Feb 12 21:55:37.033332 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 21:55:37.033370 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 21:55:37.033386 kernel: BIOS-provided physical RAM map: Feb 12 21:55:37.033397 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 21:55:37.033408 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 21:55:37.033419 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 21:55:37.033435 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Feb 12 21:55:37.033446 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Feb 12 21:55:37.033458 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Feb 12 21:55:37.033469 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 21:55:37.033480 kernel: NX (Execute Disable) protection: active Feb 12 21:55:37.033492 kernel: SMBIOS 2.7 present. Feb 12 21:55:37.033503 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Feb 12 21:55:37.033515 kernel: Hypervisor detected: KVM Feb 12 21:55:37.033532 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 21:55:37.033544 kernel: kvm-clock: cpu 0, msr 78faa001, primary cpu clock Feb 12 21:55:37.033557 kernel: kvm-clock: using sched offset of 6879691822 cycles Feb 12 21:55:37.033570 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 21:55:37.033583 kernel: tsc: Detected 2500.006 MHz processor Feb 12 21:55:37.033596 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 21:55:37.033611 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 21:55:37.033623 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Feb 12 21:55:37.033636 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 21:55:37.033649 kernel: Using GB pages for direct mapping Feb 12 21:55:37.033661 kernel: ACPI: Early table checksum verification disabled Feb 12 21:55:37.033674 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Feb 12 21:55:37.033687 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Feb 12 21:55:37.033699 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 12 21:55:37.033712 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Feb 12 21:55:37.033727 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Feb 12 21:55:37.033740 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 12 21:55:37.033752 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 12 21:55:37.033765 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Feb 12 21:55:37.033777 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 12 21:55:37.033790 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Feb 12 21:55:37.033802 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Feb 12 21:55:37.033815 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 12 21:55:37.033830 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Feb 12 21:55:37.033843 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Feb 12 21:55:37.033856 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Feb 12 21:55:37.033874 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Feb 12 21:55:37.033887 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Feb 12 21:55:37.033901 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Feb 12 21:55:37.033915 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Feb 12 21:55:37.033931 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Feb 12 21:55:37.033944 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Feb 12 21:55:37.033958 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Feb 12 21:55:37.033971 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 21:55:37.033984 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 21:55:37.033998 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Feb 12 21:55:37.034011 kernel: NUMA: Initialized distance table, cnt=1 Feb 12 21:55:37.034024 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Feb 12 21:55:37.034040 kernel: Zone ranges: Feb 12 21:55:37.034054 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 21:55:37.034068 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Feb 12 21:55:37.034081 kernel: Normal empty Feb 12 21:55:37.034095 kernel: Movable zone start for each node Feb 12 21:55:37.034108 kernel: Early memory node ranges Feb 12 21:55:37.034121 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 21:55:37.034135 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Feb 12 21:55:37.034148 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Feb 12 21:55:37.034164 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 21:55:37.034178 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 21:55:37.034201 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Feb 12 21:55:37.034215 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 12 21:55:37.034229 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 21:55:37.034453 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Feb 12 21:55:37.034508 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 21:55:37.034524 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 21:55:37.034538 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 21:55:37.034556 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 21:55:37.034569 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 21:55:37.034583 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 21:55:37.034596 kernel: TSC deadline timer available Feb 12 21:55:37.034610 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 21:55:37.034624 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Feb 12 21:55:37.034637 kernel: Booting paravirtualized kernel on KVM Feb 12 21:55:37.034651 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 21:55:37.034665 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 21:55:37.034681 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 21:55:37.034695 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 21:55:37.034708 kernel: pcpu-alloc: [0] 0 1 Feb 12 21:55:37.034721 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Feb 12 21:55:37.034735 kernel: kvm-guest: PV spinlocks enabled Feb 12 21:55:37.034749 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 21:55:37.034763 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Feb 12 21:55:37.034776 kernel: Policy zone: DMA32 Feb 12 21:55:37.034792 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 21:55:37.034809 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 21:55:37.034822 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 21:55:37.034836 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 21:55:37.034849 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 21:55:37.034863 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121024K reserved, 0K cma-reserved) Feb 12 21:55:37.034934 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 21:55:37.034950 kernel: Kernel/User page tables isolation: enabled Feb 12 21:55:37.034965 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 21:55:37.034982 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 21:55:37.034996 kernel: rcu: Hierarchical RCU implementation. Feb 12 21:55:37.035011 kernel: rcu: RCU event tracing is enabled. Feb 12 21:55:37.035025 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 21:55:37.035114 kernel: Rude variant of Tasks RCU enabled. Feb 12 21:55:37.035160 kernel: Tracing variant of Tasks RCU enabled. Feb 12 21:55:37.035175 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 21:55:37.039240 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 21:55:37.039265 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 21:55:37.039286 kernel: random: crng init done Feb 12 21:55:37.039300 kernel: Console: colour VGA+ 80x25 Feb 12 21:55:37.039314 kernel: printk: console [ttyS0] enabled Feb 12 21:55:37.039328 kernel: ACPI: Core revision 20210730 Feb 12 21:55:37.039342 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Feb 12 21:55:37.039356 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 21:55:37.039370 kernel: x2apic enabled Feb 12 21:55:37.039383 kernel: Switched APIC routing to physical x2apic. Feb 12 21:55:37.039398 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093fa6a7c, max_idle_ns: 440795295209 ns Feb 12 21:55:37.039414 kernel: Calibrating delay loop (skipped) preset value.. 5000.01 BogoMIPS (lpj=2500006) Feb 12 21:55:37.039428 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 21:55:37.039442 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 21:55:37.039456 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 21:55:37.039479 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 21:55:37.039496 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 21:55:37.039510 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 21:55:37.039525 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 12 21:55:37.039539 kernel: RETBleed: Vulnerable Feb 12 21:55:37.039553 kernel: Speculative Store Bypass: Vulnerable Feb 12 21:55:37.039566 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 21:55:37.039580 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 21:55:37.039594 kernel: GDS: Unknown: Dependent on hypervisor status Feb 12 21:55:37.039608 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 21:55:37.039625 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 21:55:37.039640 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 21:55:37.039654 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 12 21:55:37.039668 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 12 21:55:37.039682 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 12 21:55:37.039699 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 12 21:55:37.039713 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 12 21:55:37.039727 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Feb 12 21:55:37.039742 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 21:55:37.039755 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 12 21:55:37.039770 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 12 21:55:37.039783 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Feb 12 21:55:37.039797 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Feb 12 21:55:37.039811 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Feb 12 21:55:37.039825 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Feb 12 21:55:37.039839 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Feb 12 21:55:37.039854 kernel: Freeing SMP alternatives memory: 32K Feb 12 21:55:37.039870 kernel: pid_max: default: 32768 minimum: 301 Feb 12 21:55:37.039884 kernel: LSM: Security Framework initializing Feb 12 21:55:37.039898 kernel: SELinux: Initializing. Feb 12 21:55:37.039912 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 21:55:37.039926 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 21:55:37.039940 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 12 21:55:37.039954 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 12 21:55:37.039968 kernel: signal: max sigframe size: 3632 Feb 12 21:55:37.039983 kernel: rcu: Hierarchical SRCU implementation. Feb 12 21:55:37.039996 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 21:55:37.040013 kernel: smp: Bringing up secondary CPUs ... Feb 12 21:55:37.040027 kernel: x86: Booting SMP configuration: Feb 12 21:55:37.040123 kernel: .... node #0, CPUs: #1 Feb 12 21:55:37.040156 kernel: kvm-clock: cpu 1, msr 78faa041, secondary cpu clock Feb 12 21:55:37.040170 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Feb 12 21:55:37.040194 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 12 21:55:37.040209 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 21:55:37.040224 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 21:55:37.040238 kernel: smpboot: Max logical packages: 1 Feb 12 21:55:37.040255 kernel: smpboot: Total of 2 processors activated (10000.02 BogoMIPS) Feb 12 21:55:37.040266 kernel: devtmpfs: initialized Feb 12 21:55:37.040279 kernel: x86/mm: Memory block size: 128MB Feb 12 21:55:37.040294 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 21:55:37.040308 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 21:55:37.040320 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 21:55:37.040332 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 21:55:37.040346 kernel: audit: initializing netlink subsys (disabled) Feb 12 21:55:37.040359 kernel: audit: type=2000 audit(1707774935.931:1): state=initialized audit_enabled=0 res=1 Feb 12 21:55:37.040382 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 21:55:37.040394 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 21:55:37.040406 kernel: cpuidle: using governor menu Feb 12 21:55:37.040418 kernel: ACPI: bus type PCI registered Feb 12 21:55:37.040431 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 21:55:37.040444 kernel: dca service started, version 1.12.1 Feb 12 21:55:37.040456 kernel: PCI: Using configuration type 1 for base access Feb 12 21:55:37.040468 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 21:55:37.040482 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 21:55:37.040498 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 21:55:37.040512 kernel: ACPI: Added _OSI(Module Device) Feb 12 21:55:37.040526 kernel: ACPI: Added _OSI(Processor Device) Feb 12 21:55:37.040539 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 21:55:37.040551 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 21:55:37.040564 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 21:55:37.040579 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 21:55:37.040593 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 21:55:37.040608 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 12 21:55:37.040626 kernel: ACPI: Interpreter enabled Feb 12 21:55:37.040641 kernel: ACPI: PM: (supports S0 S5) Feb 12 21:55:37.040655 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 21:55:37.040670 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 21:55:37.040684 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 12 21:55:37.040699 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 21:55:37.040911 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 21:55:37.041044 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 21:55:37.041067 kernel: acpiphp: Slot [3] registered Feb 12 21:55:37.041082 kernel: acpiphp: Slot [4] registered Feb 12 21:55:37.041096 kernel: acpiphp: Slot [5] registered Feb 12 21:55:37.041110 kernel: acpiphp: Slot [6] registered Feb 12 21:55:37.041123 kernel: acpiphp: Slot [7] registered Feb 12 21:55:37.041137 kernel: acpiphp: Slot [8] registered Feb 12 21:55:37.041152 kernel: acpiphp: Slot [9] registered Feb 12 21:55:37.041166 kernel: acpiphp: Slot [10] registered Feb 12 21:55:37.041181 kernel: acpiphp: Slot [11] registered Feb 12 21:55:37.041212 kernel: acpiphp: Slot [12] registered Feb 12 21:55:37.041226 kernel: acpiphp: Slot [13] registered Feb 12 21:55:37.041241 kernel: acpiphp: Slot [14] registered Feb 12 21:55:37.041255 kernel: acpiphp: Slot [15] registered Feb 12 21:55:37.041269 kernel: acpiphp: Slot [16] registered Feb 12 21:55:37.041283 kernel: acpiphp: Slot [17] registered Feb 12 21:55:37.041295 kernel: acpiphp: Slot [18] registered Feb 12 21:55:37.041309 kernel: acpiphp: Slot [19] registered Feb 12 21:55:37.041323 kernel: acpiphp: Slot [20] registered Feb 12 21:55:37.041338 kernel: acpiphp: Slot [21] registered Feb 12 21:55:37.041352 kernel: acpiphp: Slot [22] registered Feb 12 21:55:37.041366 kernel: acpiphp: Slot [23] registered Feb 12 21:55:37.041379 kernel: acpiphp: Slot [24] registered Feb 12 21:55:37.041393 kernel: acpiphp: Slot [25] registered Feb 12 21:55:37.041407 kernel: acpiphp: Slot [26] registered Feb 12 21:55:37.041420 kernel: acpiphp: Slot [27] registered Feb 12 21:55:37.041433 kernel: acpiphp: Slot [28] registered Feb 12 21:55:37.041447 kernel: acpiphp: Slot [29] registered Feb 12 21:55:37.041460 kernel: acpiphp: Slot [30] registered Feb 12 21:55:37.041476 kernel: acpiphp: Slot [31] registered Feb 12 21:55:37.041490 kernel: PCI host bridge to bus 0000:00 Feb 12 21:55:37.041613 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 21:55:37.041720 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 21:55:37.041823 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 21:55:37.041925 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 12 21:55:37.042041 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 21:55:37.042193 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 21:55:37.074129 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 21:55:37.075903 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Feb 12 21:55:37.076047 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 12 21:55:37.076169 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 12 21:55:37.076305 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Feb 12 21:55:37.076540 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Feb 12 21:55:37.076670 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Feb 12 21:55:37.077377 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Feb 12 21:55:37.077526 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Feb 12 21:55:37.077650 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Feb 12 21:55:37.077767 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x170 took 10742 usecs Feb 12 21:55:37.077987 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Feb 12 21:55:37.078111 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Feb 12 21:55:37.080310 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 12 21:55:37.080515 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 21:55:37.080662 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 12 21:55:37.080799 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Feb 12 21:55:37.080941 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 12 21:55:37.081075 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Feb 12 21:55:37.081100 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 21:55:37.081117 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 21:55:37.081132 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 21:55:37.081147 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 21:55:37.081162 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 21:55:37.081177 kernel: iommu: Default domain type: Translated Feb 12 21:55:37.081204 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 21:55:37.081449 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Feb 12 21:55:37.081589 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 21:55:37.081728 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Feb 12 21:55:37.081748 kernel: vgaarb: loaded Feb 12 21:55:37.081764 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 21:55:37.081779 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 21:55:37.081795 kernel: PTP clock support registered Feb 12 21:55:37.081811 kernel: PCI: Using ACPI for IRQ routing Feb 12 21:55:37.081826 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 21:55:37.081842 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 21:55:37.081861 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Feb 12 21:55:37.081875 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 12 21:55:37.081890 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Feb 12 21:55:37.081905 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 21:55:37.081920 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 21:55:37.081936 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 21:55:37.081952 kernel: pnp: PnP ACPI init Feb 12 21:55:37.081968 kernel: pnp: PnP ACPI: found 5 devices Feb 12 21:55:37.081984 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 21:55:37.082002 kernel: NET: Registered PF_INET protocol family Feb 12 21:55:37.082018 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 21:55:37.082033 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 21:55:37.082048 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 21:55:37.082064 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 21:55:37.082079 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 21:55:37.082094 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 21:55:37.082109 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 21:55:37.082124 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 21:55:37.082142 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 21:55:37.082157 kernel: NET: Registered PF_XDP protocol family Feb 12 21:55:37.082502 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 21:55:37.082645 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 21:55:37.082832 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 21:55:37.082954 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 12 21:55:37.083080 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 21:55:37.083345 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 21:55:37.083508 kernel: PCI: CLS 0 bytes, default 64 Feb 12 21:55:37.083524 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 21:55:37.083538 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093fa6a7c, max_idle_ns: 440795295209 ns Feb 12 21:55:37.083552 kernel: clocksource: Switched to clocksource tsc Feb 12 21:55:37.083566 kernel: Initialise system trusted keyrings Feb 12 21:55:37.083581 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 21:55:37.083595 kernel: Key type asymmetric registered Feb 12 21:55:37.083608 kernel: Asymmetric key parser 'x509' registered Feb 12 21:55:37.083626 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 21:55:37.083640 kernel: io scheduler mq-deadline registered Feb 12 21:55:37.083654 kernel: io scheduler kyber registered Feb 12 21:55:37.083669 kernel: io scheduler bfq registered Feb 12 21:55:37.083683 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 