verity-setup.service. [ 16.262236] systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). [ 16.274608] systemd[1]: Mounted dev-hugepages.mount. [ OK ] Mounted dev-hugepages.mount. [ 16.278096] systemd[1]: Mounted dev-mqueue.mount. [ OK ] Mounted dev-mqueue.mount. [ 16.280385] systemd[1]: Mounted media.mount. [ OK ] Mounted media.mount. [ 16.282612] systemd[1]: Mounted sys-kernel-debug.mount. [ OK ] Mounted sys-kernel-debug.mount. [ 16.285516] systemd[1]: Mounted sys-kernel-tracing.mount. [ OK ] Mounted sys-kernel-tracing.mount. [ 16.288130] systemd[1]: Mounted tmp.mount. [ OK ] Mounted tmp.mount. [ 16.290338] systemd[1]: Finished kmod-static-nodes.service. [ OK ] Finished kmod-static-nodes.service. [ 16.293086] systemd[1]: modprobe@configfs.service: Deactivated successfully. [ 16.295175] systemd[1]: Finished modprobe@configfs.service. [ OK ] Finished modprobe@configfs.service. [ 16.298508] systemd[1]: modprobe@dm_mod.service: Deactivated successfully. [ 16.301172] systemd[1]: Finished modprobe@dm_mod.service. [ OK ] Finished modprobe@dm_mod.service. [ 16.304334] systemd[1]: modprobe@drm.service: Deactivated successfully. [ 16.310905] systemd[1]: Finished modprobe@drm.service. [ OK ] Finished modprobe@drm.service. [ 16.324832] systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. [ 16.326487] systemd[1]: Finished modprobe@efi_pstore.service. [ OK ] Finished modprobe@efi_pstore.service. [ 16.336066] systemd[1]: Finished systemd-network-generator.service. [ OK ] Finished systemd-network-generator.service. [ 16.342567] systemd[1]: Finished systemd-remount-fs.service. [ 16.343089] loop: module loaded [ OK ] Finished systemd-remount-fs.service. [ 16.348175] systemd[1]: Finished systemd-modules-load.service. [ OK ] Finished systemd-modules-load.service. [ 16.352138] systemd[1]: Reached target network-pre.target. [ OK ] Reached target network-pre.target. [ 16.368456] systemd[1]: Mounting sys-kernel-config.mount... Mounting sys-kernel-config.mou[ 16.370595] fuse: init (API version 7.34) nt... [ 16.371628] systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). [ 16.378798] systemd[1]: Starting systemd-hwdb-update.service... Starting systemd-hwdb-update.service... [ 16.384134] systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). [ 16.388935] systemd[1]: Starting systemd-random-seed.service... Starting systemd-random-seed.service... [ 16.393900] systemd[1]: Starting systemd-sysctl.service... Starting systemd-sysctl.service... [ 16.398105] systemd[1]: Started systemd-journald.service. [ OK ] Started systemd-journald.service. [ OK ] Finished modprobe@fuse.service. [ OK ] Finished modprobe@loop.service. [ OK ] Mounted sys-kernel-config.mount. Mounting sys-fs-fuse-connections.mount... Starting systemd-journal-flush.service... [ OK ] Finished systemd-random-seed.service. [ OK ] Mounted sys-fs-fuse-connections.mount. [ OK ] Reached target first-boot-complete.target. [ 16.436395] systemd-journald[1236]: Received client request to flush runtime journal. [ OK ] Finished systemd-sysctl.service. [ OK ] Finished systemd-udev-trigger.service. Starting systemd-udev-settle.service... [ OK ] Finished systemd-journal-flush.service. [ OK ] Finished flatcar-tmpfiles.service. Starting systemd-sysusers.service... [ OK ] Finished systemd-sysusers.service. [ OK ] Finished systemd-hwdb-update.service. Starting systemd-udevd.service... [ OK ] Started systemd-udevd.service. Starting systemd-networkd.service... Starting systemd-userdbd.service... [ OK ] Started systemd-userdbd.service. [ 17.667397] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 [ 17.680059] ACPI: button: Power Button [PWRF] [ 17.681866] input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 [ OK ] Started systemd-networkd.service. Starting systemd-networkd-wait-online.service... [ 17.702332] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 17.705078] ACPI: button: Sleep Button [SLPF] [ 17.756299] piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 [ 17.779731] BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1293) [ 17.792819] input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 [ 17.836699] mousedev: PS/2 mouse device common for all mice [ OK ] Found device dev-disk-by\x2dlabel-OEM.device. [ OK ] Finished systemd-udev-settle.service. Starting lvm2-activation-early.service... [ OK ] Finished lvm2-activation-early.service. [ OK ] Reached target cryptsetup.target. Starting lvm2-activation.service... [ OK ] Finished lvm2-activation.service. [ OK ] Reached target local-fs-pre.target. [ OK ] Reached target local-fs.target. [ OK ] Reached target machines.target. Starting ldconfig.service... Starting systemd-boot-update.service... Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Starting systemd-machine-id-commit.service... Starting systemd-sysext.service... Starting systemd-fsck@dev-…label-EFI\x2dSYSTEM.service... Unmounting usr-share-oem.mount... [ OK ] Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. [ OK ] Unmounted usr-share-oem.mount. [ 18.276633] loop0: detected capacity change from 0 to 211296 [ 18.412160] squashfs: version 4.0 (2009/01/31) Phillip Lougher [ OK ] Finished systemd-machine-id-commit.service. [ 18.432852] loop1: detected capacity change from 0 to 211296 Mounting usr-share-oem.mount... Starting modprobe@dm_mod.service... Starting modprobe@efi_pstore.service... Starting modprobe@loop.service... [ OK ] Finished modprobe@dm_mod.service. [ OK ] Finished modprobe@efi_pstore.service. [ OK ] Finished modprobe@loop.service. [ OK ] Mounted usr-share-oem.mount. [ OK ] Finished systemd-sysext.service. Starting ensure-sysext.service... Starting systemd-tmpfiles-setup.service... [ OK ] Finished systemd-fsck@dev-…2dlabel-EFI\x2dSYSTEM.service. Mounting boot.mount... Starting modprobe@dm_mod.service... Starting modprobe@efi_pstore.service... Starting modprobe@loop.service... [ OK ] Finished modprobe@dm_mod.service. [ OK ] Finished modprobe@efi_pstore.service. [ OK ] Finished modprobe@loop.service. [ OK ] Mounted boot.mount. Starting modprobe@dm_mod.service... Starting modprobe@efi_pstore.service... Starting modprobe@loop.service... [ OK ] Finished modprobe@dm_mod.service. [ OK ] Finished modprobe@efi_pstore.service. [ OK ] Finished modprobe@loop.service. [ OK ] Finished systemd-boot-update.service. Starting modprobe@dm_mod.service... Starting modprobe@drm.service... Starting modprobe@efi_pstore.service... [ OK ] Finished ensure-sysext.service. [ OK ] Finished modprobe@dm_mod.service. [ OK ] Finished modprobe@drm.service. [ OK ] Finished modprobe@efi_pstore.service. [ OK ] Finished systemd-networkd-wait-online.service. [ OK ] Finished systemd-tmpfiles-setup.service. Starting audit-rules.service... Starting clean-ca-certificates.service... Starting systemd-journal-catalog-update.service... Starting systemd-resolved.service... Starting systemd-timesyncd.service... Starting systemd-update-utmp.service... [ OK ] Finished clean-ca-certificates.service. [ OK ] Finished systemd-update-utmp.service. [ OK ] Finished systemd-journal-catalog-update.service. [ OK ] Started systemd-timesyncd.service. [ OK ] Reached target time-set.target. [ OK ] Finished audit-rules.service. [ OK ] Started systemd-resolved.service. [ OK ] Reached target network.target. [ OK ] Reached target network-online.target. [ OK ] Reached target nss-lookup.target. [ OK ] Finished ldconfig.service. Starting systemd-update-done.service... [ OK ] Finished systemd-update-done.service. [ OK ] Reached target sysinit.target. [ OK ] Started motdgen.path. [ OK ] Started user-cloudinit@var…car\x2dinstall-user_data.path. [ OK ] Started logrotate.timer. [ OK ] Started mdadm.timer. [ OK ] Started systemd-tmpfiles-clean.timer. [ OK ] Reached target paths.target. [ OK ] Reached target timers.target. [ OK ] Listening on dbus.socket. Starting docker.socket... [ OK ] Listening on sshd.socket. [ OK ] Listening on docker.socket. [ OK ] Reached target sockets.target. [ OK ] Reached target basic.target. [ OK ] Started amazon-ssm-agent.service. Starting containerd.service... Starting coreos-metadata-sshkeys@core.service... Starting dbus.service... Starting enable-oem-cloudinit.service... Starting extend-filesystems.service... Starting kubelet.service... Starting motdgen.service... [ OK ] Started nvidia.service. Starting prepare-helm.service... Starting ssh-key-proc-cmdline.service... Starting sshd-keygen.service... Starting systemd-logind.service... Starting update-engine.service... Starting update-ssh-keys-after-ignition.service... [ OK ] Finished ssh-key-proc-cmdline.service. [ 20.085715] extend-filesystems[1549]: Found loop1 [ 20.088550] extend-filesystems[1549]: Found nvme0n1 [ 20.090120] extend-filesystems[1549]: Found nvme0n1p1 [ 20.091535] extend-filesystems[1549]: Found nvme0n1p2 [ 20.092466] extend-filesystems[1549]: Found nvme0n1p3 [ 20.093295] extend-filesystems[1549]: Found usr [ 20.095279] extend-filesystems[1549]: Found nvme0n1p4 [ 20.096201] extend-filesystems[1549]: Found nvme0n1p6 [ 20.097695] extend-filesystems[1549]: Found nvme0n1p7 [ 20.100047] extend-filesystems[1549]: Found nvme0n1p9 [ 20.101106] extend-filesystems[1549]: Checking size of /dev/nvme0n1p9 [ OK ] Finished motdgen.service. [ OK ] Started dbus.service. [ OK ] Reached target system-config.target. [ OK ] Reached target user-config.target. [ 