emd[1]: Finished kmod-static-nodes.service. [ 11.941693] systemd[1]: modprobe@configfs.service: Deactivated successfully. [ 11.943839] systemd[1]: Finished modprobe@configfs.service. [ 11.946300] systemd[1]: modprobe@dm_mod.service: Deactivated successfully. [ 11.952345] systemd[1]: Finished modprobe@dm_mod.service. [ 11.954696] systemd[1]: Started systemd-journald.service. [ 12.016556] systemd-journald[1388]: Received client request to flush runtime journal. [ 12.782603] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 [ 12.792409] ACPI: button: Power Button [PWRF] [ 12.793788] input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 [ 12.802138] ACPI: button: Sleep Button [SLPF] [ 12.817421] piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr [ 12.828042] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 12.855068] input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 [ 12.861706] mousedev: PS/2 mouse device common for all mice [ 13.167611] loop0: detected capacity change from 0 to 229808 [ 13.344442] squashfs: version 4.0 (2009/01/31) Phillip Lougher [ 13.371596] loop1: detected capacity change from 0 to 229808 [ 14.534517] EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks [ 14.626456] EXT4-fs (nvme0n1p9): resized filesystem to 1489915 2025/09/06 00:25:49Z: Amazon SSM Agent v2.3.1319.0 is running 2025/09/06 00:25:49Z: OsProductName: Flatcar Container Linux by Kinvolk 2025/09/06 00:25:49Z: OsVersion: 3510.3.8 This is ip-172-31-25-216 (Linux x86_64 5.15.190-flatcar) 00:25:51 SSH host key: SHA256:OLrEP4w67TEKlawxiZBxzEvHAghQOc3yrMYsXw54oSY (ECDSA) SSH host key: SHA256:ObelKEccvaVbV+K/cnOjh6ni3jz5bogBa/EXsDREIto (RSA) SSH host key: SHA256:4fidqqHMWqyXvizy5ZtprLW2KgiIZ96k3LeLtRmxu4A (ED25519) eth0: 172.31.25.216 fe80::474:24ff:fe6f:b1ad ip-172-31-25-216 login: [ 18.773439] kauditd_printk_skb: 211 callbacks suppressed [ 18.773442] audit: type=1305 audit(1757118352.247:214): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 [ 18.780277] audit: type=1300 audit(1757118352.247:214): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc62588b60 a2=420 a3=0 items=0 ppid=1 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) [ 18.788999] audit: type=1327 audit(1757118352.247:214): proctitle=2F7362696E2F617564697463746C002D44 [ 18.791631] audit: type=1131 audit(1757118352.252:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 18.822096] audit: type=1130 audit(1757118352.295:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 18.829007] audit: type=1106 audit(1757118352.301:217): pid=1944 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 18.835434] audit: type=1104 audit(1757118352.301:218): pid=1944 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 18.858627] audit: type=1106 audit(1757118352.332:219): pid=1941 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 18.866813] audit: type=1104 audit(1757118352.332:220): pid=1941 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 18.875073] audit: type=1131 audit(1757118352.348:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.25.216:22-139.178.68.195:44916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 19.656049] Initializing XFRM netlink socket This is ip-172-31-25-216 (Linux x86_64 5.15.190-flatcar) 00:25:54 SSH host key: SHA256:OLrEP4w67TEKlawxiZBxzEvHAghQOc3yrMYsXw54oSY (ECDSA) SSH host key: SHA256:ObelKEccvaVbV+K/cnOjh6ni3jz5bogBa/EXsDREIto (RSA) SSH host key: SHA256:4fidqqHMWqyXvizy5ZtprLW2KgiIZ96k3LeLtRmxu4A (ED25519) eth0: 172.31.25.216 fe80::474:24ff:fe6f:b1ad ip-172-31-25-216 login: [ 28.793259] kauditd_printk_skb: 84 callbacks suppressed [ 28.793262] audit: type=1130 audit(1757118362.265:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 28.812251] audit: type=1131 audit(1757118362.265:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 29.215666] audit: type=1130 audit(1757118362.689:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 29.298501] audit: type=1131 audit(1757118362.771:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 39.550838] audit: type=1130 audit(1757118373.023:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 39.557480] audit: type=1131 audit(1757118373.023:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 40.374227] audit: type=1130 audit(1757118373.847:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 40.455956] audit: type=1131 audit(1757118373.929:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 42.368046] audit: type=1130 