21:55:37.083698 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 21:55:37.083713 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 21:55:37.083727 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 21:55:37.083742 kernel: i8042: Warning: Keylock active Feb 12 21:55:37.083759 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 21:55:37.083773 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 21:55:37.083953 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 12 21:55:37.084096 kernel: rtc_cmos 00:00: registered as rtc0 Feb 12 21:55:37.084222 kernel: rtc_cmos 00:00: setting system clock to 2024-02-12T21:55:36 UTC (1707774936) Feb 12 21:55:37.084408 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 12 21:55:37.084493 kernel: intel_pstate: CPU model not supported Feb 12 21:55:37.084579 kernel: NET: Registered PF_INET6 protocol family Feb 12 21:55:37.084604 kernel: Segment Routing with IPv6 Feb 12 21:55:37.084619 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 21:55:37.084634 kernel: NET: Registered PF_PACKET protocol family Feb 12 21:55:37.084648 kernel: Key type dns_resolver registered Feb 12 21:55:37.084663 kernel: IPI shorthand broadcast: enabled Feb 12 21:55:37.084678 kernel: sched_clock: Marking stable (464412856, 334142620)->(930489750, -131934274) Feb 12 21:55:37.084694 kernel: registered taskstats version 1 Feb 12 21:55:37.084707 kernel: Loading compiled-in X.509 certificates Feb 12 21:55:37.084722 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 21:55:37.084739 kernel: Key type .fscrypt registered Feb 12 21:55:37.084754 kernel: Key type fscrypt-provisioning registered Feb 12 21:55:37.084769 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 21:55:37.084784 kernel: ima: Allocated hash algorithm: sha1 Feb 12 21:55:37.084867 kernel: ima: No architecture policies found Feb 12 21:55:37.084883 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 21:55:37.084898 kernel: Write protecting the kernel read-only data: 28672k Feb 12 21:55:37.084913 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 21:55:37.084928 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 21:55:37.084945 kernel: Run /init as init process Feb 12 21:55:37.084960 kernel: with arguments: Feb 12 21:55:37.084975 kernel: /init Feb 12 21:55:37.084989 kernel: with environment: Feb 12 21:55:37.085003 kernel: HOME=/ Feb 12 21:55:37.085017 kernel: TERM=linux Feb 12 21:55:37.085031 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 21:55:37.085050 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 21:55:37.085071 systemd[1]: Detected virtualization amazon. Feb 12 21:55:37.085087 systemd[1]: Detected architecture x86-64. Feb 12 21:55:37.085102 systemd[1]: Running in initrd. Feb 12 21:55:37.085118 systemd[1]: No hostname configured, using default hostname. Feb 12 21:55:37.085147 systemd[1]: Hostname set to . Feb 12 21:55:37.085253 systemd[1]: Initializing machine ID from VM UUID. Feb 12 21:55:37.085268 systemd[1]: Queued start job for default target initrd.target. Feb 12 21:55:37.085283 systemd[1]: Started systemd-ask-password-console.path. Feb 12 21:55:37.085298 systemd[1]: Reached target cryptsetup.target. Feb 12 21:55:37.085313 systemd[1]: Reached target paths.target. Feb 12 21:55:37.085327 systemd[1]: Reached target slices.target. Feb 12 21:55:37.085342 systemd[1]: Reached target swap.target. Feb 12 21:55:37.085357 systemd[1]: Reached target timers.target. Feb 12 21:55:37.085376 systemd[1]: Listening on iscsid.socket. Feb 12 21:55:37.085390 systemd[1]: Listening on iscsiuio.socket. Feb 12 21:55:37.085408 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 21:55:37.085423 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 21:55:37.085437 systemd[1]: Listening on systemd-journald.socket. Feb 12 21:55:37.085451 systemd[1]: Listening on systemd-networkd.socket. Feb 12 21:55:37.085466 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 21:55:37.085480 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 21:55:37.085494 systemd[1]: Reached target sockets.target. Feb 12 21:55:37.085511 systemd[1]: Starting kmod-static-nodes.service... Feb 12 21:55:37.085525 systemd[1]: Finished network-cleanup.service. Feb 12 21:55:37.085540 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 21:55:37.085554 systemd[1]: Starting systemd-journald.service... Feb 12 21:55:37.085568 systemd[1]: Starting systemd-modules-load.service... Feb 12 21:55:37.085582 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 21:55:37.085597 systemd[1]: Starting systemd-resolved.service... Feb 12 21:55:37.085662 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 21:55:37.085679 systemd[1]: Finished kmod-static-nodes.service. Feb 12 21:55:37.085698 kernel: audit: type=1130 audit(1707774937.057:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.085712 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 21:55:37.085733 systemd-journald[184]: Journal started Feb 12 21:55:37.085808 systemd-journald[184]: Runtime Journal (/run/log/journal/ec2ba6af08653c1f6a28b43a794fbf6f) is 4.8M, max 38.7M, 33.9M free. Feb 12 21:55:37.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.040402 systemd-modules-load[185]: Inserted module 'overlay' Feb 12 21:55:37.228291 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 21:55:37.228318 kernel: Bridge firewalling registered Feb 12 21:55:37.228330 kernel: SCSI subsystem initialized Feb 12 21:55:37.228344 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 21:55:37.228359 kernel: device-mapper: uevent: version 1.0.3 Feb 12 21:55:37.228370 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 21:55:37.228386 kernel: audit: type=1130 audit(1707774937.219:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.228398 systemd[1]: Started systemd-journald.service. Feb 12 21:55:37.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.090314 systemd-resolved[186]: Positive Trust Anchors: Feb 12 21:55:37.239607 kernel: audit: type=1130 audit(1707774937.227:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.239677 kernel: audit: type=1130 audit(1707774937.235:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.090329 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 21:55:37.090385 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 21:55:37.264688 kernel: audit: type=1130 audit(1707774937.247:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.098605 systemd-resolved[186]: Defaulting to hostname 'linux'. Feb 12 21:55:37.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.112554 systemd-modules-load[185]: Inserted module 'br_netfilter' Feb 12 21:55:37.278086 kernel: audit: type=1130 audit(1707774937.267:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.152016 systemd-modules-load[185]: Inserted module 'dm_multipath' Feb 12 21:55:37.228480 systemd[1]: Started systemd-resolved.service. Feb 12 21:55:37.237271 systemd[1]: Finished systemd-modules-load.service. Feb 12 21:55:37.264591 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 21:55:37.269232 systemd[1]: Reached target nss-lookup.target. Feb 12 21:55:37.284021 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 21:55:37.286011 systemd[1]: Starting systemd-sysctl.service... Feb 12 21:55:37.288957 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 21:55:37.305484 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 21:55:37.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.313720 kernel: audit: type=1130 audit(1707774937.304:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.314105 systemd[1]: Finished systemd-sysctl.service. Feb 12 21:55:37.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.325739 kernel: audit: type=1130 audit(1707774937.313:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.333392 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 21:55:37.345865 kernel: audit: type=1130 audit(1707774937.333:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.336866 systemd[1]: Starting dracut-cmdline.service... Feb 12 21:55:37.355688 dracut-cmdline[207]: dracut-dracut-053 Feb 12 21:55:37.359375 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 21:55:37.469213 kernel: Loading iSCSI transport class v2.0-870. Feb 12 21:55:37.484217 kernel: iscsi: registered transport (tcp) Feb 12 21:55:37.510224 kernel: iscsi: registered transport (qla4xxx) Feb 12 21:55:37.510296 kernel: QLogic iSCSI HBA Driver Feb 12 21:55:37.553028 systemd[1]: Finished dracut-cmdline.service. Feb 12 21:55:37.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:37.556095 systemd[1]: Starting dracut-pre-udev.service... Feb 12 21:55:37.625223 kernel: raid6: avx512x4 gen() 14307 MB/s Feb 12 21:55:37.642210 kernel: raid6: avx512x4 xor() 6487 MB/s Feb 12 21:55:37.660215 kernel: raid6: avx512x2 gen() 13631 MB/s Feb 12 21:55:37.678218 kernel: raid6: avx512x2 xor() 19477 MB/s Feb 12 21:55:37.695212 kernel: raid6: avx512x1 gen() 13801 MB/s Feb 12 21:55:37.713215 kernel: raid6: avx512x1 xor() 17657 MB/s Feb 12 21:55:37.731225 kernel: raid6: avx2x4 gen() 14651 MB/s Feb 12 21:55:37.749219 kernel: raid6: avx2x4 xor() 4546 MB/s Feb 12 21:55:37.767224 kernel: raid6: avx2x2 gen() 8852 MB/s Feb 12 21:55:37.785253 kernel: raid6: avx2x2 xor() 8040 MB/s Feb 12 21:55:37.802214 kernel: raid6: avx2x1 gen() 9079 MB/s Feb 12 21:55:37.822422 kernel: raid6: avx2x1 xor() 4968 MB/s Feb 12 21:55:37.845219 kernel: raid6: sse2x4 gen() 3687 MB/s Feb 12 21:55:37.864221 kernel: raid6: sse2x4 xor() 1856 MB/s Feb 12 21:55:37.883382 kernel: raid6: sse2x2 gen() 2389 MB/s Feb 12 21:55:37.906467 kernel: raid6: sse2x2 xor() 2288 MB/s Feb 12 21:55:37.924267 kernel: raid6: sse2x1 gen() 2301 MB/s Feb 12 21:55:37.953090 kernel: raid6: sse2x1 xor() 1443 MB/s Feb 12 21:55:37.953172 kernel: raid6: using algorithm avx2x4 gen() 14651 MB/s Feb 12 21:55:37.953206 kernel: raid6: .... xor() 4546 MB/s, rmw enabled Feb 12 21:55:37.959647 kernel: raid6: using avx512x2 recovery algorithm Feb 12 21:55:37.996230 kernel: xor: automatically using best checksumming function avx Feb 12 21:55:38.184847 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 21:55:38.199709 systemd[1]: Finished dracut-pre-udev.service. Feb 12 21:55:38.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:38.200000 audit: BPF prog-id=7 op=LOAD Feb 12 21:55:38.200000 audit: BPF prog-id=8 op=LOAD Feb 12 21:55:38.202539 systemd[1]: Starting systemd-udevd.service... Feb 12 21:55:38.225417 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 12 21:55:38.233267 systemd[1]: Started systemd-udevd.service. Feb 12 21:55:38.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:38.237397 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 21:55:38.279837 dracut-pre-trigger[388]: rd.md=0: removing MD RAID activation Feb 12 21:55:38.326210 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 21:55:38.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:38.328356 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 21:55:38.403709 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 21:55:38.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:38.491708 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 12 21:55:38.491942 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 12 21:55:38.496229 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 21:55:38.508287 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Feb 12 21:55:38.523244 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:75:d6:38:cf:07 Feb 12 21:55:38.525203 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 21:55:38.525255 kernel: AES CTR mode by8 optimization enabled Feb 12 21:55:38.525365 (udev-worker)[433]: Network interface NamePolicy= disabled on kernel command line. Feb 12 21:55:38.718755 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 12 21:55:38.719259 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 12 21:55:38.719284 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 12 21:55:38.719450 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 21:55:38.719471 kernel: GPT:9289727 != 16777215 Feb 12 21:55:38.719489 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 21:55:38.719507 kernel: GPT:9289727 != 16777215 Feb 12 21:55:38.719524 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 21:55:38.719543 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 21:55:38.719564 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (434) Feb 12 21:55:38.707736 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 21:55:38.770303 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 21:55:38.774577 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 21:55:38.777474 systemd[1]: Starting disk-uuid.service... Feb 12 21:55:38.791387 disk-uuid[587]: Primary Header is updated. Feb 12 21:55:38.791387 disk-uuid[587]: Secondary Entries is updated. Feb 12 21:55:38.791387 disk-uuid[587]: Secondary Header is updated. Feb 12 21:55:38.809089 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 21:55:38.819014 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 21:55:39.804252 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 21:55:39.805464 disk-uuid[589]: The operation has completed successfully. Feb 12 21:55:39.961885 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 21:55:39.962007 systemd[1]: Finished disk-uuid.service. Feb 12 21:55:39.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:39.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:39.974439 systemd[1]: Starting verity-setup.service... Feb 12 21:55:40.008893 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 21:55:40.110303 systemd[1]: Found device dev-mapper-usr.device. Feb 12 21:55:40.111576 systemd[1]: Mounting sysusr-usr.mount... Feb 12 21:55:40.117622 systemd[1]: Finished verity-setup.service. Feb 12 21:55:40.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:40.236367 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 21:55:40.236919 systemd[1]: Mounted sysusr-usr.mount. Feb 12 21:55:40.239214 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 21:55:40.241658 systemd[1]: Starting ignition-setup.service... Feb 12 21:55:40.243348 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 21:55:40.276246 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 21:55:40.276329 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 21:55:40.276351 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 21:55:40.294217 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 21:55:40.310854 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 21:55:40.345100 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 21:55:40.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:40.347000 audit: BPF prog-id=9 op=LOAD Feb 12 21:55:40.349442 systemd[1]: Starting systemd-networkd.service... Feb 12 21:55:40.379290 systemd[1]: Finished ignition-setup.service. Feb 12 21:55:40.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:40.382154 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 21:55:40.391463 systemd-networkd[1104]: lo: Link UP Feb 12 21:55:40.391469 systemd-networkd[1104]: lo: Gained carrier Feb 12 21:55:40.394155 systemd-networkd[1104]: Enumeration completed Feb 12 21:55:40.394409 systemd-networkd[1104]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 21:55:40.397344 systemd[1]: Started systemd-networkd.service. Feb 12 21:55:40.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:40.401356 systemd[1]: Reached target network.target. Feb 12 21:55:40.405085 systemd-networkd[1104]: eth0: Link UP Feb 12 21:55:40.405093 systemd-networkd[1104]: eth0: Gained carrier Feb 12 21:55:40.406356 systemd[1]: Starting iscsiuio.service... Feb 12 21:55:40.416182 systemd[1]: Started iscsiuio.service. Feb 12 21:55:40.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:40.419201 systemd[1]: Starting iscsid.service... Feb 12 21:55:40.423364 systemd-networkd[1104]: eth0: DHCPv4 address 172.31.28.89/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 21:55:40.425378 iscsid[1111]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 21:55:40.425378 iscsid[1111]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 21:55:40.425378 iscsid[1111]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 21:55:40.425378 iscsid[1111]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 21:55:40.425378 iscsid[1111]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 21:55:40.425378 iscsid[1111]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 21:55:40.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:40.427240 systemd[1]: Started iscsid.service. Feb 12 21:55:40.441689 systemd[1]: Starting dracut-initqueue.service... Feb 12 21:55:40.469736 systemd[1]: Finished dracut-initqueue.service. Feb 12 21:55:40.473510 systemd[1]: Reached target remote-fs-pre.target. Feb 12 21:55:40.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:40.474944 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 21:55:40.479196 systemd[1]: Reached target remote-fs.target. Feb 12 21:55:40.482867 systemd[1]: Starting dracut-pre-mount.service... Feb 12 21:55:40.507085 systemd[1]: Finished dracut-pre-mount.service. Feb 12 21:55:40.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.037479 ignition[1107]: Ignition 2.14.0 Feb 12 21:55:41.037494 ignition[1107]: Stage: fetch-offline Feb 12 21:55:41.037625 ignition[1107]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:55:41.037679 ignition[1107]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:55:41.054953 ignition[1107]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:55:41.056720 ignition[1107]: Ignition finished successfully Feb 12 21:55:41.058691 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 21:55:41.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.061906 systemd[1]: Starting ignition-fetch.service... Feb 12 21:55:41.073481 ignition[1130]: Ignition 2.14.0 Feb 12 21:55:41.073493 ignition[1130]: Stage: fetch Feb 12 21:55:41.073636 ignition[1130]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:55:41.073656 ignition[1130]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:55:41.082791 ignition[1130]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:55:41.084289 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:55:41.092288 ignition[1130]: INFO : PUT result: OK Feb 12 21:55:41.094630 ignition[1130]: DEBUG : parsed url from cmdline: "" Feb 12 21:55:41.094630 ignition[1130]: INFO : no config URL provided Feb 12 21:55:41.094630 ignition[1130]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 12 21:55:41.098446 ignition[1130]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 12 21:55:41.098446 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:55:41.102013 ignition[1130]: INFO : PUT result: OK Feb 12 21:55:41.102013 ignition[1130]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 12 21:55:41.104491 ignition[1130]: INFO : GET result: OK Feb 12 21:55:41.105393 ignition[1130]: DEBUG : parsing config with SHA512: 7d6794e7ff6e9e52258436731f10db5246526515755f23e9bec69eac96b6cccfa2cd0d97bc87f78adb2b59f9e249eebc53b7313c80d0bcd08b2437ca4c8964f1 Feb 12 21:55:41.113235 unknown[1130]: fetched base config from "system" Feb 12 21:55:41.113252 unknown[1130]: fetched base config from "system" Feb 12 21:55:41.113260 unknown[1130]: fetched user config from "aws" Feb 12 21:55:41.115599 ignition[1130]: fetch: fetch complete Feb 12 21:55:41.115609 ignition[1130]: fetch: fetch passed Feb 12 21:55:41.115660 ignition[1130]: Ignition finished successfully Feb 12 21:55:41.120745 systemd[1]: Finished ignition-fetch.service. Feb 12 21:55:41.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.122967 systemd[1]: Starting ignition-kargs.service... Feb 12 21:55:41.135285 ignition[1136]: Ignition 2.14.0 Feb 12 21:55:41.135296 ignition[1136]: Stage: kargs Feb 12 21:55:41.135444 ignition[1136]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:55:41.135467 ignition[1136]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:55:41.144334 ignition[1136]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:55:41.146153 ignition[1136]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:55:41.147868 ignition[1136]: INFO : PUT result: OK Feb 12 21:55:41.151074 ignition[1136]: kargs: kargs passed Feb 12 21:55:41.151135 ignition[1136]: Ignition finished successfully Feb 12 21:55:41.153947 systemd[1]: Finished ignition-kargs.service. Feb 12 21:55:41.164163 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 12 21:55:41.164199 kernel: audit: type=1130 audit(1707774941.153:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.156993 systemd[1]: Starting ignition-disks.service... Feb 12 21:55:41.168037 ignition[1142]: Ignition 2.14.0 Feb 12 21:55:41.168048 ignition[1142]: Stage: disks Feb 12 21:55:41.168219 ignition[1142]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:55:41.168241 ignition[1142]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:55:41.179303 ignition[1142]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:55:41.180987 ignition[1142]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:55:41.183040 ignition[1142]: INFO : PUT result: OK Feb 12 21:55:41.187447 ignition[1142]: disks: disks passed Feb 12 21:55:41.187626 ignition[1142]: Ignition finished successfully Feb 12 21:55:41.190165 systemd[1]: Finished ignition-disks.service. Feb 12 21:55:41.