20.192128] extend-filesystems[1549]: Resized partition /dev/nvme0n1p9 Starting systemd-hostnamed.service... [ 20.231558] extend-filesystems[1612]: resize2fs 1.46.5 (30-Dec-2021) [ 20.503274] EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks [ OK ] Started update-engine.service. [ 20.619539] EXT4-fs (nvme0n1p9): resized filesystem to 1489915 [ OK ] Started locksmithd.service. [ OK ] Finished extend-filesystems.service. [ 20.382624] extend-filesystems[1612]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required [ 20.393334] extend-filesystems[1612]: old_desc_blocks = 1, new_desc_blocks = 1 [ OK ] Finished update-ssh-keys-after-ignition.service. [ 20.411647] extend-filesystems[1612]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. [ 20.415050] extend-filesystems[1549]: Resized filesystem in /dev/nvme0n1p9 [ OK ] Started systemd-logind.service. [ OK ] Started systemd-hostnamed.service. Starting polkit.service... [ OK ] Started containerd.service. [ OK ] Started polkit.service. [ OK ] Finished coreos-metadata-sshkeys@core.service. 2024/12/13 14:24:33Z: Amazon SSM Agent v2.3.1319.0 is running 2024/12/13 14:24:33Z: OsProductName: Flatcar Container Linux by Kinvolk 2024/12/13 14:24:33Z: OsVersion: 3510.3.6 [ 55.454918] audit: type=1130 audit(1734099907.601:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 55.460654] audit: type=1131 audit(1734099907.601:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 56.471428] audit: type=1130 audit(1734099908.619:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 56.626841] audit: type=1131 audit(1734099908.775:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 58.373469] audit: type=1130 audit(1734099910.520:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 58.384394] audit: type=1131 audit(1734099910.520:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 58.954450] audit: type=1400 audit(1734099911.103:273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.958618] audit: type=1400 audit(1734099911.103:274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.962222] audit: type=1400 audit(1734099911.103:275): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.971903] audit: type=1400 audit(1734099911.103:276): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.985979] audit: type=1400 audit(1734099911.103:277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.996710] audit: type=1400 audit(1734099911.103:278): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.553172] kauditd_printk_skb: 445 callbacks suppressed [ 61.553175] audit: type=1400 audit(1734099913.701:535): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.558375] audit: type=1400 audit(1734099913.701:536): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.562232] audit: type=1400 audit(1734099913.701:537): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.566085] audit: type=1400 audit(1734099913.701:538): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.570332] audit: type=1400 audit(1734099913.701:539): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.574295] audit: type=1400 audit(1734099913.701:540): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.579010] audit: type=1400 audit(1734099913.701:541): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.595263] audit: type=1400 audit(1734099913.701:542): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.599796] audit: type=1400 audit(1734099913.701:543): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 61.604334] audit: type=1400 audit(1734099913.701:544): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.153315] kauditd_printk_skb: 128 callbacks suppressed [ 69.153460] audit: type=1400 audit(1734099921.301:579): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.158003] audit: type=1400 audit(1734099921.301:580): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.166681] audit: audit_backlog=65 > audit_backlog_limit=64 [ 69.166801] audit: type=1400 audit(1734099921.302:581): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.167800] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 69.167802] audit: backlog limit exceeded [ 69.172366] audit: audit_backlog=65 > audit_backlog_limit=64 [ 69.175246] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 69.177398] audit: backlog limit exceeded [ 69.177940] audit: type=1400 audit(1734099921.302:582): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.185276] kauditd_printk_skb: 284 callbacks suppressed [ 78.185278] audit: type=1106 audit(1734099930.333:820): pid=1848 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 78.189994] audit: type=1104 audit(1734099930.337:821): pid=1848 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 