audit(1757118375.841:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 42.372880] audit: type=1131 audit(1757118375.841:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 42.774359] audit: type=1400 audit(1757118376.248:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 42.785699] audit: audit_backlog=65 > audit_backlog_limit=64 [ 42.788507] audit: type=1400 audit(1757118376.248:267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 42.788511] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 44.975495] kauditd_printk_skb: 276 callbacks suppressed [ 44.975498] audit: type=1400 audit(1757118378.449:477): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 44.991548] audit: type=1400 audit(1757118378.449:478): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 45.002619] audit: audit_backlog=65 > audit_backlog_limit=64 [ 45.005452] audit: audit_lost=13 audit_rate_limit=0 audit_backlog_limit=64 [ 45.008532] audit: backlog limit exceeded [ 45.010753] audit: audit_backlog=65 > audit_backlog_limit=64 [ 45.013430] audit: audit_lost=14 audit_rate_limit=0 audit_backlog_limit=64 [ 45.016516] audit: backlog limit exceeded [ 45.018663] audit: audit_backlog=65 > audit_backlog_limit=64 [ 45.021240] audit: audit_lost=15 audit_rate_limit=0 audit_backlog_limit=64 [ 51.291580] kauditd_printk_skb: 368 callbacks suppressed [ 51.291585] audit: type=1400 audit(1757118384.764:593): avc: denied { watch } for pid=2465 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c870 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 [ 51.309225] audit: type=1300 audit(1757118384.764:593): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ab3100 a2=fc6 a3=0 items=0 ppid=2307 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c870 key=(null) [ 51.324077] audit: type=1327 audit(1757118384.764:593): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 51.526875] audit: type=1400 audit(1757118385.000:594): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 51.537142] audit: type=1400 audit(1757118385.000:595): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 51.547000] audit: type=1400 audit(1757118385.000:596): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 51.556728] audit: type=1400 audit(1757118385.000:597): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 51.566821] audit: type=1400 audit(1757118385.000:598): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 51.576671] audit: type=1400 audit(1757118385.000:599): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 51.586969] audit: type=1400 audit(1757118385.000:600): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 57.327310] kauditd_printk_skb: 263 callbacks suppressed [ 57.327313] audit: type=1400 audit(1757118390.801:847): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 57.338787] audit: type=1400 audit(1757118390.801:848): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 57.346762] audit: type=1400 audit(1757118390.801:849): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 57.355217] audit: type=1400 audit(1757118390.801:850): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 57.364479] audit: type=1400 audit(1757118390.801:851): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 57.373358] audit: type=1400 audit(1757118390.801:852): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 57.382645] audit: type=1400 audit(1757118390.801:853): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 57.392075] audit: type=1400 audit(1757118390.801:854): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 57.402617] audit: type=1400 audit(1757118390.801:855): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 57.412648] audit: type=1400 audit(1757118390.812:856): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 65.337163] kauditd_printk_skb: 357 callbacks suppressed [ 65.337166] audit: type=1106 audit(1757118398.809:958): pid=1974 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 65.350037] audit: type=1104 audit(1757118398.809:959): pid=1974 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 65.394021] audit: type=1106 audit(1757118398.866:960): pid=1971 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 65.417785] audit: type=1104 audit(1757118398.866:961): pid=1971 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 65.432133] audit: type=1131 audit(1757118398.883:962): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.216:22-139.178.68.195:44926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 66.173689] audit: type=1325 