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.191379 systemd[1]: Reached target initrd-root-device.target. Feb 12 21:55:41.198568 kernel: audit: type=1130 audit(1707774941.190:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.198693 systemd[1]: Reached target local-fs-pre.target. Feb 12 21:55:41.200841 systemd[1]: Reached target local-fs.target. Feb 12 21:55:41.202835 systemd[1]: Reached target sysinit.target. Feb 12 21:55:41.203873 systemd[1]: Reached target basic.target. Feb 12 21:55:41.208857 systemd[1]: Starting systemd-fsck-root.service... Feb 12 21:55:41.233035 systemd-fsck[1150]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 12 21:55:41.237069 systemd[1]: Finished systemd-fsck-root.service. Feb 12 21:55:41.245061 kernel: audit: type=1130 audit(1707774941.237:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.239109 systemd[1]: Mounting sysroot.mount... Feb 12 21:55:41.254212 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 21:55:41.254737 systemd[1]: Mounted sysroot.mount. Feb 12 21:55:41.256918 systemd[1]: Reached target initrd-root-fs.target. Feb 12 21:55:41.262685 systemd[1]: Mounting sysroot-usr.mount... Feb 12 21:55:41.264996 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 21:55:41.265040 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 21:55:41.265064 systemd[1]: Reached target ignition-diskful.target. Feb 12 21:55:41.273452 systemd[1]: Mounted sysroot-usr.mount. Feb 12 21:55:41.288365 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 21:55:41.292664 systemd[1]: Starting initrd-setup-root.service... Feb 12 21:55:41.301999 initrd-setup-root[1172]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 21:55:41.305838 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1167) Feb 12 21:55:41.311016 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 21:55:41.311085 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 21:55:41.311110 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 21:55:41.317211 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 21:55:41.320373 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 21:55:41.332104 initrd-setup-root[1198]: cut: /sysroot/etc/group: No such file or directory Feb 12 21:55:41.351760 initrd-setup-root[1206]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 21:55:41.369002 initrd-setup-root[1214]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 21:55:41.558995 systemd[1]: Finished initrd-setup-root.service. Feb 12 21:55:41.567367 kernel: audit: type=1130 audit(1707774941.557:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.560729 systemd[1]: Starting ignition-mount.service... Feb 12 21:55:41.570978 systemd[1]: Starting sysroot-boot.service... Feb 12 21:55:41.576124 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 21:55:41.576506 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 21:55:41.611090 ignition[1233]: INFO : Ignition 2.14.0 Feb 12 21:55:41.611090 ignition[1233]: INFO : Stage: mount Feb 12 21:55:41.617279 ignition[1233]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:55:41.617279 ignition[1233]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:55:41.622526 systemd[1]: Finished sysroot-boot.service. Feb 12 21:55:41.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.629504 ignition[1233]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:55:41.629504 ignition[1233]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:55:41.634573 kernel: audit: type=1130 audit(1707774941.622:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.634609 ignition[1233]: INFO : PUT result: OK Feb 12 21:55:41.639873 ignition[1233]: INFO : mount: mount passed Feb 12 21:55:41.641805 ignition[1233]: INFO : Ignition finished successfully Feb 12 21:55:41.643242 systemd[1]: Finished ignition-mount.service. Feb 12 21:55:41.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.646768 systemd[1]: Starting ignition-files.service... Feb 12 21:55:41.653602 kernel: audit: type=1130 audit(1707774941.643:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.659623 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 21:55:41.679212 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1243) Feb 12 21:55:41.681205 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 21:55:41.681254 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 21:55:41.683569 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 21:55:41.693269 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 21:55:41.696209 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 21:55:41.712653 ignition[1262]: INFO : Ignition 2.14.0 Feb 12 21:55:41.712653 ignition[1262]: INFO : Stage: files Feb 12 21:55:41.714716 ignition[1262]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:55:41.714716 ignition[1262]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:55:41.728677 ignition[1262]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:55:41.731061 ignition[1262]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:55:41.733049 ignition[1262]: INFO : PUT result: OK Feb 12 21:55:41.736491 ignition[1262]: DEBUG : files: compiled without relabeling support, skipping Feb 12 21:55:41.741005 ignition[1262]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 21:55:41.741005 ignition[1262]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 21:55:41.753093 ignition[1262]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 21:55:41.754861 ignition[1262]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 21:55:41.756962 unknown[1262]: wrote ssh authorized keys file for user: core Feb 12 21:55:41.758471 ignition[1262]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 21:55:41.761174 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 21:55:41.765312 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 21:55:41.771585 ignition[1262]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem870636581" Feb 12 21:55:41.777229 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1262) Feb 12 21:55:41.777256 ignition[1262]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem870636581": device or resource busy Feb 12 21:55:41.777256 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem870636581", trying btrfs: device or resource busy Feb 12 21:55:41.777256 ignition[1262]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem870636581" Feb 12 21:55:41.777256 ignition[1262]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem870636581" Feb 12 21:55:41.786408 ignition[1262]: INFO : op(3): [started] unmounting "/mnt/oem870636581" Feb 12 21:55:41.788825 ignition[1262]: INFO : op(3): [finished] unmounting "/mnt/oem870636581" Feb 12 21:55:41.788825 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 21:55:41.788825 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 21:55:41.788825 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 21:55:41.788825 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 21:55:41.788825 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 21:55:41.812608 ignition[1262]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2712765013" Feb 12 21:55:41.812608 ignition[1262]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2712765013": device or resource busy Feb 12 21:55:41.812608 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2712765013", trying btrfs: device or resource busy Feb 12 21:55:41.812608 ignition[1262]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2712765013" Feb 12 21:55:41.831218 ignition[1262]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2712765013" Feb 12 21:55:41.831218 ignition[1262]: INFO : op(6): [started] unmounting "/mnt/oem2712765013" Feb 12 21:55:41.831218 ignition[1262]: INFO : op(6): [finished] unmounting "/mnt/oem2712765013" Feb 12 21:55:41.831218 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 21:55:41.831218 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 21:55:41.831218 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 21:55:41.847282 ignition[1262]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1309522836" Feb 12 21:55:41.849100 ignition[1262]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1309522836": device or resource busy Feb 12 21:55:41.849100 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1309522836", trying btrfs: device or resource busy Feb 12 21:55:41.849100 ignition[1262]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1309522836" Feb 12 21:55:41.856068 ignition[1262]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1309522836" Feb 12 21:55:41.856068 ignition[1262]: INFO : op(9): [started] unmounting "/mnt/oem1309522836" Feb 12 21:55:41.856068 ignition[1262]: INFO : op(9): [finished] unmounting "/mnt/oem1309522836" Feb 12 21:55:41.856068 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 21:55:41.866138 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 21:55:41.866138 ignition[1262]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 21:55:41.874569 ignition[1262]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem639342391" Feb 12 21:55:41.876404 ignition[1262]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem639342391": device or resource busy Feb 12 21:55:41.876404 ignition[1262]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem639342391", trying btrfs: device or resource busy Feb 12 21:55:41.876404 ignition[1262]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem639342391" Feb 12 21:55:41.876404 ignition[1262]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem639342391" Feb 12 21:55:41.876404 ignition[1262]: INFO : op(c): [started] unmounting "/mnt/oem639342391" Feb 12 21:55:41.876404 ignition[1262]: INFO : op(c): [finished] unmounting "/mnt/oem639342391" Feb 12 21:55:41.876404 ignition[1262]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(8): [started] processing unit "nvidia.service" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(8): [finished] processing unit "nvidia.service" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(9): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(9): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(a): [started] processing unit "amazon-ssm-agent.service" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(a): op(b): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(a): op(b): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(a): [finished] processing unit "amazon-ssm-agent.service" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(c): [started] setting preset to enabled for "nvidia.service" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(c): [finished] setting preset to enabled for "nvidia.service" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(d): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(d): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(e): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: op(e): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 21:55:41.893492 ignition[1262]: INFO : files: files passed Feb 12 21:55:41.893492 ignition[1262]: INFO : Ignition finished successfully Feb 12 21:55:41.951365 kernel: audit: type=1130 audit(1707774941.901:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.951395 kernel: audit: type=1130 audit(1707774941.939:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.951408 kernel: audit: type=1131 audit(1707774941.939:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.897973 systemd[1]: Finished ignition-files.service. Feb 12 21:55:41.960968 kernel: audit: type=1130 audit(1707774941.952:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.911824 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 21:55:41.928667 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 21:55:41.966999 initrd-setup-root-after-ignition[1287]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 21:55:41.930638 systemd[1]: Starting ignition-quench.service... Feb 12 21:55:41.937805 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 21:55:41.937944 systemd[1]: Finished ignition-quench.service. Feb 12 21:55:41.941031 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 21:55:41.955547 systemd[1]: Reached target ignition-complete.target. Feb 12 21:55:41.967483 systemd[1]: Starting initrd-parse-etc.service... Feb 12 21:55:41.986315 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 21:55:41.986421 systemd[1]: Finished initrd-parse-etc.service. Feb 12 21:55:41.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:41.989241 systemd[1]: Reached target initrd-fs.target. Feb 12 21:55:41.992017 systemd[1]: Reached target initrd.target. Feb 12 21:55:41.994564 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 21:55:41.998965 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 21:55:42.022550 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 21:55:42.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.025303 systemd[1]: Starting initrd-cleanup.service... Feb 12 21:55:42.041825 systemd[1]: Stopped target nss-lookup.target. Feb 12 21:55:42.044051 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 21:55:42.046524 systemd[1]: Stopped target timers.target. Feb 12 21:55:42.048526 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 21:55:42.049872 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 21:55:42.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.052163 systemd[1]: Stopped target initrd.target. Feb 12 21:55:42.053961 systemd[1]: Stopped target basic.target. Feb 12 21:55:42.055857 systemd[1]: Stopped target ignition-complete.target. Feb 12 21:55:42.057260 systemd[1]: Stopped target ignition-diskful.target. Feb 12 21:55:42.060335 systemd[1]: Stopped target initrd-root-device.target. Feb 12 21:55:42.062945 systemd[1]: Stopped target remote-fs.target. Feb 12 21:55:42.065028 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 21:55:42.067318 systemd[1]: Stopped target sysinit.target. Feb 12 21:55:42.069104 systemd[1]: Stopped target local-fs.target. Feb 12 21:55:42.070884 systemd[1]: Stopped target local-fs-pre.target. Feb 12 21:55:42.072296 systemd[1]: Stopped target swap.target. Feb 12 21:55:42.073952 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 21:55:42.074065 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 21:55:42.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.080991 systemd[1]: Stopped target cryptsetup.target. Feb 12 21:55:42.082969 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 21:55:42.084205 systemd[1]: Stopped dracut-initqueue.service. Feb 12 21:55:42.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.086123 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 21:55:42.087584 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 21:55:42.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.087801 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 21:55:42.089925 systemd[1]: Stopped ignition-files.service. Feb 12 21:55:42.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.094762 systemd[1]: Stopping ignition-mount.service... Feb 12 21:55:42.107356 ignition[1300]: INFO : Ignition 2.14.0 Feb 12 21:55:42.107356 ignition[1300]: INFO : Stage: umount Feb 12 21:55:42.107356 ignition[1300]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 21:55:42.107356 ignition[1300]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 21:55:42.097255 systemd[1]: Stopping sysroot-boot.service... Feb 12 21:55:42.098472 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 21:55:42.098679 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 21:55:42.100322 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 21:55:42.100666 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 21:55:42.106858 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 21:55:42.126341 ignition[1300]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 21:55:42.126341 ignition[1300]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 21:55:42.107007 systemd[1]: Finished initrd-cleanup.service. Feb 12 21:55:42.132562 ignition[1300]: INFO : PUT result: OK Feb 12 21:55:42.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.137315 ignition[1300]: INFO : umount: umount passed Feb 12 21:55:42.137315 ignition[1300]: INFO : Ignition finished successfully Feb 12 21:55:42.140335 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 21:55:42.141110 systemd[1]: Stopped ignition-mount.service. Feb 12 21:55:42.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.145060 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 21:55:42.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.145138 systemd[1]: Stopped ignition-disks.service. Feb 12 21:55:42.151386 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 21:55:42.151450 systemd[1]: Stopped ignition-kargs.service. Feb 12 21:55:42.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.157390 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 21:55:42.157458 systemd[1]: Stopped ignition-fetch.service. Feb 12 21:55:42.157707 systemd[1]: Stopped target network.target. Feb 12 21:55:42.158412 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 21:55:42.158469 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 21:55:42.158694 systemd[1]: Stopped target paths.target. Feb 12 21:55:42.158846 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 21:55:42.162374 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 21:55:42.168098 systemd[1]: Stopped target slices.target. Feb 12 21:55:42.168947 systemd[1]: Stopped target sockets.target. Feb 12 21:55:42.170009 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 21:55:42.170054 systemd[1]: Closed iscsid.socket. Feb 12 21:55:42.171574 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 21:55:42.172339 systemd[1]: Closed iscsiuio.socket. Feb 12 21:55:42.189895 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 21:55:42.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.190148 systemd[1]: Stopped ignition-setup.service. Feb 12 21:55:42.192545 systemd[1]: Stopping systemd-networkd.service... Feb 12 21:55:42.193801 systemd[1]: Stopping systemd-resolved.service... Feb 12 21:55:42.199055 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 21:55:42.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.199206 systemd[1]: Stopped systemd-resolved.service. Feb 12 21:55:42.202000 audit: BPF prog-id=6 op=UNLOAD Feb 12 21:55:42.202231 systemd-networkd[1104]: eth0: DHCPv6 lease lost Feb 12 21:55:42.209752 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 21:55:42.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.209861 systemd[1]: Stopped systemd-networkd.service. Feb 12 21:55:42.215028 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 21:55:42.215084 systemd[1]: Closed systemd-networkd.socket. Feb 12 21:55:42.219000 audit: BPF prog-id=9 op=UNLOAD Feb 12 21:55:42.224571 systemd[1]: Stopping network-cleanup.service... Feb 12 21:55:42.225774 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 21:55:42.225895 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 21:55:42.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.234656 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 21:55:42.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.234713 systemd[1]: Stopped systemd-sysctl.service. Feb 12 21:55:42.236048 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 21:55:42.236093 systemd[1]: Stopped systemd-modules-load.service. Feb 12 21:55:42.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.241649 systemd[1]: Stopping systemd-udevd.service... Feb 12 21:55:42.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.243070 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 21:55:42.243152 systemd[1]: Stopped sysroot-boot.service. Feb 12 21:55:42.244848 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 21:55:42.244910 systemd[1]: Stopped initrd-setup-root.service. Feb 12 21:55:42.253291 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 21:55:42.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.253384 systemd[1]: Stopped network-cleanup.service. Feb 12 21:55:42.258519 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 21:55:42.258598 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 21:55:42.261965 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 21:55:42.265490 systemd[1]: Stopped systemd-udevd.service. Feb 12 21:55:42.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.265944 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 21:55:42.265980 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 21:55:42.271350 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 21:55:42.271389 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 21:55:42.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.275873 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 21:55:42.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.277668 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 21:55:42.280139 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 21:55:42.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.280450 systemd[1]: Stopped dracut-cmdline.service. Feb 12 21:55:42.282803 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 21:55:42.282846 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 21:55:42.288956 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 21:55:42.297550 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 21:55:42.298279 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 21:55:42.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.313470 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 21:55:42.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.313634 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 21:55:42.315943 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 21:55:42.316018 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 21:55:42.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.323851 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 21:55:42.333441 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 21:55:42.333539 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 21:55:42.