78.218619] audit: type=1106 audit(1734099930.367:822): pid=1845 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 78.224296] audit: type=1104 audit(1734099930.367:823): pid=1845 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 78.228406] audit: type=1131 audit(1734099930.367:824): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.110:22-139.178.89.65:51072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 81.725450] audit: type=1400 audit(1734099933.873:825): avc: denied { watch } for pid=2405 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 [ 81.731240] audit: type=1300 audit(1734099933.873:825): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001007900 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) [ 81.739220] audit: type=1327 audit(1734099933.873:825): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 83.725351] audit: type=1400 audit(1734099935.873:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 83.728459] audit: type=1400 audit(1734099935.873:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 83.732284] audit: type=1400 audit(1734099935.873:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 83.736718] audit: type=1400 audit(1734099935.873:829): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 83.740187] audit: type=1400 audit(1734099935.873:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 83.744611] audit: type=1400 audit(1734099935.873:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 83.749645] audit: type=1400 audit(1734099935.873:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 83.758466] audit: type=1400 audit(1734099935.873:833): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 83.762382] audit: type=1400 audit(1734099935.873:834): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 83.769524] audit: type=1400 audit(1734099935.873:835): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 91.333397] kauditd_printk_skb: 357 callbacks suppressed [ 91.333400] audit: type=1325 audit(1734099943.481:937): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 91.337302] audit: type=1300 audit(1734099943.481:937): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe82808070 a2=0 a3=7ffe8280805c items=0 ppid=2781 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 91.344361] audit: type=1327 audit(1734099943.481:937): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 91.350255] audit: type=1325 audit(1734099943.496:938): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 91.356869] audit: type=1300 audit(1734099943.496:938): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe82808070 a2=0 a3=0 items=0 ppid=2781 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 91.366847] audit: type=1327 audit(1734099943.496:938): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 91.371855] audit: type=1325 audit(1734099943.520:939): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 91.374649] audit: type=1300 audit(1734099943.520:939): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe5a7bf200 a2=0 a3=7ffe5a7bf1ec items=0 ppid=2781 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 91.381809] audit: type=1327 audit(1734099943.520:939): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 91.385357] audit: type=1325 audit(1734099943.533:940): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 96.808690] kauditd_printk_skb: 179 callbacks suppressed [ 96.808693] audit: type=1400 audit(1734099948.957:997): avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 96.812908] audit: type=1300 audit(1734099948.957:997): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1396306c28 items=0 ppid=3094 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 96.819505] audit: type=1327 audit(1734099948.957:997): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343031646234383665336432353333306662316136626630323063 [ 96.824846] audit: type=1400 audit(1734099948.957:998): avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 96.828278] audit: type=1400 audit(1734099948.957:998): avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 96.831851] audit: type=1400 audit(1734099948.957:998): avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 96.844136] audit: type=1400 audit(1734099948.957:998): avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 96.849239] audit: type=1400 audit(1734099948.957:998): avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 96.853296] audit: type=1400 audit(1734099948.957:998): avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 96.857954] audit: type=1400 audit(1734099948.957:998): avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.408177] kauditd_printk_skb: 