audit(1757118399.646:963): table=filter:89 family=2 entries=14 op=nft_register_rule pid=3086 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 66.180916] audit: type=1300 audit(1757118399.646:963): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffc886b680 a2=0 a3=7fffc886b66c items=0 ppid=2750 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 66.194289] audit: type=1327 audit(1757118399.646:963): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 66.204872] audit: type=1325 audit(1757118399.677:964): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3086 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 66.212659] audit: type=1300 audit(1757118399.677:964): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffc886b680 a2=0 a3=0 items=0 ppid=2750 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 70.358039] kauditd_printk_skb: 19 callbacks suppressed [ 70.358042] audit: type=1400 audit(1757118403.830:971): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 70.374149] audit: type=1400 audit(1757118403.830:972): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 70.388413] audit: type=1400 audit(1757118403.830:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 70.401214] audit: type=1400 audit(1757118403.830:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 70.414492] audit: type=1400 audit(1757118403.830:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 70.425959] audit: type=1400 audit(1757118403.830:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 70.436109] audit: type=1400 audit(1757118403.830:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 70.452817] audit: type=1400 audit(1757118403.830:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 70.466239] audit: type=1400 audit(1757118403.830:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 70.477434] audit: type=1400 audit(1757118403.843:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 81.446589] kauditd_printk_skb: 211 callbacks suppressed [ 81.446595] audit: type=1400 audit(1757118414.919:1034): avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 81.458386] audit: type=1300 audit(1757118414.919:1034): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fb5614f0448 items=0 ppid=3141 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 81.470887] audit: type=1327 audit(1757118414.919:1034): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666623835316433623232636265653365303737326135326235376535 [ 81.481384] audit: type=1400 audit(1757118414.930:1035): avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 81.490138] audit: type=1400 audit(1757118414.930:1035): avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 81.499371] audit: type=1400 audit(1757118414.930:1035): avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 81.508569] audit: type=1400 audit(1757118414.930:1035): avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 81.518273] audit: type=1400 audit(1757118414.930:1035): avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 81.527246] audit: type=1400 audit(1757118414.930:1035): avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 81.536694] audit: type=1400 audit(1757118414.930:1035): avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.508120] kauditd_printk_skb: 40 callbacks suppressed [ 90.508127] audit: type=1400 audit(1757118423.980:1043): avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.518771] audit: type=1300 audit(1757118423.980:1043): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f2784e915a8 items=0 ppid=3141 pid=3805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 90.531237] audit: type=1327 audit(1757118423.980:1043): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235316135363834366434656539333734643537336138656162653665 [ 90.543910] audit: type=1400 audit(1757118423.980:1044): avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.551391] audit: type=1400 audit(1757118423.980:1044): avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.560346] audit: type=1400 audit(1757118423.980:1044): avc: denied { bpf } for pid=3805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.569516] audit: type=1400 audit(1757118423.980:1044): avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.582101] audit: type=1400 audit(1757118423.980:1044): avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.594966] audit: type=1400 audit(1757118423.980:1044): avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.604610] audit: type=1400 audit(1757118423.980:1044): avc: denied { perfmon } for pid=3805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 91.104111] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 91.107312] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. [ 93.465531] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 93.470949] IPv6: ADDRCONF(NETDEV_CHANGE): cali608a02a6296: link becomes ready [ 95.048463] IPv6: ADDRCONF(NETDEV_CHANGE): cali4abb446070b: link becomes ready This is ip-172-31-25-216 (Linux x86_64 5.15.190-flatcar) 00:27:08 SSH host key: SHA256:OLrEP4w67TEKlawxiZBxzEvHAghQOc3yrMYsXw54oSY (ECDSA) SSH host key: SHA256:ObelKEccvaVbV+K/cnOjh6ni3jz5bogBa/EXsDREIto (RSA) SSH host key: SHA256:4fidqqHMWqyXvizy5ZtprLW2KgiIZ96k3LeLtRmxu4A (ED25519) eth0: 172.31.25.216 fe80::474:24ff:fe6f:b1ad ip-172-31-25-216 login: [ 95.172673] IPv6: ADDRCONF(NETDEV_CHANGE): cali8fc1ca0c84c: link becomes ready [ 95.559683] kauditd_printk_skb: 828 callbacks suppressed [ 95.559686] audit: type=1400 audit(1757118429.032:1232): avc: denied { search } for pid=4409 comm="nginx" name="crypto" dev="proc" ino=26556 scontext=system_u:system_r:svirt_lxc_net_t:s0:c518,c902 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 [ 95.569223] audit: type=1300 audit(1757118429.032:1232): arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc1f1053728 a2=0 a3=0 items=0 ppid=4068 pid=4409 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c518,c902 key=(null) [ 95.578232] audit: type=1327 audit(1757118429.032:1232): proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B [ 95.921458] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 95.922853] IPv6: ADDRCONF(NETDEV_CHANGE): calibb822042bb4: link becomes ready [ 96.035237] audit: type=1325 audit(1757118429.506:1233): table=filter:107 family=2 entries=50 op=nft_register_chain pid=4506 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" [ 96.039787] audit: type=1300 audit(1757118429.506:1233): arch=c000003e syscall=46 success=yes exit=24928 a0=3 a1=7ffd3970aa70 a2=0 a3=7ffd3970aa5c items=0 ppid=3981 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 96.050834] audit: type=1327 audit(1757118429.506:1233): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 [ 96.070403] audit: type=1400 audit(1757118429.543:1234): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 96.076015] audit: type=1400 audit(1757118429.543:1235): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 96.082905] audit: type=1400 audit(1757118429.543:1236): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 96.088977] audit: type=1400 audit(1757118429.543:1237): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 This is ip-172-31-25-216 (Linux x86_64 5.15.190-flatcar) 00:27:09 SSH host key: SHA256:OLrEP4w67TEKlawxiZBxzEvHAghQOc3yrMYsXw54oSY (ECDSA) SSH host key: SHA256:ObelKEccvaVbV+K/cnOjh6ni3jz5bogBa/EXsDREIto (RSA) SSH host key: SHA256:4fidqqHMWqyXvizy5ZtprLW2KgiIZ96k3LeLtRmxu4A (ED25519) eth0: 172.31.25.216 fe80::474:24ff:fe6f:b1ad ip-172-31-25-216 login: [ 97.219654] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 97.221100] IPv6: ADDRCONF(NETDEV_CHANGE): cali10ed7bdc78a: link becomes ready This is ip-172-31-25-216 (Linux x86_64 5.15.190-flatcar) 00:27:10 SSH host key: SHA256:OLrEP4w67TEKlawxiZBxzEvHAghQOc3yrMYsXw54oSY (ECDSA) SSH host key: SHA256:ObelKEccvaVbV+K/cnOjh6ni3jz5bogBa/EXsDREIto (RSA) SSH host key: SHA256:4fidqqHMWqyXvizy5ZtprLW2KgiIZ96k3LeLtRmxu4A (ED25519) eth0: 172.31.25.216 fe80::474:24ff:fe6f:b1ad ip-172-31-25-216 login: This is ip-172-31-25-216 (Linux x86_64 5.15.190-flatcar) 00:27:11 SSH host key: SHA256:OLrEP4w67TEKlawxiZBxzEvHAghQOc3yrMYsXw54oSY (ECDSA) SSH host key: SHA256:ObelKEccvaVbV+K/cnOjh6ni3jz5bogBa/EXsDREIto (RSA) SSH host key: SHA256:4fidqqHMWqyXvizy5ZtprLW2KgiIZ96k3LeLtRmxu4A (ED25519) eth0: 172.31.25.216 fe80::474:24ff:fe6f:b1ad ip-172-31-25-216 login: This is ip-172-31-25-216 (Linux x86_64 5.15.190-flatcar) 00:27:13 SSH host key: SHA256:OLrEP4w67TEKlawxiZBxzEvHAghQOc3yrMYsXw54oSY (ECDSA) SSH host key: SHA256:ObelKEccvaVbV+K/cnOjh6ni3jz5bogBa/EXsDREIto (RSA) SSH host key: SHA256:4fidqqHMWqyXvizy5ZtprLW2KgiIZ96k3LeLtRmxu4A (ED25519) eth0: 172.31.25.216 fe80::474:24ff:fe6f:b1ad ip-172-31-25-216 login: [ 99.840290] IPv6: ADDRCONF(NETDEV_CHANGE): calif7d6a05b05a: link becomes ready [ 100.019812] IPv6: ADDRCONF(NETDEV_CHANGE): cali8cafbfbad0f: link becomes ready [ 100.609554] IPv6: ADDRCONF(NETDEV_CHANGE): calib8c9640ee07: link becomes ready [ 100.672583] kauditd_printk_skb: 416 callbacks suppressed [ 