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:42.336714 systemd[1]: Reached target initrd-switch-root.target. Feb 12 21:55:42.342784 systemd[1]: Starting initrd-switch-root.service... Feb 12 21:55:42.364380 systemd[1]: Switching root. Feb 12 21:55:42.395305 iscsid[1111]: iscsid shutting down. Feb 12 21:55:42.396280 systemd-journald[184]: Received SIGTERM from PID 1 (n/a). Feb 12 21:55:42.396364 systemd-journald[184]: Journal stopped Feb 12 21:55:47.700091 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 21:55:47.703250 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 21:55:47.703342 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 21:55:47.703375 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 21:55:47.703395 kernel: SELinux: policy capability open_perms=1 Feb 12 21:55:47.703420 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 21:55:47.703440 kernel: SELinux: policy capability always_check_network=0 Feb 12 21:55:47.703459 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 21:55:47.703478 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 21:55:47.703498 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 21:55:47.703520 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 21:55:47.703547 systemd[1]: Successfully loaded SELinux policy in 95.591ms. Feb 12 21:55:47.703578 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 19.858ms. Feb 12 21:55:47.703686 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 21:55:47.703717 systemd[1]: Detected virtualization amazon. Feb 12 21:55:47.703736 systemd[1]: Detected architecture x86-64. Feb 12 21:55:47.703755 systemd[1]: Detected first boot. Feb 12 21:55:47.703776 systemd[1]: Initializing machine ID from VM UUID. Feb 12 21:55:47.703799 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 21:55:47.703817 systemd[1]: Populated /etc with preset unit settings. Feb 12 21:55:47.703837 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 21:55:47.703857 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 21:55:47.703879 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 21:55:47.703898 kernel: kauditd_printk_skb: 53 callbacks suppressed Feb 12 21:55:47.703917 kernel: audit: type=1334 audit(1707774947.363:87): prog-id=12 op=LOAD Feb 12 21:55:47.703937 kernel: audit: type=1334 audit(1707774947.363:88): prog-id=3 op=UNLOAD Feb 12 21:55:47.703954 kernel: audit: type=1334 audit(1707774947.365:89): prog-id=13 op=LOAD Feb 12 21:55:47.703970 kernel: audit: type=1334 audit(1707774947.366:90): prog-id=14 op=LOAD Feb 12 21:55:47.703987 kernel: audit: type=1334 audit(1707774947.366:91): prog-id=4 op=UNLOAD Feb 12 21:55:47.704005 kernel: audit: type=1334 audit(1707774947.366:92): prog-id=5 op=UNLOAD Feb 12 21:55:47.704022 kernel: audit: type=1334 audit(1707774947.369:93): prog-id=15 op=LOAD Feb 12 21:55:47.704042 kernel: audit: type=1334 audit(1707774947.369:94): prog-id=12 op=UNLOAD Feb 12 21:55:47.704060 kernel: audit: type=1334 audit(1707774947.371:95): prog-id=16 op=LOAD Feb 12 21:55:47.704083 kernel: audit: type=1334 audit(1707774947.373:96): prog-id=17 op=LOAD Feb 12 21:55:47.704103 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 21:55:47.704122 systemd[1]: Stopped iscsiuio.service. Feb 12 21:55:47.704142 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 21:55:47.704165 systemd[1]: Stopped iscsid.service. Feb 12 21:55:47.704349 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 21:55:47.704377 systemd[1]: Stopped initrd-switch-root.service. Feb 12 21:55:47.704398 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 21:55:47.704422 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 21:55:47.704442 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 21:55:47.704463 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 21:55:47.704485 systemd[1]: Created slice system-getty.slice. Feb 12 21:55:47.704506 systemd[1]: Created slice system-modprobe.slice. Feb 12 21:55:47.704529 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 21:55:47.704550 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 21:55:47.704571 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 21:55:47.704595 systemd[1]: Created slice user.slice. Feb 12 21:55:47.704618 systemd[1]: Started systemd-ask-password-console.path. Feb 12 21:55:47.704639 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 21:55:47.704659 systemd[1]: Set up automount boot.automount. Feb 12 21:55:47.704678 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 21:55:47.704707 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 21:55:47.704728 systemd[1]: Stopped target initrd-fs.target. Feb 12 21:55:47.704748 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 21:55:47.704770 systemd[1]: Reached target integritysetup.target. Feb 12 21:55:47.704794 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 21:55:47.704815 systemd[1]: Reached target remote-fs.target. Feb 12 21:55:47.704837 systemd[1]: Reached target slices.target. Feb 12 21:55:47.704857 systemd[1]: Reached target swap.target. Feb 12 21:55:47.704879 systemd[1]: Reached target torcx.target. Feb 12 21:55:47.704900 systemd[1]: Reached target veritysetup.target. Feb 12 21:55:47.704920 systemd[1]: Listening on systemd-coredump.socket. Feb 12 21:55:47.704939 systemd[1]: Listening on systemd-initctl.socket. Feb 12 21:55:47.704960 systemd[1]: Listening on systemd-networkd.socket. Feb 12 21:55:47.704978 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 21:55:47.704999 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 21:55:47.705019 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 21:55:47.705040 systemd[1]: Mounting dev-hugepages.mount... Feb 12 21:55:47.705062 systemd[1]: Mounting dev-mqueue.mount... Feb 12 21:55:47.705080 systemd[1]: Mounting media.mount... Feb 12 21:55:47.705100 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 21:55:47.705120 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 21:55:47.705140 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 21:55:47.705159 systemd[1]: Mounting tmp.mount... Feb 12 21:55:47.705181 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 21:55:47.705226 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 21:55:47.705247 systemd[1]: Starting kmod-static-nodes.service... Feb 12 21:55:47.705265 systemd[1]: Starting modprobe@configfs.service... Feb 12 21:55:47.705284 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 21:55:47.705303 systemd[1]: Starting modprobe@drm.service... Feb 12 21:55:47.705322 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 21:55:47.705341 systemd[1]: Starting modprobe@fuse.service... Feb 12 21:55:47.705360 systemd[1]: Starting modprobe@loop.service... Feb 12 21:55:47.705384 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 21:55:47.705403 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 21:55:47.705424 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 21:55:47.705446 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 21:55:47.705467 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 21:55:47.705489 systemd[1]: Stopped systemd-journald.service. Feb 12 21:55:47.705509 systemd[1]: Starting systemd-journald.service... Feb 12 21:55:47.705528 systemd[1]: Starting systemd-modules-load.service... Feb 12 21:55:47.705550 systemd[1]: Starting systemd-network-generator.service... Feb 12 21:55:47.705739 systemd[1]: Starting systemd-remount-fs.service... Feb 12 21:55:47.705763 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 21:55:47.705784 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 21:55:47.705804 systemd[1]: Stopped verity-setup.service. Feb 12 21:55:47.705826 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 21:55:47.705844 systemd[1]: Mounted dev-hugepages.mount. Feb 12 21:55:47.705865 systemd[1]: Mounted dev-mqueue.mount. Feb 12 21:55:47.705886 systemd[1]: Mounted media.mount. Feb 12 21:55:47.705904 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 21:55:47.705927 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 21:55:47.705946 systemd[1]: Mounted tmp.mount. Feb 12 21:55:47.705966 systemd[1]: Finished kmod-static-nodes.service. Feb 12 21:55:47.705987 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 21:55:47.706006 systemd[1]: Finished modprobe@configfs.service. Feb 12 21:55:47.706030 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 21:55:47.706051 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 21:55:47.706072 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 21:55:47.706091 kernel: loop: module loaded Feb 12 21:55:47.706113 systemd[1]: Finished modprobe@drm.service. Feb 12 21:55:47.706133 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 21:55:47.706154 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 21:55:47.706175 kernel: fuse: init (API version 7.34) Feb 12 21:55:47.706223 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 21:55:47.706258 systemd-journald[1410]: Journal started Feb 12 21:55:47.706345 systemd-journald[1410]: Runtime Journal (/run/log/journal/ec2ba6af08653c1f6a28b43a794fbf6f) is 4.8M, max 38.7M, 33.9M free. Feb 12 21:55:43.119000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 21:55:43.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 21:55:43.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 21:55:43.310000 audit: BPF prog-id=10 op=LOAD Feb 12 21:55:43.310000 audit: BPF prog-id=10 op=UNLOAD Feb 12 21:55:43.311000 audit: BPF prog-id=11 op=LOAD Feb 12 21:55:43.311000 audit: BPF prog-id=11 op=UNLOAD Feb 12 21:55:43.544000 audit[1335]: AVC avc: denied { associate } for pid=1335 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 21:55:43.544000 audit[1335]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8ac a1=c0000cede0 a2=c0000d7ac0 a3=32 items=0 ppid=1318 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:55:43.544000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 21:55:43.548000 audit[1335]: AVC avc: denied { associate } for pid=1335 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 21:55:43.548000 audit[1335]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d985 a2=1ed a3=0 items=2 ppid=1318 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:55:43.548000 audit: CWD cwd="/" Feb 12 21:55:43.548000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:47.709866 systemd[1]: Finished modprobe@loop.service. Feb 12 21:55:43.548000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:43.548000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 21:55:47.363000 audit: BPF prog-id=12 op=LOAD Feb 12 21:55:47.363000 audit: BPF prog-id=3 op=UNLOAD Feb 12 21:55:47.365000 audit: BPF prog-id=13 op=LOAD Feb 12 21:55:47.712238 systemd[1]: Started systemd-journald.service. Feb 12 21:55:47.366000 audit: BPF prog-id=14 op=LOAD Feb 12 21:55:47.366000 audit: BPF prog-id=4 op=UNLOAD Feb 12 21:55:47.366000 audit: BPF prog-id=5 op=UNLOAD Feb 12 21:55:47.369000 audit: BPF prog-id=15 op=LOAD Feb 12 21:55:47.369000 audit: BPF prog-id=12 op=UNLOAD Feb 12 21:55:47.371000 audit: BPF prog-id=16 op=LOAD Feb 12 21:55:47.373000 audit: BPF prog-id=17 op=LOAD Feb 12 21:55:47.373000 audit: BPF prog-id=13 op=UNLOAD Feb 12 21:55:47.373000 audit: BPF prog-id=14 op=UNLOAD Feb 12 21:55:47.379000 audit: BPF prog-id=18 op=LOAD Feb 12 21:55:47.379000 audit: BPF prog-id=15 op=UNLOAD Feb 12 21:55:47.379000 audit: BPF prog-id=19 op=LOAD Feb 12 21:55:47.380000 audit: BPF prog-id=20 op=LOAD Feb 12 21:55:47.380000 audit: BPF prog-id=16 op=UNLOAD Feb 12 21:55:47.380000 audit: BPF prog-id=17 op=UNLOAD Feb 12 21:55:47.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.384000 audit: BPF prog-id=18 op=UNLOAD Feb 12 21:55:47.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.596000 audit: BPF prog-id=21 op=LOAD Feb 12 21:55:47.597000 audit: BPF prog-id=22 op=LOAD Feb 12 21:55:47.597000 audit: BPF prog-id=23 op=LOAD Feb 12 21:55:47.597000 audit: BPF prog-id=19 op=UNLOAD Feb 12 21:55:47.597000 audit: BPF prog-id=20 op=UNLOAD Feb 12 21:55:47.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.693000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 21:55:47.693000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd4d455d90 a2=4000 a3=7ffd4d455e2c items=0 ppid=1 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:55:47.693000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 21:55:47.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.363309 systemd[1]: Queued start job for default target multi-user.target. Feb 12 21:55:43.524580 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 21:55:47.381824 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 21:55:43.525336 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 21:55:47.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.714707 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 21:55:43.525412 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 21:55:47.714879 systemd[1]: Finished modprobe@fuse.service. Feb 12 21:55:43.525458 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 21:55:47.717336 systemd[1]: Finished systemd-network-generator.service. Feb 12 21:55:43.525474 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 21:55:47.719256 systemd[1]: Finished systemd-remount-fs.service. Feb 12 21:55:43.525518 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 21:55:43.525538 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 21:55:47.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:43.525790 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 21:55:47.721587 systemd[1]: Reached target network-pre.target. Feb 12 21:55:43.525844 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 21:55:43.525864 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 21:55:47.724639 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 21:55:43.535560 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 21:55:47.729818 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 21:55:43.535651 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 21:55:47.733490 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 21:55:43.535706 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 21:55:43.535730 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 21:55:43.535760 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 21:55:43.535886 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:43Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 21:55:46.821917 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:46Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 21:55:46.822165 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:46Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 21:55:46.822298 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:46Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 21:55:47.738360 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 21:55:46.822481 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:46Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 21:55:46.822530 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:46Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 21:55:46.822589 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-12T21:55:46Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 21:55:47.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.778323 systemd-journald[1410]: Time spent on flushing to /var/log/journal/ec2ba6af08653c1f6a28b43a794fbf6f is 96.592ms for 1161 entries. Feb 12 21:55:47.778323 systemd-journald[1410]: System Journal (/var/log/journal/ec2ba6af08653c1f6a28b43a794fbf6f) is 8.0M, max 195.6M, 187.6M free. Feb 12 21:55:47.896325 systemd-journald[1410]: Received client request to flush runtime journal. Feb 12 21:55:47.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.741052 systemd[1]: Starting systemd-journal-flush.service... Feb 12 21:55:47.742344 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 21:55:47.743897 systemd[1]: Starting systemd-random-seed.service... Feb 12 21:55:47.745164 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 21:55:47.748043 systemd[1]: Finished systemd-modules-load.service. Feb 12 21:55:47.749996 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 21:55:47.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.751388 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 21:55:47.754486 systemd[1]: Starting systemd-sysctl.service... Feb 12 21:55:47.767550 systemd[1]: Finished systemd-random-seed.service. Feb 12 21:55:47.769122 systemd[1]: Reached target first-boot-complete.target. Feb 12 21:55:47.807093 systemd[1]: Finished systemd-sysctl.service. Feb 12 21:55:47.877442 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 21:55:47.882446 systemd[1]: Starting systemd-sysusers.service... Feb 12 21:55:47.898230 systemd[1]: Finished systemd-journal-flush.service. Feb 12 21:55:47.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.902724 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 21:55:47.906423 systemd[1]: Starting systemd-udev-settle.service... Feb 12 21:55:47.920916 udevadm[1450]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 21:55:47.978249 systemd[1]: Finished systemd-sysusers.service. Feb 12 21:55:47.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:47.981137 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 21:55:48.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:48.054798 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 21:55:48.728405 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 21:55:48.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:48.729000 audit: BPF prog-id=24 op=LOAD Feb 12 21:55:48.729000 audit: BPF prog-id=25 op=LOAD Feb 12 21:55:48.729000 audit: BPF prog-id=7 op=UNLOAD Feb 12 21:55:48.729000 audit: BPF prog-id=8 op=UNLOAD Feb 12 21:55:48.731475 systemd[1]: Starting systemd-udevd.service... Feb 12 21:55:48.763280 systemd-udevd[1453]: Using default interface naming scheme 'v252'. Feb 12 21:55:48.837082 systemd[1]: Started systemd-udevd.service. Feb 12 21:55:48.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:48.839000 audit: BPF prog-id=26 op=LOAD Feb 12 21:55:48.841717 systemd[1]: Starting systemd-networkd.service... Feb 12 21:55:48.868000 audit: BPF prog-id=27 op=LOAD Feb 12 21:55:48.868000 audit: BPF prog-id=28 op=LOAD Feb 12 21:55:48.868000 audit: BPF prog-id=29 op=LOAD Feb 12 21:55:48.871218 systemd[1]: Starting systemd-userdbd.service... Feb 12 21:55:48.938297 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 21:55:48.962764 (udev-worker)[1454]: Network interface NamePolicy= disabled on kernel command line. Feb 12 21:55:48.975583 systemd[1]: Started systemd-userdbd.service. Feb 12 21:55:48.