34 callbacks suppressed [ 104.408180] audit: type=1400 audit(1734099956.556:1004): avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.412647] audit: type=1300 audit(1734099956.556:1004): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f34ac502918 items=0 ppid=3094 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 104.421088] audit: type=1327 audit(1734099956.556:1004): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363763643936626661343038313530613632356336346537623733 [ 104.426234] audit: type=1400 audit(1734099956.556:1005): avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.430256] audit: type=1400 audit(1734099956.556:1005): avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.435901] audit: type=1400 audit(1734099956.556:1005): avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.439828] audit: type=1400 audit(1734099956.556:1005): avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.448392] audit: type=1400 audit(1734099956.556:1005): avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.453122] audit: type=1400 audit(1734099956.556:1005): avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 104.456825] audit: type=1400 audit(1734099956.556:1005): avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 118.031297] kauditd_printk_skb: 34 callbacks suppressed [ 118.031300] audit: type=1325 audit(1734099970.179:1011): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3717 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 118.035045] audit: type=1300 audit(1734099970.179:1011): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffee8a5cc90 a2=0 a3=7ffee8a5cc7c items=0 ppid=2781 pid=3717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 118.042230] audit: type=1327 audit(1734099970.179:1011): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 118.048387] audit: type=1325 audit(1734099970.196:1012): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3717 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 118.052145] audit: type=1300 audit(1734099970.196:1012): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffee8a5cc90 a2=0 a3=7ffee8a5cc7c items=0 ppid=2781 pid=3717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 118.059853] audit: type=1327 audit(1734099970.196:1012): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 121.895420] audit: type=1400 audit(1734099974.044:1013): avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 121.901967] audit: type=1300 audit(1734099974.044:1013): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe30794c808 items=0 ppid=3094 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 121.908329] audit: type=1327 audit(1734099974.044:1013): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039636662663165363566626438333465623935366331616235666136 [ 121.920040] audit: type=1400 audit(1734099974.054:1014): avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 123.133836] kauditd_printk_skb: 47 callbacks suppressed [ 123.133921] audit: type=1400 audit(1734099975.281:1025): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 123.153057] audit: type=1400 audit(1734099975.281:1026): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 123.163075] audit: type=1300 audit(1734099975.281:1026): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bbd020 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) [ 123.171809] audit: type=1327 audit(1734099975.281:1026): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 123.183115] audit: type=1300 audit(1734099975.281:1025): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001291920 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) [ 123.190637] audit: type=1327 audit(1734099975.281:1025): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 123.293219] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 123.294500] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. [ 123.760786] audit: type=1106 audit(1734099975.908:1027): pid=3877 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 123.768585] audit: type=1104 audit(1734099975.909:1028): pid=3877 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 123.774085] audit: type=1131 audit(1734099975.913:1029): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.28.110:22-139.178.89.65:44960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 124.991214] audit: type=1400 audit(1734099977.139:1030): avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 This is ip-172-31-28-110 (Linux x86_64 5.15.173-flatcar) 14:26:19 SSH host key: SHA256:46R9jqbt9bSJp4oS9CTtrDhmmkHod9X0vReKfyeBAQM (ED25519) SSH host key: SHA256:Al+dpXxRDIgfXHWTnUK1eWaK7q5oYMmWy8sl8/F28Kw (ECDSA) SSH