100.672586] audit: type=1400 audit(1757118434.145:1365): avc: denied { getattr } for pid=4956 comm="coredns" path="cgroup:[4026532741]" dev="nsfs" ino=4026532741 scontext=system_u:system_r:svirt_lxc_net_t:s0:c608,c967 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 [ 100.688055] audit: type=1300 audit(1757118434.145:1365): arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a960 a2=c000499968 a3=0 items=0 ppid=4835 pid=4956 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c608,c967 key=(null) [ 100.703058] audit: type=1327 audit(1757118434.145:1365): proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 [ 100.829316] audit: type=1325 audit(1757118434.301:1366): table=filter:115 family=2 entries=63 op=nft_register_chain pid=5005 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" [ 100.832646] audit: type=1300 audit(1757118434.301:1366): arch=c000003e syscall=46 success=yes exit=30664 a0=3 a1=7ffd2c3dcc00 a2=0 a3=7ffd2c3dcbec items=0 ppid=3981 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 100.839624] audit: type=1327 audit(1757118434.301:1366): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 [ 100.850101] audit: type=1400 audit(1757118434.322:1367): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.854210] audit: type=1400 audit(1757118434.322:1368): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.867138] audit: type=1400 audit(1757118434.322:1369): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.887359] audit: type=1400 audit(1757118434.322:1370): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 This is ip-172-31-25-216 (Linux x86_64 5.15.190-flatcar) 00:27:15 SSH host key: SHA256:OLrEP4w67TEKlawxiZBxzEvHAghQOc3yrMYsXw54oSY (ECDSA) SSH host key: SHA256:ObelKEccvaVbV+K/cnOjh6ni3jz5bogBa/EXsDREIto (RSA) SSH host key: SHA256:4fidqqHMWqyXvizy5ZtprLW2KgiIZ96k3LeLtRmxu4A (ED25519) eth0: 172.31.25.216 fe80::474:24ff:fe6f:b1ad ip-172-31-25-216 login: This is ip-172-31-25-216 (Linux x86_64 5.15.190-flatcar) 00:27:16 SSH host key: SHA256:OLrEP4w67TEKlawxiZBxzEvHAghQOc3yrMYsXw54oSY (ECDSA) SSH host key: SHA256:ObelKEccvaVbV+K/cnOjh6ni3jz5bogBa/EXsDREIto (RSA) SSH host key: SHA256:4fidqqHMWqyXvizy5ZtprLW2KgiIZ96k3LeLtRmxu4A (ED25519) eth0: 172.31.25.216 fe80::474:24ff:fe6f:b1ad ip-172-31-25-216 login: [ 106.037571] kauditd_printk_skb: 136 callbacks suppressed [ 106.037574] audit: type=1106 audit(1757118439.510:1415): pid=5133 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 106.057012] audit: type=1104 audit(1757118439.521:1416): pid=5133 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 106.065483] audit: type=1131 audit(1757118439.527:1417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.25.216:22-139.178.68.195:45932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 106.752809] audit: type=1400 audit(1757118440.225:1418): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.758097] audit: type=1400 audit(1757118440.225:1419): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.762713] audit: type=1400 audit(1757118440.225:1420): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.767192] audit: type=1400 audit(1757118440.225:1421): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.771533] audit: type=1400 audit(1757118440.225:1422): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.783040] audit: type=1400 audit(1757118440.225:1423): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.787970] audit: type=1400 audit(1757118440.225:1424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.062420] kauditd_printk_skb: 123 callbacks suppressed [ 111.062424] audit: type=1130 audit(1757118444.535:1452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.25.216:22-139.178.68.195:48758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 111.337090] audit: type=1101 audit(1757118444.810:1453): pid=5228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 111.347421] audit: type=1103 audit(1757118444.820:1454): pid=5228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 111.359116] audit: type=1006 audit(1757118444.820:1455): pid=5228 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 [ 111.364644] audit: type=1300 audit(1757118444.820:1455): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff64a9e820 a2=3 a3=0 items=0 ppid=1 pid=5228 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 111.375706] audit: type=1327 audit(1757118444.820:1455): proctitle=737368643A20636F7265205B707269765D [ 111.397381] audit: type=1105 audit(1757118444.870:1456): pid=5228 