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:49.027249 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 21:55:49.046406 kernel: ACPI: button: Power Button [PWRF] Feb 12 21:55:49.046495 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Feb 12 21:55:49.052208 kernel: ACPI: button: Sleep Button [SLPF] Feb 12 21:55:49.094000 audit[1464]: AVC avc: denied { confidentiality } for pid=1464 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 21:55:49.094000 audit[1464]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5560483a04b0 a1=32194 a2=7f45efc5fbc5 a3=5 items=108 ppid=1453 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:55:49.094000 audit: CWD cwd="/" Feb 12 21:55:49.094000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=1 name=(null) inode=14539 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=2 name=(null) inode=14539 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=3 name=(null) inode=14540 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=4 name=(null) inode=14539 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=5 name=(null) inode=14541 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=6 name=(null) inode=14539 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=7 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=8 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=9 name=(null) inode=14543 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=10 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=11 name=(null) inode=14544 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=12 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=13 name=(null) inode=14545 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=14 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=15 name=(null) inode=14546 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=16 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=17 name=(null) inode=14547 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=18 name=(null) inode=14539 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=19 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=20 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=21 name=(null) inode=14549 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=22 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=23 name=(null) inode=14550 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=24 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=25 name=(null) inode=14551 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=26 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=27 name=(null) inode=14552 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=28 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=29 name=(null) inode=14553 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=30 name=(null) inode=14539 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=31 name=(null) inode=14554 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=32 name=(null) inode=14554 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=33 name=(null) inode=14555 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=34 name=(null) inode=14554 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=35 name=(null) inode=14556 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=36 name=(null) inode=14554 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=37 name=(null) inode=14557 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=38 name=(null) inode=14554 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=39 name=(null) inode=14558 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=40 name=(null) inode=14554 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=41 name=(null) inode=14559 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=42 name=(null) inode=14539 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=43 name=(null) inode=14560 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=44 name=(null) inode=14560 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=45 name=(null) inode=14561 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=46 name=(null) inode=14560 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=47 name=(null) inode=14562 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=48 name=(null) inode=14560 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=49 name=(null) inode=14563 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=50 name=(null) inode=14560 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=51 name=(null) inode=14564 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=52 name=(null) inode=14560 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=53 name=(null) inode=14565 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=55 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=56 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=57 name=(null) inode=14567 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=58 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=59 name=(null) inode=14568 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=60 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=61 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=62 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=63 name=(null) inode=14570 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=64 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=65 name=(null) inode=14571 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=66 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=67 name=(null) inode=14572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=68 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=69 name=(null) inode=14573 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=70 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=71 name=(null) inode=14574 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=72 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=73 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=74 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=75 name=(null) inode=14576 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=76 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=77 name=(null) inode=14577 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=78 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=79 name=(null) inode=14578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=80 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=81 name=(null) inode=14579 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=82 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=83 name=(null) inode=14580 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=84 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=85 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=86 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=87 name=(null) inode=14582 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=88 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=89 name=(null) inode=14583 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=90 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=91 name=(null) inode=14584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=92 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=93 name=(null) inode=14585 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=94 name=(null) inode=14581 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=95 name=(null) inode=14586 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=96 name=(null) inode=14566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=97 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=98 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=99 name=(null) inode=14588 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=100 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=101 name=(null) inode=14589 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=102 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=103 name=(null) inode=14590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=104 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=105 name=(null) inode=14591 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=106 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PATH item=107 name=(null) inode=14592 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 21:55:49.094000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 21:55:49.129598 systemd-networkd[1462]: lo: Link UP Feb 12 21:55:49.129608 systemd-networkd[1462]: lo: Gained carrier Feb 12 21:55:49.130790 systemd-networkd[1462]: Enumeration completed Feb 12 21:55:49.130931 systemd[1]: Started systemd-networkd.service. Feb 12 21:55:49.130947 systemd-networkd[1462]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 21:55:49.135121 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 21:55:49.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:49.145210 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 21:55:49.139959 systemd-networkd[1462]: eth0: Link UP Feb 12 21:55:49.140296 systemd-networkd[1462]: eth0: Gained carrier Feb 12 21:55:49.149458 systemd-networkd[1462]: eth0: DHCPv4 address 172.31.28.89/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 21:55:49.158369 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Feb 12 21:55:49.174218 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Feb 12 21:55:49.180211 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 21:55:49.213214 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1464) Feb 12 21:55:49.339737 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 21:55:49.461676 systemd[1]: Finished systemd-udev-settle.service. Feb 12 21:55:49.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:49.465529 systemd[1]: Starting lvm2-activation-early.service... Feb 12 21:55:49.509075 lvm[1567]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 21:55:49.542393 systemd[1]: Finished lvm2-activation-early.service. Feb 12 21:55:49.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:49.543791 systemd[1]: Reached target cryptsetup.target. Feb 12 21:55:49.547570 systemd[1]: Starting lvm2-activation.service... Feb 12 21:55:49.555626 lvm[1568]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 21:55:49.577255 systemd[1]: Finished lvm2-activation.service. Feb 12 21:55:49.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:49.578539 systemd[1]: Reached target local-fs-pre.target. Feb 12 21:55:49.579797 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 21:55:49.579835 systemd[1]: Reached target local-fs.target. Feb 12 21:55:49.580945 systemd[1]: Reached target machines.target. Feb 12 21:55:49.583996 systemd[1]: Starting ldconfig.service... Feb 12 21:55:49.585617 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 21:55:49.585701 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 21:55:49.587400 systemd[1]: Starting systemd-boot-update.service... Feb 12 21:55:49.589838 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 21:55:49.595255 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 21:55:49.597875 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 21:55:49.597976 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 21:55:49.601606 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 21:55:49.607956 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1570 (bootctl) Feb 12 21:55:49.612580 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 21:55:49.632011 systemd-tmpfiles[1573]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 21:55:49.653198 systemd-tmpfiles[1573]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 21:55:49.656525 systemd-tmpfiles[1573]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 21:55:49.664678 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 21:55:49.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:49.695733 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 21:55:49.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:49.698395 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 21:55:49.758595 systemd-fsck[1579]: fsck.fat 4.2 (2021-01-31) Feb 12 21:55:49.758595 systemd-fsck[1579]: /dev/nvme0n1p1: 789 files, 115339/258078 clusters Feb 12 21:55:49.761975 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 21:55:49.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:49.765228 systemd[1]: Mounting boot.mount... Feb 12 21:55:49.781211 systemd[1]: Mounted boot.mount. Feb 12 21:55:49.812460 systemd[1]: Finished systemd-boot-update.service. Feb 12 21:55:49.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:49.909401 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 21:55:49.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:49.912303 systemd[1]: Starting audit-rules.service... Feb 12 21:55:49.915934 systemd[1]: Starting clean-ca-certificates.service... Feb 12 21:55:49.919266 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 21:55:49.920000 audit: BPF prog-id=30 op=LOAD Feb 12 21:55:49.924000 audit: BPF prog-id=31 op=LOAD Feb 12 21:55:49.923375 systemd[1]: Starting systemd-resolved.service... Feb 12 21:55:49.927347 systemd[1]: Starting systemd-timesyncd.service... Feb 12 21:55:49.930500 systemd[1]: Starting systemd-update-utmp.service... Feb 12 21:55:49.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:49.962973 systemd[1]: Finished clean-ca-certificates.service. Feb 12 21:55:49.964482 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 21:55:49.986000 audit[1599]: SYSTEM_BOOT pid=1599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 21:55:49.991470 systemd[1]: Finished systemd-update-utmp.service. Feb 12 21:55:49.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:50.047867 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 21:55:50.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:55:50.100000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 21:55:50.100000 audit[1613]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd45d75d0 a2=420 a3=0 items=0 ppid=1593 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:55:50.100000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 21:55:50.102965 augenrules[1613]: No rules Feb 12 21:55:50.104455 systemd[1]: Finished audit-rules.service. Feb 12 21:55:50.111928 systemd[1]: Started systemd-timesyncd.service. Feb 12 21:55:50.113327 systemd[1]: Reached target time-set.target. Feb 12 21:55:50.123759 systemd-resolved[1596]: Positive Trust Anchors: Feb 12 21:55:50.124114 systemd-resolved[1596]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 21:55:50.124215 systemd-resolved[1596]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 21:55:50.143690 systemd-resolved[1596]: Defaulting to hostname 'linux'. Feb 12 21:55:50.146261 systemd[1]: Started systemd-resolved.service. Feb 12 21:55:50.147392 systemd[1]: Reached target network.target. Feb 12 21:55:50.148582 systemd[1]: Reached target nss-lookup.target. Feb 12 21:55:50.188546 systemd-timesyncd[1597]: Contacted time server 51.81.209.232:123 (0.flatcar.pool.ntp.org). Feb 12 21:55:50.188732 systemd-timesyncd[1597]: Initial clock synchronization to Mon 2024-02-12 21:55:50.461749 UTC. Feb 12 21:55:50.514665 ldconfig[1569]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 21:55:50.527127 systemd[1]: Finished ldconfig.service. Feb 12 21:55:50.529662 systemd[1]: Starting systemd-update-done.service... Feb 12 21:55:50.544883 systemd[1]: Finished systemd-update-done.service. Feb 12 21:55:50.546073 systemd[1]: Reached target sysinit.target. Feb 12 21:55:50.549489 systemd[1]: Started motdgen.path. Feb 12 21:55:50.550573 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 21:55:50.552485 systemd[1]: Started logrotate.timer. Feb 12 21:55:50.557206 systemd[1]: Started mdadm.timer. Feb 12 21:55:50.558117 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 21:55:50.559427 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 21:55:50.559479 systemd[1]: Reached target paths.target. Feb 12 21:55:50.560842 systemd[1]: Reached target timers.target. Feb 12 21:55:50.562689 systemd[1]: Listening on dbus.socket. Feb 12 21:55:50.564994 systemd[1]: Starting docker.socket... Feb 12 21:55:50.572902 systemd[1]: Listening on sshd.socket. Feb 12 21:55:50.574406 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 21:55:50.575343 systemd[1]: Listening on docker.socket. Feb 12 21:55:50.576814 systemd[1]: Reached target sockets.target. Feb 12 21:55:50.577821 systemd[1]: Reached target basic.target. Feb 12 21:55:50.578800 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 21:55:50.578828 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 21:55:50.580382 systemd[1]: Starting containerd.service... Feb 12 21:55:50.582989 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 21:55:50.585773 systemd[1]: Starting dbus.service... Feb 12 21:55:50.587875 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 21:55:50.591628 systemd[1]: Starting extend-filesystems.service... Feb 12 21:55:50.592782 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 21:55:50.594716 systemd[1]: Starting motdgen.service... Feb 12 21:55:50.597388 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 21:55:50.600290 systemd[1]: Starting sshd-keygen.service... Feb 12 21:55:50.608606 systemd[1]: Starting systemd-logind.service... Feb 12 21:55:50.610136 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 21:55:50.610269 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 21:55:50.611009 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 21:55:50.612384 systemd[1]: Starting update-engine.service... Feb 12 21:55:50.615558 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 21:55:50.641906 jq[1625]: false Feb 12 21:55:50.643286 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 21:55:50.643519 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 21:55:50.647981 jq[1632]: true Feb 12 21:55:50.649072 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 21:55:50.649390 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 21:55:50.691956 jq[1641]: true Feb 12 21:55:50.713911 extend-filesystems[1626]: Found nvme0n1 Feb 12 21:55:50.715533 extend-filesystems[1626]: Found nvme0n1p1 Feb 12 21:55:50.715533 extend-filesystems[1626]: Found nvme0n1p2 Feb 12 21:55:50.715533 extend-filesystems[1626]: Found nvme0n1p3 Feb 12 21:55:50.715533 extend-filesystems[1626]: Found usr Feb 12 21:55:50.715533 extend-filesystems[1626]: Found nvme0n1p4 Feb 12 21:55:50.715533 extend-filesystems[1626]: Found nvme0n1p6 Feb 12 21:55:50.715533 extend-filesystems[1626]: Found nvme0n1p7 Feb 12 21:55:50.715533 extend-filesystems[1626]: Found nvme0n1p9 Feb 12 21:55:50.715533 extend-filesystems[1626]: Checking size of /dev/nvme0n1p9 Feb 12 21:55:50.720221 dbus-daemon[1624]: [system] SELinux support is enabled Feb 12 21:55:50.721165 systemd[1]: Started dbus.service. Feb 12 21:55:50.729042 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 21:55:50.729085 systemd[1]: Reached target system-config.target. Feb 12 21:55:50.730437 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 21:55:50.730553 systemd[1]: Reached target user-config.target. Feb 12 21:55:50.743761 dbus-daemon[1624]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.3' (uid=244 pid=1462 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 12 21:55:50.756212 systemd[1]: Starting systemd-hostnamed.service... Feb 12 21:55:50.801110 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 21:55:50.801369 systemd[1]: Finished motdgen.service. Feb 12 21:55:50.807428 bash[1671]: Updated "/home/core/.ssh/authorized_keys" Feb 12 21:55:50.808549 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 21:55:50.812974 extend-filesystems[1626]: Resized partition /dev/nvme0n1p9 Feb 12 21:55:50.822399 update_engine[1631]: I0212 21:55:50.821637 1631 main.cc:92] Flatcar Update Engine starting Feb 12 21:55:50.828208 systemd[1]: Started update-engine.service. Feb 12 21:55:50.828586 update_engine[1631]: I0212 21:55:50.828230 1631 update_check_scheduler.cc:74] Next update check in 2m35s Feb 12 21:55:50.832913 systemd[1]: Started locksmithd.service. Feb 12 21:55:50.848355 env[1636]: time="2024-02-12T21:55:50.848297086Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 21:55:50.849650 extend-filesystems[1676]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 21:55:50.865214 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 12 21:55:50.915341 systemd-networkd[1462]: eth0: Gained IPv6LL Feb 12 21:55:50.918886 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 21:55:50.921405 systemd[1]: Reached target network-online.target. Feb 12 21:55:50.924269 systemd[1]: Started amazon-ssm-agent.service. Feb 12 21:55:50.927380 systemd[1]: Started nvidia.service. Feb 12 21:55:50.930246 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 12 21:55:51.009001 extend-filesystems[1676]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 12 21:55:51.009001 extend-filesystems[1676]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 21:55:51.009001 extend-filesystems[1676]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 12 21:55:51.035494 extend-filesystems[1626]: Resized filesystem in /dev/nvme0n1p9 Feb 12 21:55:51.014980 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 21:55:51.015236 systemd[1]: Finished extend-filesystems.service. Feb 12 21:55:51.162737 systemd-logind[1630]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 21:55:51.162772 systemd-logind[1630]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 12 21:55:51.162797 systemd-logind[1630]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 21:55:51.163622 amazon-ssm-agent[1690]: 2024/02/12 21:55:51 Failed to load instance info from vault. RegistrationKey does not exist. Feb 12 21:55:51.164144 systemd-logind[1630]: New seat seat0. Feb 12 21:55:51.169950 systemd[1]: Started systemd-logind.service. Feb 12 21:55:51.179698 amazon-ssm-agent[1690]: Initializing new seelog logger Feb 12 21:55:51.184485 amazon-ssm-agent[1690]: New Seelog Logger Creation Complete Feb 12 21:55:51.184689 amazon-ssm-agent[1690]: 2024/02/12 21:55:51 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 21:55:51.184747 amazon-ssm-agent[1690]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 21:55:51.185062 amazon-ssm-agent[1690]: 2024/02/12 21:55:51 processing appconfig overrides Feb 12 21:55:51.238517 env[1636]: time="2024-02-12T21:55:51.238466750Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 21:55:51.238827 env[1636]: time="2024-02-12T21:55:51.238805031Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 21:55:51.241820 env[1636]: time="2024-02-12T21:55:51.241746062Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 21:55:51.241967 env[1636]: time="2024-02-12T21:55:51.241948958Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 21:55:51.242334 env[1636]: time="2024-02-12T21:55:51.242307284Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 21:55:51.242425 env[1636]: time="2024-02-12T21:55:51.242410017Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 21:55:51.242496 env[1636]: time="2024-02-12T21:55:51.242481215Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 21:55:51.242557 env[1636]: time="2024-02-12T21:55:51.242544747Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 21:55:51.242713 env[1636]: time="2024-02-12T21:55:51.242698225Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 21:55:51.243047 env[1636]: time="2024-02-12T21:55:51.243027391Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 21:55:51.243320 env[1636]: time="2024-02-12T21:55:51.243295656Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 21:55:51.247863 env[1636]: time="2024-02-12T21:55:51.247823611Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 21:55:51.248094 env[1636]: time="2024-02-12T21:55:51.248068549Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 21:55:51.248373 env[1636]: time="2024-02-12T21:55:51.248350457Z" level=info msg="metadata content store policy set" policy=shared Feb 12 21:55:51.258586 env[1636]: time="2024-02-12T21:55:51.258535450Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 21:55:51.258777 env[1636]: time="2024-02-12T21:55:51.258754730Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 21:55:51.258862 env[1636]: time="2024-02-12T21:55:51.258847083Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 21:55:51.258984 env[1636]: time="2024-02-12T21:55:51.258964583Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 21:55:51.259151 env[1636]: time="2024-02-12T21:55:51.259132554Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 21:55:51.259275 env[1636]: time="2024-02-12T21:55:51.259257609Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 21:55:51.259355 env[1636]: time="2024-02-12T21:55:51.259339551Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 21:55:51.259432 env[1636]: time="2024-02-12T21:55:51.259417844Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 