host key: SHA256:39QG99wVMgeQUyV3znwB1ok90LtI+mf547cGbU89DHs (RSA) eth0: 172.31.28.110 fe80::4b8:c9ff:fe05:833f ip-172-31-28-110 login: This is ip-172-31-28-110 (Linux x86_64 5.15.173-flatcar) 14:26:20 SSH host key: SHA256:46R9jqbt9bSJp4oS9CTtrDhmmkHod9X0vReKfyeBAQM (ED25519) SSH host key: SHA256:Al+dpXxRDIgfXHWTnUK1eWaK7q5oYMmWy8sl8/F28Kw (ECDSA) SSH host key: SHA256:39QG99wVMgeQUyV3znwB1ok90LtI+mf547cGbU89DHs (RSA) eth0: 172.31.28.110 fe80::4b8:c9ff:fe05:833f ip-172-31-28-110 login: [ 128.797511] kauditd_printk_skb: 532 callbacks suppressed [ 128.797514] audit: type=1130 audit(1734099980.945:1138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.110:22-139.178.89.65:47744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 129.038831] audit: type=1101 audit(1734099981.186:1139): pid=4149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 129.044359] audit: type=1103 audit(1734099981.192:1140): pid=4149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 129.051136] audit: type=1006 audit(1734099981.192:1141): pid=4149 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 [ 129.054539] audit: type=1300 audit(1734099981.192:1141): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe69ddde0 a2=3 a3=0 items=0 ppid=1 pid=4149 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 129.059639] audit: type=1327 audit(1734099981.192:1141): proctitle=737368643A20636F7265205B707269765D [ 129.077638] audit: type=1105 audit(1734099981.225:1142): pid=4149 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 129.085431] audit: type=1103 audit(1734099981.233:1143): pid=4151 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 129.332408] audit: type=1400 audit(1734099981.478:1144): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 129.336436] audit: type=1300 audit(1734099981.478:1144): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c73260 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) [ 133.303172] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 133.305134] IPv6: ADDRCONF(NETDEV_CHANGE): calic7574345e6b: link becomes ready [ 134.139030] IPv6: ADDRCONF(NETDEV_CHANGE): cali5c9b824aba2: link becomes ready [ 134.355526] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 134.356958] IPv6: ADDRCONF(NETDEV_CHANGE): cali285559472fd: link becomes ready [ 134.379040] kauditd_printk_skb: 73 callbacks suppressed [ 134.379051] audit: type=1325 audit(1734099986.520:1170): table=filter:102 family=2 entries=38 op=nft_register_chain pid=4474 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" [ 134.383995] audit: type=1300 audit(1734099986.520:1170): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffea1a93ce0 a2=0 a3=7ffea1a93ccc items=0 ppid=3967 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 134.389851] audit: type=1327 audit(1734099986.520:1170): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 [ 134.444749] audit: type=1400 audit(1734099986.593:1171): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 134.450509] audit: type=1400 audit(1734099986.593:1172): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 134.455540] audit: type=1400 audit(1734099986.593:1173): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 134.466161] audit: type=1400 audit(1734099986.593:1174): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 134.470549] audit: type=1400 audit(1734099986.593:1175): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 134.486612] audit: type=1400 audit(1734099986.593:1176): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 134.500652] audit: type=1400 audit(1734099986.593:1177): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 134.532990] IPv6: ADDRCONF(NETDEV_CHANGE): cali64afe7dff74: link becomes ready [ 135.642590] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 135.643600] IPv6: ADDRCONF(NETDEV_CHANGE): cali956b42db0ee: link becomes ready This is ip-172-31-28-110 (Linux x86_64 5.15.173-flatcar) 14:26:28 SSH host key: SHA256:46R9jqbt9bSJp4oS9CTtrDhmmkHod9X0vReKfyeBAQM (ED25519) SSH host key: SHA256:Al+dpXxRDIgfXHWTnUK1eWaK7q5oYMmWy8sl8/F28Kw (ECDSA) SSH host key: SHA256:39QG99wVMgeQUyV3znwB1ok90LtI+mf547cGbU89DHs (RSA) eth0: 172.31.28.110 fe80::4b8:c9ff:fe05:833f ip-172-31-28-110 login: [ 136.451302] IPv6: ADDRCONF(NETDEV_CHANGE): cali0481c3ecb85: link becomes ready This is ip-172-31-28-110 (Linux x86_64 5.15.173-flatcar) 14:26:29 SSH host key: SHA256:46R9jqbt9bSJp4oS9CTtrDhmmkHod9X0vReKfyeBAQM (ED25519) SSH host key: SHA256:Al+dpXxRDIgfXHWTnUK1eWaK7q5oYMmWy8sl8/F28Kw (ECDSA) SSH host key: SHA256:39QG99wVMgeQUyV3znwB1ok90LtI+mf547cGbU89DHs (RSA) eth0: 172.31.28.110 fe80::4b8:c9ff:fe05:833f ip-172-31-28-110 login: This is