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 111.411583] audit: type=1103 audit(1757118444.884:1457): pid=5230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 112.171010] audit: type=1106 audit(1757118445.644:1458): pid=5228 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 112.185076] audit: type=1104 audit(1757118445.644:1459): pid=5228 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 118.439671] kauditd_printk_skb: 92 callbacks suppressed [ 118.439674] audit: type=1130 audit(1757118451.912:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.25.216:22-139.178.68.195:37296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 118.771688] audit: type=1101 audit(1757118452.243:1502): pid=5716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 118.790024] audit: type=1103 audit(1757118452.261:1503): pid=5716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 118.806092] audit: type=1006 audit(1757118452.261:1504): pid=5716 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 [ 118.812128] hrtimer: interrupt took 322226 ns [ 118.817026] audit: type=1300 audit(1757118452.261:1504): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe23684990 a2=3 a3=0 items=0 ppid=1 pid=5716 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 118.829324] audit: type=1327 audit(1757118452.261:1504): proctitle=737368643A20636F7265205B707269765D [ 118.858560] audit: type=1105 audit(1757118452.330:1505): pid=5716 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 118.873447] audit: type=1103 audit(1757118452.345:1506): pid=5718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 119.264929] audit: type=1400 audit(1757118452.736:1507): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 119.273217] audit: type=1400 audit(1757118452.736:1508): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 125.941085] kauditd_printk_skb: 145 callbacks suppressed [ 125.941087] audit: type=1130 audit(1757118459.413:1556): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.25.216:22-139.178.68.195:37300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 126.234605] audit: type=1101 audit(1757118459.706:1557): pid=5838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 126.244152] audit: type=1103 audit(1757118459.716:1558): pid=5838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 126.252918] audit: type=1006 audit(1757118459.716:1559): pid=5838 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 [ 126.258359] audit: type=1300 audit(1757118459.716:1559): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe10330670 a2=3 a3=0 items=0 ppid=1 pid=5838 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 126.266684] audit: type=1327 audit(1757118459.716:1559): proctitle=737368643A20636F7265205B707269765D [ 126.286368] audit: type=1105 audit(1757118459.758:1560): pid=5838 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 126.296466] audit: type=1103 audit(1757118459.768:1561): pid=5841 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 127.181704] audit: type=1106 audit(1757118460.653:1562): pid=5838 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 127.190957] audit: type=1104 audit(1757118460.653:1563): pid=5838 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 132.212772] kauditd_printk_skb: 1 callbacks suppressed [ 132.212774] audit: type=1130 audit(1757118465.683:1565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.25.216:22-139.178.68.195:36488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 132.472855] audit: type=1101 audit(1757118465.944:1566): pid=5855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 132.482734] audit: type=1103 audit(1757118465.954:1567): pid=5855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 132.491028] audit: type=1006 audit(1757118465.954:1568): pid=5855 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 [ 132.498292] audit: type=1300 audit(1757118465.954:1568): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0ef9f8d0 a2=3 a3=0 items=0 ppid=1 pid=5855 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 132.509433] audit: type=1327 audit(1757118465.954:1568): proctitle=737368643A20636F7265205B707269765D [ 132.535666] audit: type=1105 audit(1757118466.005:1569): pid=5855 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 132.548871] audit: type=1103 audit(1757118466.019:1570): pid=5857 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 133.323175] audit: type=1106 audit(1757118466.794:1571): pid=5855 