21:55:51.259498 env[1636]: time="2024-02-12T21:55:51.259486042Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 21:55:51.259560 env[1636]: time="2024-02-12T21:55:51.259547900Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 21:55:51.259636 env[1636]: time="2024-02-12T21:55:51.259623217Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 21:55:51.259700 env[1636]: time="2024-02-12T21:55:51.259688610Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 21:55:51.259899 env[1636]: time="2024-02-12T21:55:51.259881979Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 21:55:51.260061 env[1636]: time="2024-02-12T21:55:51.260045820Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 21:55:51.260524 env[1636]: time="2024-02-12T21:55:51.260500014Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 21:55:51.260651 env[1636]: time="2024-02-12T21:55:51.260635004Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 21:55:51.260728 env[1636]: time="2024-02-12T21:55:51.260713771Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 21:55:51.260856 env[1636]: time="2024-02-12T21:55:51.260841948Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 21:55:51.260984 env[1636]: time="2024-02-12T21:55:51.260967461Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 21:55:51.261054 env[1636]: time="2024-02-12T21:55:51.261041009Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 21:55:51.261431 env[1636]: time="2024-02-12T21:55:51.261109625Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 21:55:51.261550 env[1636]: time="2024-02-12T21:55:51.261532013Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 21:55:51.261626 env[1636]: time="2024-02-12T21:55:51.261612887Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 21:55:51.261721 env[1636]: time="2024-02-12T21:55:51.261706155Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 21:55:51.261796 env[1636]: time="2024-02-12T21:55:51.261782757Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 21:55:51.261881 env[1636]: time="2024-02-12T21:55:51.261867579Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 21:55:51.262110 env[1636]: time="2024-02-12T21:55:51.262093173Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 21:55:51.262198 env[1636]: time="2024-02-12T21:55:51.262183384Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 21:55:51.262293 env[1636]: time="2024-02-12T21:55:51.262279123Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 21:55:51.262361 env[1636]: time="2024-02-12T21:55:51.262349152Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 21:55:51.262434 env[1636]: time="2024-02-12T21:55:51.262418645Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 21:55:51.262503 env[1636]: time="2024-02-12T21:55:51.262489934Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 21:55:51.262581 env[1636]: time="2024-02-12T21:55:51.262565769Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 21:55:51.262685 env[1636]: time="2024-02-12T21:55:51.262671067Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 21:55:51.263248 env[1636]: time="2024-02-12T21:55:51.263008527Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 21:55:51.265731 env[1636]: time="2024-02-12T21:55:51.263420762Z" level=info msg="Connect containerd service" Feb 12 21:55:51.265731 env[1636]: time="2024-02-12T21:55:51.263476784Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 21:55:51.269523 env[1636]: time="2024-02-12T21:55:51.269479768Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 21:55:51.269884 env[1636]: time="2024-02-12T21:55:51.269855568Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 21:55:51.269979 env[1636]: time="2024-02-12T21:55:51.269922081Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 21:55:51.270087 systemd[1]: Started containerd.service. Feb 12 21:55:51.271972 env[1636]: time="2024-02-12T21:55:51.270074559Z" level=info msg="Start subscribing containerd event" Feb 12 21:55:51.271972 env[1636]: time="2024-02-12T21:55:51.270257598Z" level=info msg="Start recovering state" Feb 12 21:55:51.271972 env[1636]: time="2024-02-12T21:55:51.270328918Z" level=info msg="containerd successfully booted in 0.424942s" Feb 12 21:55:51.271972 env[1636]: time="2024-02-12T21:55:51.271414696Z" level=info msg="Start event monitor" Feb 12 21:55:51.271972 env[1636]: time="2024-02-12T21:55:51.271442714Z" level=info msg="Start snapshots syncer" Feb 12 21:55:51.271972 env[1636]: time="2024-02-12T21:55:51.271458190Z" level=info msg="Start cni network conf syncer for default" Feb 12 21:55:51.271972 env[1636]: time="2024-02-12T21:55:51.271470632Z" level=info msg="Start streaming server" Feb 12 21:55:51.299046 dbus-daemon[1624]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 12 21:55:51.299246 systemd[1]: Started systemd-hostnamed.service. Feb 12 21:55:51.299698 dbus-daemon[1624]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1667 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 12 21:55:51.304759 systemd[1]: Starting polkit.service... Feb 12 21:55:51.328318 polkitd[1741]: Started polkitd version 121 Feb 12 21:55:51.332253 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 21:55:51.356870 polkitd[1741]: Loading rules from directory /etc/polkit-1/rules.d Feb 12 21:55:51.357148 polkitd[1741]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 12 21:55:51.363632 polkitd[1741]: Finished loading, compiling and executing 2 rules Feb 12 21:55:51.364453 dbus-daemon[1624]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 12 21:55:51.364670 systemd[1]: Started polkit.service. Feb 12 21:55:51.366145 polkitd[1741]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 12 21:55:51.407668 systemd-hostnamed[1667]: Hostname set to (transient) Feb 12 21:55:51.407669 systemd-resolved[1596]: System hostname changed to 'ip-172-31-28-89'. Feb 12 21:55:51.411416 coreos-metadata[1623]: Feb 12 21:55:51.411 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 12 21:55:51.414089 coreos-metadata[1623]: Feb 12 21:55:51.413 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 12 21:55:51.414829 coreos-metadata[1623]: Feb 12 21:55:51.414 INFO Fetch successful Feb 12 21:55:51.414829 coreos-metadata[1623]: Feb 12 21:55:51.414 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 12 21:55:51.415696 coreos-metadata[1623]: Feb 12 21:55:51.415 INFO Fetch successful Feb 12 21:55:51.417874 unknown[1623]: wrote ssh authorized keys file for user: core Feb 12 21:55:51.438696 update-ssh-keys[1766]: Updated "/home/core/.ssh/authorized_keys" Feb 12 21:55:51.439177 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 21:55:51.634974 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO Create new startup processor Feb 12 21:55:51.636202 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [LongRunningPluginsManager] registered plugins: {} Feb 12 21:55:51.637633 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO Initializing bookkeeping folders Feb 12 21:55:51.637825 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO removing the completed state files Feb 12 21:55:51.637934 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO Initializing bookkeeping folders for long running plugins Feb 12 21:55:51.638017 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 12 21:55:51.638100 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO Initializing healthcheck folders for long running plugins Feb 12 21:55:51.638164 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO Initializing locations for inventory plugin Feb 12 21:55:51.638273 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO Initializing default location for custom inventory Feb 12 21:55:51.638337 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO Initializing default location for file inventory Feb 12 21:55:51.638490 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO Initializing default location for role inventory Feb 12 21:55:51.638555 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO Init the cloudwatchlogs publisher Feb 12 21:55:51.638622 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [instanceID=i-047fd9190350ede64] Successfully loaded platform independent plugin aws:configurePackage Feb 12 21:55:51.638872 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [instanceID=i-047fd9190350ede64] Successfully loaded platform independent plugin aws:downloadContent Feb 12 21:55:51.638962 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [instanceID=i-047fd9190350ede64] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 12 21:55:51.639034 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [instanceID=i-047fd9190350ede64] Successfully loaded platform independent plugin aws:configureDocker Feb 12 21:55:51.639097 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [instanceID=i-047fd9190350ede64] Successfully loaded platform independent plugin aws:refreshAssociation Feb 12 21:55:51.639159 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [instanceID=i-047fd9190350ede64] Successfully loaded platform independent plugin aws:runDocument Feb 12 21:55:51.639265 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [instanceID=i-047fd9190350ede64] Successfully loaded platform independent plugin aws:softwareInventory Feb 12 21:55:51.639331 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [instanceID=i-047fd9190350ede64] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 12 21:55:51.639392 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [instanceID=i-047fd9190350ede64] Successfully loaded platform independent plugin aws:runDockerAction Feb 12 21:55:51.639463 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [instanceID=i-047fd9190350ede64] Successfully loaded platform dependent plugin aws:runShellScript Feb 12 21:55:51.639526 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 12 21:55:51.639588 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO OS: linux, Arch: amd64 Feb 12 21:55:51.640533 amazon-ssm-agent[1690]: datastore file /var/lib/amazon/ssm/i-047fd9190350ede64/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 12 21:55:51.651284 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessagingDeliveryService] Starting document processing engine... Feb 12 21:55:51.748414 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 12 21:55:51.843236 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 12 21:55:51.855489 locksmithd[1677]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 21:55:51.939388 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessagingDeliveryService] Starting message polling Feb 12 21:55:52.034689 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 12 21:55:52.074647 sshd_keygen[1644]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 21:55:52.105516 systemd[1]: Finished sshd-keygen.service. Feb 12 21:55:52.108706 systemd[1]: Starting issuegen.service... Feb 12 21:55:52.117934 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 21:55:52.118152 systemd[1]: Finished issuegen.service. Feb 12 21:55:52.122054 systemd[1]: Starting systemd-user-sessions.service... Feb 12 21:55:52.131497 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [instanceID=i-047fd9190350ede64] Starting association polling Feb 12 21:55:52.132397 systemd[1]: Finished systemd-user-sessions.service. Feb 12 21:55:52.135170 systemd[1]: Started getty@tty1.service. Feb 12 21:55:52.137787 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 21:55:52.139004 systemd[1]: Reached target getty.target. Feb 12 21:55:52.140028 systemd[1]: Reached target multi-user.target. Feb 12 21:55:52.143491 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 21:55:52.159471 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 21:55:52.159694 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 21:55:52.161415 systemd[1]: Startup finished in 713ms (kernel) + 6.218s (initrd) + 9.182s (userspace) = 16.114s. Feb 12 21:55:52.226515 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 12 21:55:52.321997 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 12 21:55:52.417548 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 12 21:55:52.514162 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 12 21:55:52.610373 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 12 21:55:52.706966 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [OfflineService] Starting document processing engine... Feb 12 21:55:52.803394 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [OfflineService] [EngineProcessor] Starting Feb 12 21:55:52.900334 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [OfflineService] [EngineProcessor] Initial processing Feb 12 21:55:52.997031 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [OfflineService] Starting message polling Feb 12 21:55:53.094567 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [OfflineService] Starting send replies to MDS Feb 12 21:55:53.191797 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 12 21:55:53.289159 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 12 21:55:53.386600 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [HealthCheck] HealthCheck reporting agent health. Feb 12 21:55:53.484565 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 12 21:55:53.583349 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessageGatewayService] Starting session document processing engine... Feb 12 21:55:53.681818 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 12 21:55:53.781753 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 12 21:55:53.880698 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-047fd9190350ede64, requestId: 3094620a-5f76-442a-9fe2-d3e4540f4b1d Feb 12 21:55:53.979506 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessageGatewayService] listening reply. Feb 12 21:55:54.079047 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [StartupProcessor] Executing startup processor tasks Feb 12 21:55:54.178153 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 12 21:55:54.277536 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 12 21:55:54.377026 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 12 21:55:54.477386 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-047fd9190350ede64?role=subscribe&stream=input Feb 12 21:55:54.577306 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-047fd9190350ede64?role=subscribe&stream=input Feb 12 21:55:54.678312 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessageGatewayService] Starting receiving message from control channel Feb 12 21:55:54.778688 amazon-ssm-agent[1690]: 2024-02-12 21:55:51 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 12 21:56:00.211801 systemd[1]: Created slice system-sshd.slice. Feb 12 21:56:00.213898 systemd[1]: Started sshd@0-172.31.28.89:22-139.178.89.65:51930.service. Feb 12 21:56:00.415787 sshd[1827]: Accepted publickey for core from 139.178.89.65 port 51930 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:00.418984 sshd[1827]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:00.435107 systemd[1]: Created slice user-500.slice. Feb 12 21:56:00.440732 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 21:56:00.446300 systemd-logind[1630]: New session 1 of user core. Feb 12 21:56:00.457879 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 21:56:00.461258 systemd[1]: Starting user@500.service... Feb 12 21:56:00.466808 (systemd)[1830]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:00.579227 systemd[1830]: Queued start job for default target default.target. Feb 12 21:56:00.580017 systemd[1830]: Reached target paths.target. Feb 12 21:56:00.580048 systemd[1830]: Reached target sockets.target. Feb 12 21:56:00.580067 systemd[1830]: Reached target timers.target. Feb 12 21:56:00.580083 systemd[1830]: Reached target basic.target. Feb 12 21:56:00.580140 systemd[1830]: Reached target default.target. Feb 12 21:56:00.580180 systemd[1830]: Startup finished in 104ms. Feb 12 21:56:00.580764 systemd[1]: Started user@500.service. Feb 12 21:56:00.582281 systemd[1]: Started session-1.scope. Feb 12 21:56:00.732359 systemd[1]: Started sshd@1-172.31.28.89:22-139.178.89.65:51946.service. Feb 12 21:56:00.903113 sshd[1839]: Accepted publickey for core from 139.178.89.65 port 51946 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:00.905016 sshd[1839]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:00.913349 systemd-logind[1630]: New session 2 of user core. Feb 12 21:56:00.913498 systemd[1]: Started session-2.scope. Feb 12 21:56:01.042815 sshd[1839]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:01.046397 systemd[1]: sshd@1-172.31.28.89:22-139.178.89.65:51946.service: Deactivated successfully. Feb 12 21:56:01.047509 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 21:56:01.048531 systemd-logind[1630]: Session 2 logged out. Waiting for processes to exit. Feb 12 21:56:01.049810 systemd-logind[1630]: Removed session 2. Feb 12 21:56:01.078542 systemd[1]: Started sshd@2-172.31.28.89:22-139.178.89.65:51960.service. Feb 12 21:56:01.266352 sshd[1845]: Accepted publickey for core from 139.178.89.65 port 51960 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:01.270762 sshd[1845]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:01.302282 systemd-logind[1630]: New session 3 of user core. Feb 12 21:56:01.304126 systemd[1]: Started session-3.scope. Feb 12 21:56:01.424420 sshd[1845]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:01.433064 systemd[1]: sshd@2-172.31.28.89:22-139.178.89.65:51960.service: Deactivated successfully. Feb 12 21:56:01.434814 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 21:56:01.435859 systemd-logind[1630]: Session 3 logged out. Waiting for processes to exit. Feb 12 21:56:01.437339 systemd-logind[1630]: Removed session 3. Feb 12 21:56:01.450610 systemd[1]: Started sshd@3-172.31.28.89:22-139.178.89.65:51974.service. Feb 12 21:56:01.621785 sshd[1851]: Accepted publickey for core from 139.178.89.65 port 51974 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:01.624212 sshd[1851]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:01.635876 systemd-logind[1630]: New session 4 of user core. Feb 12 21:56:01.636580 systemd[1]: Started session-4.scope. Feb 12 21:56:01.778032 sshd[1851]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:01.784743 systemd[1]: sshd@3-172.31.28.89:22-139.178.89.65:51974.service: Deactivated successfully. Feb 12 21:56:01.788937 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 21:56:01.792019 systemd-logind[1630]: Session 4 logged out. Waiting for processes to exit. Feb 12 21:56:01.794819 systemd-logind[1630]: Removed session 4. Feb 12 21:56:01.810863 systemd[1]: Started sshd@4-172.31.28.89:22-139.178.89.65:51990.service. Feb 12 21:56:02.004663 sshd[1857]: Accepted publickey for core from 139.178.89.65 port 51990 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:02.005660 sshd[1857]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:02.016328 systemd-logind[1630]: New session 5 of user core. Feb 12 21:56:02.016997 systemd[1]: Started session-5.scope. Feb 12 21:56:02.146063 sudo[1860]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 21:56:02.146406 sudo[1860]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:02.160396 dbus-daemon[1624]: \xd0\xcd)سU: received setenforce notice (enforcing=1258358000) Feb 12 21:56:02.172180 sudo[1860]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:02.197913 sshd[1857]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:02.202791 systemd[1]: sshd@4-172.31.28.89:22-139.178.89.65:51990.service: Deactivated successfully. Feb 12 21:56:02.204492 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 21:56:02.205501 systemd-logind[1630]: Session 5 logged out. Waiting for processes to exit. Feb 12 21:56:02.217485 systemd-logind[1630]: Removed session 5. Feb 12 21:56:02.226050 systemd[1]: Started sshd@5-172.31.28.89:22-139.178.89.65:52000.service. Feb 12 21:56:02.404011 sshd[1864]: Accepted publickey for core from 139.178.89.65 port 52000 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:02.409924 sshd[1864]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:02.419436 systemd-logind[1630]: New session 6 of user core. Feb 12 21:56:02.420781 systemd[1]: Started session-6.scope. Feb 12 21:56:02.527338 sudo[1868]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 21:56:02.527896 sudo[1868]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:02.534282 sudo[1868]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:02.557088 sudo[1867]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 21:56:02.557535 sudo[1867]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:02.601334 systemd[1]: Stopping audit-rules.service... Feb 12 21:56:02.605000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 21:56:02.606604 auditctl[1871]: No rules Feb 12 21:56:02.618842 kernel: kauditd_printk_skb: 192 callbacks suppressed Feb 12 21:56:02.618944 kernel: audit: type=1305 audit(1707774962.605:174): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 21:56:02.618997 kernel: audit: type=1300 audit(1707774962.605:174): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe84795560 a2=420 a3=0 items=0 ppid=1 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:02.605000 audit[1871]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe84795560 a2=420 a3=0 items=0 ppid=1 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:02.607594 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 21:56:02.608135 systemd[1]: Stopped audit-rules.service. Feb 12 21:56:02.612488 systemd[1]: Starting audit-rules.service... Feb 12 21:56:02.605000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 21:56:02.632221 kernel: audit: type=1327 audit(1707774962.605:174): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 21:56:02.632318 kernel: audit: type=1131 audit(1707774962.607:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:02.