ip-172-31-28-110 (Linux x86_64 5.15.173-flatcar) 14:26:30 SSH host key: SHA256:46R9jqbt9bSJp4oS9CTtrDhmmkHod9X0vReKfyeBAQM (ED25519) SSH host key: SHA256:Al+dpXxRDIgfXHWTnUK1eWaK7q5oYMmWy8sl8/F28Kw (ECDSA) SSH host key: SHA256:39QG99wVMgeQUyV3znwB1ok90LtI+mf547cGbU89DHs (RSA) eth0: 172.31.28.110 fe80::4b8:c9ff:fe05:833f ip-172-31-28-110 login: This is ip-172-31-28-110 (Linux x86_64 5.15.173-flatcar) 14:26:31 SSH host key: SHA256:46R9jqbt9bSJp4oS9CTtrDhmmkHod9X0vReKfyeBAQM (ED25519) SSH host key: SHA256:Al+dpXxRDIgfXHWTnUK1eWaK7q5oYMmWy8sl8/F28Kw (ECDSA) SSH host key: SHA256:39QG99wVMgeQUyV3znwB1ok90LtI+mf547cGbU89DHs (RSA) eth0: 172.31.28.110 fe80::4b8:c9ff:fe05:833f ip-172-31-28-110 login: [ 140.588251] kauditd_printk_skb: 498 callbacks suppressed [ 140.588254] audit: type=1400 audit(1734099992.737:1340): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 140.592680] audit: type=1400 audit(1734099992.737:1341): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 140.596985] audit: type=1400 audit(1734099992.737:1342): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 140.600964] audit: type=1400 audit(1734099992.737:1343): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 140.605366] audit: type=1400 audit(1734099992.737:1344): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 140.610823] audit: type=1400 audit(1734099992.737:1345): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 140.617156] audit: type=1400 audit(1734099992.737:1346): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 140.622166] audit: type=1400 audit(1734099992.737:1347): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 140.626897] audit: type=1400 audit(1734099992.737:1348): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 140.630471] audit: type=1400 audit(1734099992.737:1349): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 148.609532] kauditd_printk_skb: 182 callbacks suppressed [ 148.609535] audit: type=1130 audit(1734100000.758:1399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.28.110:22-139.178.89.65:57828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 148.908377] audit: type=1101 audit(1734100001.057:1400): pid=5115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.929284] audit: type=1103 audit(1734100001.078:1401): pid=5115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.935354] audit: type=1006 audit(1734100001.084:1402): pid=5115 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 [ 148.941150] audit: type=1300 audit(1734100001.084:1402): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5c904350 a2=3 a3=0 items=0 ppid=1 pid=5115 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 148.948248] audit: type=1327 audit(1734100001.084:1402): proctitle=737368643A20636F7265205B707269765D [ 148.974766] audit: type=1105 audit(1734100001.123:1403): pid=5115 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 148.985503] audit: type=1103 audit(1734100001.133:1404): pid=5117 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 149.730747] audit: type=1106 audit(1734100001.879:1405): pid=5115 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 149.738893] audit: type=1104 audit(1734100001.879:1406): pid=5115 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 154.755784] kauditd_printk_skb: 58 callbacks suppressed [ 154.755786] audit: type=1130 audit(1734100006.904:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.28.110:22-139.178.89.65:57836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 154.985457] audit: type=1101 audit(1734100007.134:1427): pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 154.990946] audit: type=1103 audit(1734100007.136:1428): pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 154.999137] audit: type=1006 audit(1734100007.136:1429): pid=5184 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 [ 155.007306] audit: type=1300 audit(1734100007.136:1429): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd25dc5510 a2=3 a3=0 items=0 ppid=1 pid=5184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 155.016664] audit: type=1327 audit(1734100007.136:1429): proctitle=737368643A20636F7265205B707269765D [ 155.020172] audit: type=1105 audit(1734100007.169:1430): pid=5184 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 155.026949] audit: type=1103 audit(1734100007.172:1431): pid=5186 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 155.340034] audit: type=1106 audit(1734100007.489:1432): pid=5184 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 155.348880] audit: type=1104 audit(1734100007.489:1433): pid=5184 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 160.366882] kauditd_printk_skb: 7 callbacks