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 133.332549] audit: type=1104 audit(1757118466.794:1572): pid=5855 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 138.076431] kauditd_printk_skb: 49 callbacks suppressed [ 138.076434] audit: type=1106 audit(1757118471.547:1604): pid=5920 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 138.089507] audit: type=1104 audit(1757118471.547:1605): pid=5920 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 138.098234] audit: type=1131 audit(1757118471.550:1606): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.25.216:22-139.178.68.195:36522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 138.108766] audit: type=1130 audit(1757118471.569:1607): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.25.216:22-139.178.68.195:36216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 138.336407] audit: type=1101 audit(1757118471.807:1608): pid=5932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 138.346199] audit: type=1103 audit(1757118471.817:1609): pid=5932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 138.354555] audit: type=1006 audit(1757118471.817:1610): pid=5932 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 [ 138.359519] audit: type=1300 audit(1757118471.817:1610): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd675ae900 a2=3 a3=0 items=0 ppid=1 pid=5932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 138.367918] audit: type=1327 audit(1757118471.817:1610): proctitle=737368643A20636F7265205B707269765D [ 138.371242] audit: type=1105 audit(1757118471.832:1611): pid=5932 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 143.707656] kauditd_printk_skb: 10 callbacks suppressed [ 143.707658] audit: type=1130 audit(1757118477.177:1618): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.25.216:22-139.178.68.195:36218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 143.997374] audit: type=1101 audit(1757118477.468:1619): pid=5947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 144.007736] audit: type=1103 audit(1757118477.478:1620): pid=5947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 144.017428] audit: type=1006 audit(1757118477.478:1621): pid=5947 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 [ 144.023972] audit: type=1300 audit(1757118477.478:1621): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea2324d90 a2=3 a3=0 items=0 ppid=1 pid=5947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 144.035823] audit: type=1327 audit(1757118477.478:1621): proctitle=737368643A20636F7265205B707269765D [ 144.055703] audit: type=1105 audit(1757118477.526:1622): pid=5947 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 144.069885] audit: type=1103 audit(1757118477.540:1623): pid=5949 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 144.694495] audit: type=1106 audit(1757118478.163:1624): pid=5947 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 144.704086] audit: type=1104 audit(1757118478.164:1625): pid=5947 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 149.725973] kauditd_printk_skb: 1 callbacks suppressed [ 149.725976] audit: type=1130 audit(1757118483.196:1627): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.25.216:22-139.178.68.195:41246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 150.021798] audit: type=1101 audit(1757118483.492:1628): pid=5977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 150.032250] audit: type=1103 audit(1757118483.502:1629): pid=5977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 150.042755] audit: type=1006 audit(1757118483.502:1630): pid=5977 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 [ 150.048726] audit: type=1300 audit(1757118483.502:1630): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1d35ebb0 a2=3 a3=0 items=0 ppid=1 pid=5977 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 150.059591] audit: type=1327 audit(1757118483.502:1630): proctitle=737368643A20636F7265205B707269765D [ 150.083758] audit: type=1105 audit(1757118483.554:1631): pid=5977 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 150.096449] audit: type=1103 audit(1757118483.566:1632): pid=5979 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 150.752912] audit: type=1106 audit(1757118484.223:1633): pid=5977 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 150.765556] audit: type=1104 audit(1757118484.223:1634): pid=5977 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 155.776945] kauditd_printk_skb: 1 callbacks suppressed [ 155.776947] audit: