=6101 pid=6197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 203.817225] audit: type=1327 audit(1696274273.406:11718): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 203.821171] audit: type=1334 audit(1696274273.406:11719): prog-id=4971 op=LOAD [ 208.198667] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready [ 209.617647] eth0: renamed from tmp274b8 [ 209.638883] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 209.641374] IPv6: ADDRCONF(NETDEV_CHANGE): lxc53d3349fed65: link becomes ready This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:18:00 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:18:01 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: [ 236.211265] kauditd_printk_skb: 541 callbacks suppressed [ 236.211270] audit: type=1334 audit(1696274305.875:11919): prog-id=5004 op=LOAD [ 236.216050] audit: type=1300 audit(1696274305.875:11919): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde360b78 a2=74 a3=0 items=0 ppid=6740 pid=6796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 236.227314] audit: type=1327 audit(1696274305.875:11919): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 236.231267] audit: type=1334 audit(1696274305.875:11920): prog-id=5004 op=UNLOAD [ 236.234014] audit: type=1334 audit(1696274305.875:11921): prog-id=5005 op=LOAD [ 236.236737] audit: type=1300 audit(1696274305.875:11921): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde35fbb8 a2=90 a3=2 items=0 ppid=6740 pid=6796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 236.248006] audit: type=1327 audit(1696274305.875:11921): proctitle=627066746F6F6C002D6A00666561747572650070726F6265 [ 236.251936] audit: type=1334 audit(1696274305.877:11922): prog-id=5005 op=UNLOAD [ 236.254734] audit: type=1334 audit(1696274305.877:11923): prog-id=5006 op=LOAD [ 236.257431] audit: type=1300 audit(1696274305.877:11923): arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde35fbb8 a2=90 a3=2 items=0 ppid=6740 pid=6796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/local/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) [ 241.213008] kauditd_printk_skb: 4152 callbacks suppressed [ 241.213013] audit: type=1325 audit(1696274310.877:13818): table=nat:709 family=2 entries=1 op=nft_unregister_rule pid=7148 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 241.220854] audit: type=1300 audit(1696274310.877:13818): arch=c00000b7 syscall=211 success=yes exit=568 a0=3 a1=ffffe061b4e0 a2=0 a3=ffff951195c0 items=0 ppid=6740 pid=7148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 241.232680] audit: type=1327 audit(1696274310.877:13818): proctitle=69707461626C6573002D770035002D74006E6174002D44004F4C445F43494C49554D5F504F53545F6E6174002D6D006D61726B002D2D6D61726B0030786530302F3078663030002D6D00636F6D6D656E74002D2D636F6D6D656E74006578636C756465207866726D206D61726B732066726F6D206E61742043494C49554D5F50 [ 241.247039] audit: type=1325 audit(1696274310.911:13819): table=nat:710 family=2 entries=1 op=nft_unregister_rule pid=7149 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 241.253248] audit: type=1300 audit(1696274310.911:13819): arch=c00000b7 syscall=211 success=yes exit=944 a0=3 a1=fffffe066f10 a2=0 a3=ffff7fd575c0 items=0 ppid=6740 pid=7149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 241.265656] audit: type=1327 audit(1696274310.911:13819): proctitle=69707461626C6573002D770035002D74006E6174002D44004F4C445F43494C49554D5F504F53545F6E6174002D73003139322E3136382E312E302F32340000002D64003139322E3136382E312E302F32340000002D6F0063696C69756D5F2B002D6D00636F6D6D656E74002D2D636F6D6D656E740063696C69756D206D617371 [ 241.276607] audit: type=1325 audit(1696274310.922:13820): table=nat:711 family=2 entries=1 op=nft_unregister_rule pid=7150 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 241.282496] audit: type=1300 audit(1696274310.922:13820): arch=c00000b7 syscall=211 success=yes exit=568 a0=3 a1=fffff8eb2470 a2=0 a3=ffff9e3155c0 items=0 ppid=6740 pid=7150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 241.299100] audit: type=1327 audit(1696274310.922:13820): proctitle=69707461626C6573002D770035002D74006E6174002D44004F4C445F43494C49554D5F504F53545F6E6174002D6D006D61726B002D2D6D61726B0030786130302F3078653030002D6D00636F6D6D656E74002D2D636F6D6D656E74006578636C7564652070726F78792072657475726E20747261666669632066726F6D206D61 [ 241.309882] audit: type=1325 audit(1696274310.963:13821): table=nat:712 family=2 entries=1 op=nft_unregister_rule pid=7151 subj=system_u:system_r:kernel_t:s0 comm="iptables" [ 241.820878] IPv6: ADDRCONF(NETDEV_CHANGE): lxc_health: link becomes ready This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:18:34 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45 ip-172-31-24-48 login: This is ip-172-31-24-48 (Linux aarch64 5.15.132-flatcar) 19:18:35 SSH host key: SHA256:oFgpTkUFtOKWWq0YV3P9j+9Dkxec9/IZ1yjnLghP/WU (RSA) SSH host key: SHA256:bqJnMEMOZULPZgN5WojAvUXlwok2EN6Mf3vRtgNLjk0 (ECDSA) SSH host key: SHA256:DUHQmsmUgAvY1u2JwFbA1TxximViXz7ofrgjE/VOjV0 (ED25519) eth0: 172.31.24.48 fe80::4e2:9bff:fea3:fc45