suppressed [ 160.366909] audit: type=1130 audit(1734100012.515:1437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.28.110:22-139.178.89.65:51944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 160.539587] audit: type=1101 audit(1734100012.689:1438): pid=5200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 160.544967] audit: type=1103 audit(1734100012.695:1439): pid=5200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 160.550346] audit: type=1006 audit(1734100012.695:1440): pid=5200 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 [ 160.555674] audit: type=1300 audit(1734100012.695:1440): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe965b3730 a2=3 a3=0 items=0 ppid=1 pid=5200 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 160.561406] audit: type=1327 audit(1734100012.695:1440): proctitle=737368643A20636F7265205B707269765D [ 160.581222] audit: type=1105 audit(1734100012.731:1441): pid=5200 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 160.587804] audit: type=1103 audit(1734100012.738:1442): pid=5202 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 160.869206] audit: type=1106 audit(1734100013.019:1443): pid=5200 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 160.875045] audit: type=1104 audit(1734100013.019:1444): pid=5200 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 166.014864] kauditd_printk_skb: 20 callbacks suppressed [ 166.014868] audit: type=1325 audit(1734100018.164:1461): table=filter:121 family=2 entries=20 op=nft_register_rule pid=5276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 166.020767] audit: type=1300 audit(1734100018.164:1461): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff416a3530 a2=0 a3=7fff416a351c items=0 ppid=2781 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 166.028414] audit: type=1327 audit(1734100018.164:1461): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 166.032734] audit: type=1325 audit(1734100018.173:1462): table=nat:122 family=2 entries=22 op=nft_register_rule pid=5276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 166.040700] audit: type=1300 audit(1734100018.173:1462): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff416a3530 a2=0 a3=0 items=0 ppid=2781 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 166.058192] audit: type=1327 audit(1734100018.173:1462): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 166.066068] audit: type=1106 audit(1734100018.216:1463): pid=5237 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 166.079798] audit: type=1104 audit(1734100018.223:1464): pid=5237 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 166.085807] audit: type=1131 audit(1734100018.230:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.28.110:22-139.178.89.65:51964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 166.103783] audit: type=1130 audit(1734100018.254:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.28.110:22-139.178.89.65:41084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 169.913421] hrtimer: interrupt took 3701919 ns [ 173.304615] kauditd_printk_skb: 27 callbacks suppressed [ 173.304618] audit: type=1130 audit(1734100025.454:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.28.110:22-139.178.89.65:41106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 173.435959] audit: type=1325 audit(1734100025.586:1487): table=filter:125 family=2 entries=20 op=nft_register_rule pid=5315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 173.438648] audit: type=1300 audit(1734100025.586:1487): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdf2d00df0 a2=0 a3=7ffdf2d00ddc items=0 ppid=2781 pid=5315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 173.444243] audit: type=1327 audit(1734100025.586:1487): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 173.451410] audit: type=1325 audit(1734100025.599:1488): table=nat:126 family=2 entries=106 op=nft_register_chain pid=5315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 173.454291] audit: type=1300 audit(1734100025.599:1488): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdf2d00df0 a2=0 a3=7ffdf2d00ddc items=0 ppid=2781 pid=5315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 173.460550] audit: type=1327 audit(1734100025.599:1488): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 173.546935] audit: type=1101 audit(1734100025.695:1489): pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 173.552473] audit: type=1103 audit(1734100025.697:1490): pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 173.559498] audit: type=1006 audit(1734100025.697:1491): pid=5312 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1