type=1130 audit(1757118489.247:1636): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.25.216:22-139.178.68.195:41252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 156.079081] audit: type=1101 audit(1757118489.547:1637): pid=6009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 156.091496] audit: type=1103 audit(1757118489.561:1638): pid=6009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 156.103215] audit: type=1006 audit(1757118489.561:1639): pid=6009 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 [ 156.111495] audit: type=1300 audit(1757118489.561:1639): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1624b960 a2=3 a3=0 items=0 ppid=1 pid=6009 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 156.125831] audit: type=1327 audit(1757118489.561:1639): proctitle=737368643A20636F7265205B707269765D [ 156.154027] audit: type=1105 audit(1757118489.624:1640): pid=6009 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 156.167386] audit: type=1103 audit(1757118489.624:1641): pid=6011 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 157.425559] audit: type=1106 audit(1757118490.895:1642): pid=6009 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 157.438607] audit: type=1104 audit(1757118490.895:1643): pid=6009 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 162.468294] kauditd_printk_skb: 1 callbacks suppressed [ 162.468297] audit: type=1130 audit(1757118495.936:1645): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.25.216:22-139.178.68.195:43874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 162.804213] audit: type=1101 audit(1757118496.273:1646): pid=6023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 162.812912] audit: type=1103 audit(1757118496.281:1647): pid=6023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 162.821474] audit: type=1006 audit(1757118496.281:1648): pid=6023 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 [ 162.826375] audit: type=1300 audit(1757118496.281:1648): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb90bd460 a2=3 a3=0 items=0 ppid=1 pid=6023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 162.834927] audit: type=1327 audit(1757118496.281:1648): proctitle=737368643A20636F7265205B707269765D [ 162.848855] audit: type=1105 audit(1757118496.317:1649): pid=6023 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 162.861482] audit: type=1103 audit(1757118496.319:1650): pid=6025 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 166.080326] audit: type=1106 audit(1757118499.550:1651): pid=6023 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 166.098222] audit: type=1104 audit(1757118499.564:1652): pid=6023 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' [ 167.813112] kauditd_printk_skb: 1 callbacks suppressed [ 167.813115] audit: type=1400 audit(1757118501.282:1654): avc: denied { watch } for pid=2465 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 167.828401] audit: type=1300 audit(1757118501.282:1654): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ad4ed0 a2=fc6 a3=0 items=0 ppid=2307 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c870 key=(null) [ 167.843113] audit: type=1327 audit(1757118501.282:1654): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 167.856476] audit: type=1400 audit(1757118501.325:1655): avc: denied { watch } for pid=2465 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 167.867527] audit: type=1300 audit(1757118501.325:1655): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e724a0 a2=fc6 a3=0 items=0 ppid=2307 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c870 key=(null) [ 167.881521] audit: type=1327 audit(1757118501.325:1655): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 168.699413] audit: type=1400 audit(1757118502.169:1656): avc: denied { watch } for pid=2450 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c444,c656 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 168.708234] audit: type=1400 audit(1757118502.177:1657): avc: denied { watch } for pid=2450 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c444,c656 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 168.715955] audit: type=1300 audit(1757118502.177:1657): arch=c000003e syscall=254 success=no exit=-13 a0=85 a1=c01472d9a0 a2=fc6 a3=0 items=0 ppid=2302 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c444,c656 key=(null) [ 168.725324] audit: type=1327 audit(1757118502.177:1657): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75