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:02.658501 augenrules[1888]: No rules Feb 12 21:56:02.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:02.660686 sudo[1867]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:02.659122 systemd[1]: Finished audit-rules.service. Feb 12 21:56:02.659000 audit[1867]: USER_END pid=1867 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:02.671416 kernel: audit: type=1130 audit(1707774962.658:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:02.671532 kernel: audit: type=1106 audit(1707774962.659:177): pid=1867 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:02.671562 kernel: audit: type=1104 audit(1707774962.659:178): pid=1867 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:02.659000 audit[1867]: CRED_DISP pid=1867 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:02.676206 amazon-ssm-agent[1690]: 2024-02-12 21:56:02 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 12 21:56:02.683847 sshd[1864]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:02.684000 audit[1864]: USER_END pid=1864 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:02.688105 systemd[1]: sshd@5-172.31.28.89:22-139.178.89.65:52000.service: Deactivated successfully. Feb 12 21:56:02.689410 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 21:56:02.691256 systemd-logind[1630]: Session 6 logged out. Waiting for processes to exit. Feb 12 21:56:02.684000 audit[1864]: CRED_DISP pid=1864 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:02.692782 systemd-logind[1630]: Removed session 6. Feb 12 21:56:02.698124 kernel: audit: type=1106 audit(1707774962.684:179): pid=1864 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:02.698302 kernel: audit: type=1104 audit(1707774962.684:180): pid=1864 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:02.698334 kernel: audit: type=1131 audit(1707774962.684:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.28.89:22-139.178.89.65:52000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:02.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.28.89:22-139.178.89.65:52000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:02.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.89:22-139.178.89.65:52016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:02.710581 systemd[1]: Started sshd@6-172.31.28.89:22-139.178.89.65:52016.service. Feb 12 21:56:02.873000 audit[1894]: USER_ACCT pid=1894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:02.875248 sshd[1894]: Accepted publickey for core from 139.178.89.65 port 52016 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:02.875000 audit[1894]: CRED_ACQ pid=1894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:02.875000 audit[1894]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff947a2630 a2=3 a3=0 items=0 ppid=1 pid=1894 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:02.875000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:02.876941 sshd[1894]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:02.886128 systemd[1]: Started session-7.scope. Feb 12 21:56:02.886891 systemd-logind[1630]: New session 7 of user core. Feb 12 21:56:02.901000 audit[1894]: USER_START pid=1894 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:02.906000 audit[1896]: CRED_ACQ pid=1896 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:03.000000 audit[1897]: USER_ACCT pid=1897 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:03.002299 sudo[1897]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mkdir -p . Feb 12 21:56:03.001000 audit[1897]: CRED_REFR pid=1897 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:03.003031 sudo[1897]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:03.005000 audit[1897]: USER_START pid=1897 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:03.007154 sudo[1897]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:03.006000 audit[1897]: USER_END pid=1897 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:03.006000 audit[1897]: CRED_DISP pid=1897 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:03.030247 sshd[1894]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:03.031000 audit[1894]: USER_END pid=1894 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:03.031000 audit[1894]: CRED_DISP pid=1894 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:03.034276 systemd[1]: sshd@6-172.31.28.89:22-139.178.89.65:52016.service: Deactivated successfully. Feb 12 21:56:03.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.89:22-139.178.89.65:52016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:03.035417 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 21:56:03.036227 systemd-logind[1630]: Session 7 logged out. Waiting for processes to exit. Feb 12 21:56:03.037102 systemd-logind[1630]: Removed session 7. Feb 12 21:56:03.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.28.89:22-139.178.89.65:52018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:03.056646 systemd[1]: Started sshd@7-172.31.28.89:22-139.178.89.65:52018.service. Feb 12 21:56:03.220000 audit[1901]: USER_ACCT pid=1901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:03.221496 sshd[1901]: Accepted publickey for core from 139.178.89.65 port 52018 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:03.221000 audit[1901]: CRED_ACQ pid=1901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:03.221000 audit[1901]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7660a620 a2=3 a3=0 items=0 ppid=1 pid=1901 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:03.221000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:03.223004 sshd[1901]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:03.228475 systemd[1]: Started session-8.scope. Feb 12 21:56:03.229116 systemd-logind[1630]: New session 8 of user core. Feb 12 21:56:03.233000 audit[1901]: USER_START pid=1901 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:03.235000 audit[1903]: CRED_ACQ pid=1903 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:03.333000 audit[1904]: USER_ACCT pid=1904 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:03.334000 audit[1904]: CRED_REFR pid=1904 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:03.335082 sudo[1904]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/install -m 0755 /dev/stdin kolet Feb 12 21:56:03.335392 sudo[1904]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:03.337000 audit[1904]: USER_START pid=1904 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.135407 sudo[1904]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:04.134000 audit[1904]: USER_END pid=1904 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.134000 audit[1904]: CRED_DISP pid=1904 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.160715 sshd[1901]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:04.162000 audit[1901]: USER_END pid=1901 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:04.162000 audit[1901]: CRED_DISP pid=1901 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:04.167130 systemd[1]: sshd@7-172.31.28.89:22-139.178.89.65:52018.service: Deactivated successfully. Feb 12 21:56:04.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.28.89:22-139.178.89.65:52018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.169791 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 21:56:04.171878 systemd-logind[1630]: Session 8 logged out. Waiting for processes to exit. Feb 12 21:56:04.177106 systemd-logind[1630]: Removed session 8. Feb 12 21:56:04.187320 systemd[1]: Started sshd@8-172.31.28.89:22-139.178.89.65:52022.service. Feb 12 21:56:04.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.89:22-139.178.89.65:52022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.355000 audit[1908]: USER_ACCT pid=1908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:04.356638 sshd[1908]: Accepted publickey for core from 139.178.89.65 port 52022 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:04.356000 audit[1908]: CRED_ACQ pid=1908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:04.356000 audit[1908]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe670abec0 a2=3 a3=0 items=0 ppid=1 pid=1908 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:04.356000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:04.358169 sshd[1908]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:04.363953 systemd[1]: Started session-9.scope. Feb 12 21:56:04.364606 systemd-logind[1630]: New session 9 of user core. Feb 12 21:56:04.369000 audit[1908]: USER_START pid=1908 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:04.373000 audit[1910]: CRED_ACQ pid=1910 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:04.507000 audit[1916]: USER_ACCT pid=1916 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.507436 sudo[1916]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/coreos-cloudinit --workspace /tmp/coretest-cloudinit-3490441890 --from-file /tmp/coretest-1053205452 --ssh-key-name coretest Feb 12 21:56:04.507000 audit[1916]: CRED_REFR pid=1916 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.507726 sudo[1916]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:04.509000 audit[1916]: USER_START pid=1916 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.585034 systemd[1]: Reloading. Feb 12 21:56:04.689093 /usr/lib/systemd/system-generators/torcx-generator[1942]: time="2024-02-12T21:56:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 21:56:04.689670 /usr/lib/systemd/system-generators/torcx-generator[1942]: time="2024-02-12T21:56:04Z" level=info msg="torcx already run" Feb 12 21:56:04.798051 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 21:56:04.798097 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 21:56:04.823803 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 21:56:04.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.908000 audit: BPF prog-id=40 op=LOAD Feb 12 21:56:04.908000 audit: BPF prog-id=31 op=UNLOAD Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit: BPF prog-id=41 op=LOAD Feb 12 21:56:04.909000 audit: BPF prog-id=21 op=UNLOAD Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit: BPF prog-id=42 op=LOAD Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.909000 audit: BPF prog-id=43 op=LOAD Feb 12 21:56:04.909000 audit: BPF prog-id=22 op=UNLOAD Feb 12 21:56:04.909000 audit: BPF prog-id=23 op=UNLOAD Feb 12 21:56:04.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.912000 audit: BPF prog-id=44 op=LOAD Feb 12 21:56:04.912000 audit: BPF prog-id=38 op=UNLOAD Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit: BPF prog-id=45 op=LOAD Feb 12 21:56:04.913000 audit: BPF prog-id=27 op=UNLOAD Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.914000 audit: BPF prog-id=46 op=LOAD Feb 12 21:56:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.914000 audit: BPF prog-id=47 op=LOAD Feb 12 21:56:04.914000 audit: BPF prog-id=28 op=UNLOAD Feb 12 21:56:04.914000 audit: BPF prog-id=29 op=UNLOAD Feb 12 21:56:04.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.915000 audit: BPF prog-id=48 op=LOAD Feb 12 21:56:04.915000 audit: BPF prog-id=30 op=UNLOAD Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit: BPF prog-id=49 op=LOAD Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit: BPF prog-id=50 op=LOAD Feb 12 21:56:04.916000 audit: BPF prog-id=24 op=UNLOAD Feb 12 21:56:04.916000 audit: BPF prog-id=25 op=UNLOAD Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.916000 audit: BPF prog-id=51 op=LOAD Feb 12 21:56:04.916000 audit: BPF prog-id=35 op=UNLOAD Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit: BPF prog-id=52 op=LOAD Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.917000 audit: BPF prog-id=53 op=LOAD Feb 12 21:56:04.917000 audit: BPF prog-id=36 op=UNLOAD Feb 12 21:56:04.917000 audit: BPF prog-id=37 op=UNLOAD Feb 12 21:56:04.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.919000 audit: BPF prog-id=54 op=LOAD Feb 12 21:56:04.919000 audit: BPF prog-id=26 op=UNLOAD Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit: BPF prog-id=55 op=LOAD Feb 12 21:56:04.920000 audit: BPF prog-id=32 op=UNLOAD Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.921000 audit: BPF prog-id=56 op=LOAD Feb 12 21:56:04.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 21:56:04.921000 audit: BPF prog-id=57 op=LOAD Feb 12 21:56:04.921000 audit: BPF prog-id=33 op=UNLOAD Feb 12 21:56:04.921000 audit: BPF prog-id=34 op=UNLOAD Feb 12 21:56:04.926704 sudo[1916]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:04.925000 audit[1916]: USER_END pid=1916 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.925000 audit[1916]: CRED_DISP pid=1916 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.954000 audit[1995]: USER_ACCT pid=1995 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.955000 audit[1995]: CRED_REFR pid=1995 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.956255 sudo[1995]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /tmp/coretest-cloudinit-3490441890 Feb 12 21:56:04.956479 sudo[1995]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:04.958000 audit[1995]: USER_START pid=1995 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.960846 sudo[1995]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:04.959000 audit[1995]: USER_END pid=1995 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.959000 audit[1995]: CRED_DISP pid=1995 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.985455 sshd[1908]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:04.985000 audit[1908]: USER_END pid=1908 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:04.986000 audit[1908]: CRED_DISP pid=1908 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:04.988705 systemd[1]: sshd@8-172.31.28.89:22-139.178.89.65:52022.service: Deactivated successfully. Feb 12 21:56:04.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.89:22-139.178.89.65:52022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:04.989736 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 21:56:04.990503 systemd-logind[1630]: Session 9 logged out. Waiting for processes to exit. Feb 12 21:56:04.991510 systemd-logind[1630]: Removed session 9. Feb 12 21:56:05.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.28.89:22-139.178.89.65:52028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.010409 systemd[1]: Started sshd@9-172.31.28.89:22-139.178.89.65:52028.service. Feb 12 21:56:05.165000 audit[1999]: USER_ACCT pid=1999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:05.166590 sshd[1999]: Accepted publickey for core from 139.178.89.65 port 52028 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:05.166000 audit[1999]: CRED_ACQ pid=1999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:05.166000 audit[1999]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce9daf9d0 a2=3 a3=0 items=0 ppid=1 pid=1999 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:05.166000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:05.168229 sshd[1999]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:05.174456 systemd[1]: Started session-10.scope. Feb 12 21:56:05.175247 systemd-logind[1630]: New session 10 of user core. Feb 12 21:56:05.181000 audit[1999]: USER_START pid=1999 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:05.183000 audit[2001]: CRED_ACQ pid=2001 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:05.310000 audit[2007]: USER_ACCT pid=2007 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.312250 sudo[2007]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/coreos-cloudinit --workspace /tmp/coretest-cloudinit-4009691445 --from-file /tmp/coretest-1797453014 Feb 12 21:56:05.311000 audit[2007]: CRED_REFR pid=2007 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.312682 sudo[2007]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:05.313000 audit[2007]: USER_START pid=2007 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.323516 systemd[1]: Started coreos-cloudinit-3234191153.service. Feb 12 21:56:05.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-cloudinit-3234191153 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.327657 sudo[2007]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:05.326000 audit[2007]: USER_END pid=2007 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.326000 audit[2007]: CRED_DISP pid=2007 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.360000 audit[2020]: USER_ACCT pid=2020 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.361579 sudo[2020]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /tmp/coretest-cloudinit-4009691445 Feb 12 21:56:05.360000 audit[2020]: CRED_REFR pid=2020 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.362088 sudo[2020]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:05.362000 audit[2020]: USER_START pid=2020 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.366226 sudo[2020]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:05.365000 audit[2020]: USER_END pid=2020 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.365000 audit[2020]: CRED_DISP pid=2020 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.390619 sshd[1999]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:05.396000 audit[1999]: USER_END pid=1999 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:05.396000 audit[1999]: CRED_DISP pid=1999 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:05.402049 systemd[1]: sshd@9-172.31.28.89:22-139.178.89.65:52028.service: Deactivated successfully. Feb 12 21:56:05.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.28.89:22-139.178.89.65:52028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.405099 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 21:56:05.406178 systemd-logind[1630]: Session 10 logged out. Waiting for processes to exit. Feb 12 21:56:05.410735 systemd-logind[1630]: Removed session 10. Feb 12 21:56:05.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.28.89:22-139.178.89.65:52030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.428151 systemd[1]: Started sshd@10-172.31.28.89:22-139.178.89.65:52030.service. Feb 12 21:56:05.618000 audit[2024]: USER_ACCT pid=2024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:05.619879 sshd[2024]: Accepted publickey for core from 139.178.89.65 port 52030 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:05.620000 audit[2024]: CRED_ACQ pid=2024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:05.620000 audit[2024]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff27196ab0 a2=3 a3=0 items=0 ppid=1 pid=2024 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:05.620000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:05.622395 sshd[2024]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:05.629714 systemd[1]: Started session-11.scope. Feb 12 21:56:05.630406 systemd-logind[1630]: New session 11 of user core. Feb 12 21:56:05.635000 audit[2024]: USER_START pid=2024 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:05.638000 audit[2026]: CRED_ACQ pid=2026 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:05.768000 audit[2032]: USER_ACCT pid=2032 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.768681 sudo[2032]: core : PWD=/home/core ; USER=core ; COMMAND=/usr/bin/gdbus call --system --dest org.freedesktop.systemd1 --object-path /org/freedesktop/systemd1 --method org.freedesktop.systemd1.Manager.RestartUnit ntpd.service replace Feb 12 21:56:05.768000 audit[2032]: CRED_REFR pid=2032 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.769372 sudo[2032]: pam_unix(sudo:session): session opened for user core(uid=500) by (uid=500) Feb 12 21:56:05.771000 audit[2032]: USER_START pid=2032 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.802000 audit[2032]: USER_END pid=2032 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.804014 sudo[2032]: pam_unix(sudo:session): session closed for user core Feb 12 21:56:05.803000 audit[2032]: CRED_DISP pid=2032 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.813000 audit[2038]: USER_ACCT pid=2038 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.814938 sudo[2038]: core : PWD=/home/core ; USER=core ; COMMAND=/usr/bin/gdbus call --system --dest org.freedesktop.systemd1 --object-path /org/freedesktop/systemd1/unit/ntpd_2eservice --method org.freedesktop.DBus.Properties.GetAll org.freedesktop.systemd1.Unit Feb 12 21:56:05.815339 sudo[2038]: pam_unix(sudo:session): session opened for user core(uid=500) by (uid=500) Feb 12 21:56:05.813000 audit[2038]: CRED_REFR pid=2038 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.816000 audit[2038]: USER_START pid=2038 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.843649 sudo[2038]: pam_unix(sudo:session): session closed for user core Feb 12 21:56:05.842000 audit[2038]: USER_END pid=2038 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.842000 audit[2038]: CRED_DISP pid=2038 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.868802 sshd[2024]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:05.869000 audit[2024]: USER_END pid=2024 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:05.869000 audit[2024]: CRED_DISP pid=2024 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:05.872304 systemd[1]: sshd@10-172.31.28.89:22-139.178.89.65:52030.service: Deactivated successfully. Feb 12 21:56:05.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.28.89:22-139.178.89.65:52030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:05.873537 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 21:56:05.874398 systemd-logind[1630]: Session 11 logged out. Waiting for processes to exit. Feb 12 21:56:05.875693 systemd-logind[1630]: Removed session 11. Feb 12 21:56:05.893356 systemd[1]: Started sshd@11-172.31.28.89:22-139.178.89.65:52038.service. Feb 12 21:56:05.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.28.89:22-139.178.89.65:52038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:06.053000 audit[2044]: USER_ACCT pid=2044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.057146 sshd[2044]: Accepted publickey for core from 139.178.89.65 port 52038 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:06.056000 audit[2044]: CRED_ACQ pid=2044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.057000 audit[2044]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcacb1d740 a2=3 a3=0 items=0 ppid=1 pid=2044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:06.057000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:06.059468 sshd[2044]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:06.066218 systemd[1]: Started session-12.scope. Feb 12 21:56:06.066767 systemd-logind[1630]: New session 12 of user core. Feb 12 21:56:06.081000 audit[2044]: USER_START pid=2044 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.082000 audit[2046]: CRED_ACQ pid=2046 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.218342 sshd[2044]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:06.218000 audit[2044]: USER_END pid=2044 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.219000 audit[2044]: CRED_DISP pid=2044 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.221694 systemd[1]: sshd@11-172.31.28.89:22-139.178.89.65:52038.service: Deactivated successfully. Feb 12 21:56:06.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.28.89:22-139.178.89.65:52038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:06.222789 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 21:56:06.223500 systemd-logind[1630]: Session 12 logged out. Waiting for processes to exit. Feb 12 21:56:06.224631 systemd-logind[1630]: Removed session 12. Feb 12 21:56:06.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.28.89:22-139.178.89.65:52042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:06.244138 systemd[1]: Started sshd@12-172.31.28.89:22-139.178.89.65:52042.service. Feb 12 21:56:06.403000 audit[2054]: USER_ACCT pid=2054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.404680 sshd[2054]: Accepted publickey for core from 139.178.89.65 port 52042 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:06.405000 audit[2054]: CRED_ACQ pid=2054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.405000 audit[2054]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe62b98ab0 a2=3 a3=0 items=0 ppid=1 pid=2054 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:06.405000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:06.405942 sshd[2054]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:06.411168 systemd[1]: Started session-13.scope. Feb 12 21:56:06.411654 systemd-logind[1630]: New session 13 of user core. Feb 12 21:56:06.415000 audit[2054]: USER_START pid=2054 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.417000 audit[2056]: CRED_ACQ pid=2056 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.570172 sshd[2054]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:06.570000 audit[2054]: USER_END pid=2054 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.570000 audit[2054]: CRED_DISP pid=2054 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.573499 systemd[1]: sshd@12-172.31.28.89:22-139.178.89.65:52042.service: Deactivated successfully. Feb 12 21:56:06.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.28.89:22-139.178.89.65:52042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:06.574414 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 21:56:06.575092 systemd-logind[1630]: Session 13 logged out. Waiting for processes to exit. Feb 12 21:56:06.575969 systemd-logind[1630]: Removed session 13. Feb 12 21:56:06.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.28.89:22-139.178.89.65:52044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:06.597104 systemd[1]: Started sshd@13-172.31.28.89:22-139.178.89.65:52044.service. Feb 12 21:56:06.759000 audit[2064]: USER_ACCT pid=2064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.760986 sshd[2064]: Accepted publickey for core from 139.178.89.65 port 52044 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:06.760000 audit[2064]: CRED_ACQ pid=2064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.760000 audit[2064]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4dec81b0 a2=3 a3=0 items=0 ppid=1 pid=2064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:06.760000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:06.762457 sshd[2064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:06.767283 systemd-logind[1630]: New session 14 of user core. Feb 12 21:56:06.767807 systemd[1]: Started session-14.scope. Feb 12 21:56:06.772000 audit[2064]: USER_START pid=2064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.773000 audit[2066]: CRED_ACQ pid=2066 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.956757 sshd[2064]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:06.959000 audit[2064]: USER_END pid=2064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.959000 audit[2064]: CRED_DISP pid=2064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:06.962161 systemd[1]: sshd@13-172.31.28.89:22-139.178.89.65:52044.service: Deactivated successfully. Feb 12 21:56:06.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.28.89:22-139.178.89.65:52044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:06.968167 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 21:56:06.969432 systemd-logind[1630]: Session 14 logged out. Waiting for processes to exit. Feb 12 21:56:06.971085 systemd-logind[1630]: Removed session 14. Feb 12 21:56:06.982743 systemd[1]: Started sshd@14-172.31.28.89:22-139.178.89.65:52052.service. Feb 12 21:56:06.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.28.89:22-139.178.89.65:52052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:07.142000 audit[2079]: USER_ACCT pid=2079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.145558 sshd[2079]: Accepted publickey for core from 139.178.89.65 port 52052 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:07.144000 audit[2079]: CRED_ACQ pid=2079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.144000 audit[2079]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbc0d5510 a2=3 a3=0 items=0 ppid=1 pid=2079 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:07.144000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:07.146357 sshd[2079]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:07.152788 systemd[1]: Started session-15.scope. Feb 12 21:56:07.153308 systemd-logind[1630]: New session 15 of user core. Feb 12 21:56:07.180000 audit[2079]: USER_START pid=2079 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.183000 audit[2081]: CRED_ACQ pid=2081 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.312000 audit[2087]: USER_ACCT pid=2087 uid=500 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:07.312601 sudo[2087]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/useradd -p * -U -m user1 -G sudo Feb 12 21:56:07.313326 sudo[2087]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:07.312000 audit[2087]: CRED_REFR pid=2087 uid=500 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:07.317000 audit[2087]: USER_START pid=2087 uid=500 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:07.347735 useradd[2088]: new group: name=user1, GID=1000 Feb 12 21:56:07.348035 useradd[2088]: new user: name=user1, UID=1000, GID=1000, home=/home/user1, shell=/bin/bash, from=none Feb 12 21:56:07.350469 useradd[2088]: add 'user1' to group 'sudo' Feb 12 21:56:07.350481 useradd[2088]: add 'user1' to shadow group 'sudo' Feb 12 21:56:07.446769 sudo[2087]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:07.445000 audit[2087]: USER_END pid=2087 uid=500 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:07.445000 audit[2087]: CRED_DISP pid=2087 uid=500 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:07.474621 sshd[2079]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:07.474000 audit[2079]: USER_END pid=2079 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.475000 audit[2079]: CRED_DISP pid=2079 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.478474 systemd[1]: sshd@14-172.31.28.89:22-139.178.89.65:52052.service: Deactivated successfully. Feb 12 21:56:07.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.28.89:22-139.178.89.65:52052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:07.479398 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 21:56:07.480239 systemd-logind[1630]: Session 15 logged out. Waiting for processes to exit. Feb 12 21:56:07.481309 systemd-logind[1630]: Removed session 15. Feb 12 21:56:07.499719 systemd[1]: Started sshd@15-172.31.28.89:22-139.178.89.65:52058.service. Feb 12 21:56:07.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.28.89:22-139.178.89.65:52058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:07.668884 kernel: kauditd_printk_skb: 352 callbacks suppressed Feb 12 21:56:07.668997 kernel: audit: type=1101 audit(1707774967.660:516): pid=2098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.660000 audit[2098]: USER_ACCT pid=2098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.669113 sshd[2098]: Accepted publickey for core from 139.178.89.65 port 52058 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:07.667000 audit[2098]: CRED_ACQ pid=2098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.669900 sshd[2098]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:07.676522 systemd[1]: Started session-16.scope. Feb 12 21:56:07.678645 systemd-logind[1630]: New session 16 of user core. Feb 12 21:56:07.678805 kernel: audit: type=1103 audit(1707774967.667:517): pid=2098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.678882 kernel: audit: type=1006 audit(1707774967.667:518): pid=2098 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 21:56:07.678910 kernel: audit: type=1300 audit(1707774967.667:518): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb11c0cf0 a2=3 a3=0 items=0 ppid=1 pid=2098 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:07.667000 audit[2098]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb11c0cf0 a2=3 a3=0 items=0 ppid=1 pid=2098 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:07.686388 kernel: audit: type=1327 audit(1707774967.667:518): proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:07.667000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:07.685000 audit[2098]: USER_START pid=2098 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.688000 audit[2100]: CRED_ACQ pid=2100 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.701653 kernel: audit: type=1105 audit(1707774967.685:519): pid=2098 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.701739 kernel: audit: type=1103 audit(1707774967.688:520): pid=2100 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.809408 systemd[1]: Started sshd@16-127.0.0.1:22-127.0.0.1:36310.service. Feb 12 21:56:07.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-127.0.0.1:22-127.0.0.1:36310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:07.816208 kernel: audit: type=1130 audit(1707774967.809:521): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-127.0.0.1:22-127.0.0.1:36310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:07.821231 sshd[2107]: kex_exchange_identification: Connection closed by remote host Feb 12 21:56:07.821231 sshd[2107]: Connection closed by 127.0.0.1 port 36310 Feb 12 21:56:07.822151 systemd[1]: sshd@16-127.0.0.1:22-127.0.0.1:36310.service: Deactivated successfully. Feb 12 21:56:07.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-127.0.0.1:22-127.0.0.1:36310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:07.828422 sshd[2098]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:07.829249 kernel: audit: type=1131 audit(1707774967.822:522): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-127.0.0.1:22-127.0.0.1:36310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:07.828000 audit[2098]: USER_END pid=2098 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.832378 systemd[1]: sshd@15-172.31.28.89:22-139.178.89.65:52058.service: Deactivated successfully. Feb 12 21:56:07.833352 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 21:56:07.829000 audit[2098]: CRED_DISP pid=2098 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.28.89:22-139.178.89.65:52058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:07.837416 kernel: audit: type=1106 audit(1707774967.828:523): pid=2098 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:07.837655 systemd-logind[1630]: Session 16 logged out. Waiting for processes to exit. Feb 12 21:56:07.838752 systemd-logind[1630]: Removed session 16. Feb 12 21:56:07.853841 systemd[1]: Started sshd@17-172.31.28.89:22-139.178.89.65:52060.service. Feb 12 21:56:07.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.28.89:22-139.178.89.65:52060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:08.018000 audit[2111]: USER_ACCT pid=2111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.018908 sshd[2111]: Accepted publickey for core from 139.178.89.65 port 52060 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:08.019000 audit[2111]: CRED_ACQ pid=2111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.019000 audit[2111]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6066f210 a2=3 a3=0 items=0 ppid=1 pid=2111 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:08.019000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:08.020630 sshd[2111]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:08.027412 systemd[1]: Started session-17.scope. Feb 12 21:56:08.028206 systemd-logind[1630]: New session 17 of user core. Feb 12 21:56:08.033000 audit[2111]: USER_START pid=2111 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.035000 audit[2113]: CRED_ACQ pid=2113 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.187990 sshd[2111]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:08.190000 audit[2111]: USER_END pid=2111 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.191000 audit[2111]: CRED_DISP pid=2111 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.196278 systemd[1]: sshd@17-172.31.28.89:22-139.178.89.65:52060.service: Deactivated successfully. Feb 12 21:56:08.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.28.89:22-139.178.89.65:52060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:08.197408 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 21:56:08.198088 systemd-logind[1630]: Session 17 logged out. Waiting for processes to exit. Feb 12 21:56:08.199005 systemd-logind[1630]: Removed session 17. Feb 12 21:56:08.213793 systemd[1]: Started sshd@18-172.31.28.89:22-139.178.89.65:33638.service. Feb 12 21:56:08.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.28.89:22-139.178.89.65:33638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:08.374000 audit[2122]: USER_ACCT pid=2122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.376307 sshd[2122]: Accepted publickey for core from 139.178.89.65 port 33638 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:08.376000 audit[2122]: CRED_ACQ pid=2122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.376000 audit[2122]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4ebbd270 a2=3 a3=0 items=0 ppid=1 pid=2122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:08.376000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:08.377770 sshd[2122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:08.383700 systemd[1]: Started session-18.scope. Feb 12 21:56:08.384412 systemd-logind[1630]: New session 18 of user core. Feb 12 21:56:08.389000 audit[2122]: USER_START pid=2122 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.390000 audit[2124]: CRED_ACQ pid=2124 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.529238 sshd[2122]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:08.531000 audit[2122]: USER_END pid=2122 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.531000 audit[2122]: CRED_DISP pid=2122 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.534584 systemd[1]: sshd@18-172.31.28.89:22-139.178.89.65:33638.service: Deactivated successfully. Feb 12 21:56:08.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.28.89:22-139.178.89.65:33638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:08.535508 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 21:56:08.536334 systemd-logind[1630]: Session 18 logged out. Waiting for processes to exit. Feb 12 21:56:08.537686 systemd-logind[1630]: Removed session 18. Feb 12 21:56:08.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.28.89:22-139.178.89.65:33640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:08.554432 systemd[1]: Started sshd@19-172.31.28.89:22-139.178.89.65:33640.service. Feb 12 21:56:08.715000 audit[2132]: USER_ACCT pid=2132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.716879 sshd[2132]: Accepted publickey for core from 139.178.89.65 port 33640 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:08.716000 audit[2132]: CRED_ACQ pid=2132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.716000 audit[2132]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcce183ce0 a2=3 a3=0 items=0 ppid=1 pid=2132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:08.716000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:08.718535 sshd[2132]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:08.724854 systemd[1]: Started session-19.scope. Feb 12 21:56:08.725742 systemd-logind[1630]: New session 19 of user core. Feb 12 21:56:08.730000 audit[2132]: USER_START pid=2132 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.733000 audit[2134]: CRED_ACQ pid=2134 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.878000 audit[2140]: USER_ACCT pid=2140 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:08.878633 sudo[2140]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/blkid -o value -s PTUUID /dev/nvme0n1 Feb 12 21:56:08.879000 audit[2140]: CRED_REFR pid=2140 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:08.879489 sudo[2140]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 21:56:08.881000 audit[2140]: USER_START pid=2140 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:08.886138 sudo[2140]: pam_unix(sudo:session): session closed for user root Feb 12 21:56:08.886000 audit[2140]: USER_END pid=2140 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:08.886000 audit[2140]: CRED_DISP pid=2140 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 21:56:08.909496 sshd[2132]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:08.911000 audit[2132]: USER_END pid=2132 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.911000 audit[2132]: CRED_DISP pid=2132 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:08.914016 systemd[1]: sshd@19-172.31.28.89:22-139.178.89.65:33640.service: Deactivated successfully. Feb 12 21:56:08.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.28.89:22-139.178.89.65:33640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:08.914943 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 21:56:08.915768 systemd-logind[1630]: Session 19 logged out. Waiting for processes to exit. Feb 12 21:56:08.916871 systemd-logind[1630]: Removed session 19. Feb 12 21:56:08.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.28.89:22-139.178.89.65:33646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:08.938283 systemd[1]: Started sshd@20-172.31.28.89:22-139.178.89.65:33646.service. Feb 12 21:56:09.114000 audit[2146]: USER_ACCT pid=2146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:09.115629 sshd[2146]: Accepted publickey for core from 139.178.89.65 port 33646 ssh2: RSA SHA256:BLc8w5wGiofCozMWb4UlfDNGWSz58WJcVew2e99GstU Feb 12 21:56:09.115000 audit[2146]: CRED_ACQ pid=2146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:09.115000 audit[2146]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd771671f0 a2=3 a3=0 items=0 ppid=1 pid=2146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 21:56:09.115000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 21:56:09.117747 sshd[2146]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 21:56:09.133651 systemd-logind[1630]: New session 20 of user core. Feb 12 21:56:09.135466 systemd[1]: Started session-20.scope. Feb 12 21:56:09.141000 audit[2146]: USER_START pid=2146 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:09.143000 audit[2148]: CRED_ACQ pid=2148 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:09.293376 sshd[2146]: pam_unix(sshd:session): session closed for user core Feb 12 21:56:09.294000 audit[2146]: USER_END pid=2146 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:09.294000 audit[2146]: CRED_DISP pid=2146 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 21:56:09.303798 systemd[1]: sshd@20-172.31.28.89:22-139.178.89.65:33646.service: Deactivated successfully. Feb 12 21:56:09.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.28.89:22-139.178.89.65:33646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 21:56:09.306521 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 21:56:09.310076 systemd-logind[1630]: Session 20 logged out. Waiting for processes to exit. Feb 12 21:56:09.315901 systemd-logind[1630]: Removed session 20.