Feb 12 19:55:25.028983 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 19:55:25.029016 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:55:25.029028 kernel: BIOS-provided physical RAM map: Feb 12 19:55:25.029037 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 12 19:55:25.029045 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Feb 12 19:55:25.029054 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Feb 12 19:55:25.029068 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Feb 12 19:55:25.029077 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Feb 12 19:55:25.029087 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Feb 12 19:55:25.029096 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Feb 12 19:55:25.029106 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Feb 12 19:55:25.029115 kernel: printk: bootconsole [earlyser0] enabled Feb 12 19:55:25.029125 kernel: NX (Execute Disable) protection: active Feb 12 19:55:25.029135 kernel: efi: EFI v2.70 by Microsoft Feb 12 19:55:25.029150 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c9a98 RNG=0x3ffd1018 Feb 12 19:55:25.029161 kernel: random: crng init done Feb 12 19:55:25.029172 kernel: SMBIOS 3.1.0 present. Feb 12 19:55:25.029184 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 12 19:55:25.029195 kernel: Hypervisor detected: Microsoft Hyper-V Feb 12 19:55:25.029206 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Feb 12 19:55:25.029218 kernel: Hyper-V Host Build:20348-10.0-1-0.1544 Feb 12 19:55:25.029229 kernel: Hyper-V: Nested features: 0x1e0101 Feb 12 19:55:25.029242 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Feb 12 19:55:25.029253 kernel: Hyper-V: Using hypercall for remote TLB flush Feb 12 19:55:25.029265 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Feb 12 19:55:25.029276 kernel: tsc: Marking TSC unstable due to running on Hyper-V Feb 12 19:55:25.029288 kernel: tsc: Detected 2593.905 MHz processor Feb 12 19:55:25.029300 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 19:55:25.029312 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 19:55:25.029324 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Feb 12 19:55:25.029336 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 19:55:25.029347 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Feb 12 19:55:25.029361 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Feb 12 19:55:25.029373 kernel: Using GB pages for direct mapping Feb 12 19:55:25.029384 kernel: Secure boot disabled Feb 12 19:55:25.029396 kernel: ACPI: Early table checksum verification disabled Feb 12 19:55:25.029407 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Feb 12 19:55:25.029419 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:55:25.029431 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:55:25.029442 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 12 19:55:25.029460 kernel: ACPI: FACS 0x000000003FFFE000 000040 Feb 12 19:55:25.029473 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:55:25.029485 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:55:25.029497 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:55:25.029510 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:55:25.029522 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:55:25.029537 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:55:25.029550 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:55:25.029562 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Feb 12 19:55:25.029574 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Feb 12 19:55:25.029587 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Feb 12 19:55:25.029599 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Feb 12 19:55:25.029612 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Feb 12 19:55:25.029624 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Feb 12 19:55:25.029639 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Feb 12 19:55:25.029651 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Feb 12 19:55:25.029663 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Feb 12 19:55:25.029676 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Feb 12 19:55:25.029688 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 19:55:25.029700 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 19:55:25.029713 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Feb 12 19:55:25.029725 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Feb 12 19:55:25.029738 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Feb 12 19:55:25.029753 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Feb 12 19:55:25.029766 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Feb 12 19:55:25.029778 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Feb 12 19:55:25.029791 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Feb 12 19:55:25.029803 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Feb 12 19:55:25.029816 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Feb 12 19:55:25.029828 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Feb 12 19:55:25.029853 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Feb 12 19:55:25.029866 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Feb 12 19:55:25.029881 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Feb 12 19:55:25.029893 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Feb 12 19:55:25.029906 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Feb 12 19:55:25.029918 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Feb 12 19:55:25.029930 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Feb 12 19:55:25.029943 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Feb 12 19:55:25.029955 kernel: Zone ranges: Feb 12 19:55:25.029968 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 19:55:25.029980 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 12 19:55:25.029998 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Feb 12 19:55:25.030010 kernel: Movable zone start for each node Feb 12 19:55:25.030022 kernel: Early memory node ranges Feb 12 19:55:25.030035 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 12 19:55:25.030047 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Feb 12 19:55:25.030060 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Feb 12 19:55:25.030072 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Feb 12 19:55:25.030084 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Feb 12 19:55:25.030097 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:55:25.030111 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 12 19:55:25.030124 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Feb 12 19:55:25.030136 kernel: ACPI: PM-Timer IO Port: 0x408 Feb 12 19:55:25.030148 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Feb 12 19:55:25.030161 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Feb 12 19:55:25.030173 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 19:55:25.030185 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 19:55:25.030198 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Feb 12 19:55:25.030210 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 19:55:25.030224 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Feb 12 19:55:25.030237 kernel: Booting paravirtualized kernel on Hyper-V Feb 12 19:55:25.030249 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 19:55:25.030262 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 19:55:25.030274 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 19:55:25.030287 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 19:55:25.030299 kernel: pcpu-alloc: [0] 0 1 Feb 12 19:55:25.030311 kernel: Hyper-V: PV spinlocks enabled Feb 12 19:55:25.030323 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 19:55:25.030338 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Feb 12 19:55:25.030350 kernel: Policy zone: Normal Feb 12 19:55:25.030364 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:55:25.030376 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:55:25.030389 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 12 19:55:25.030401 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:55:25.030414 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:55:25.030426 kernel: Memory: 8081200K/8387460K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 306000K reserved, 0K cma-reserved) Feb 12 19:55:25.030441 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:55:25.030454 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 19:55:25.030475 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 19:55:25.030490 kernel: rcu: Hierarchical RCU implementation. Feb 12 19:55:25.030504 kernel: rcu: RCU event tracing is enabled. Feb 12 19:55:25.030518 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:55:25.036875 kernel: Rude variant of Tasks RCU enabled. Feb 12 19:55:25.036896 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:55:25.036910 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:55:25.036924 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:55:25.036937 kernel: Using NULL legacy PIC Feb 12 19:55:25.036956 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Feb 12 19:55:25.036970 kernel: Console: colour dummy device 80x25 Feb 12 19:55:25.036984 kernel: printk: console [tty1] enabled Feb 12 19:55:25.036996 kernel: printk: console [ttyS0] enabled Feb 12 19:55:25.037009 kernel: printk: bootconsole [earlyser0] disabled Feb 12 19:55:25.037025 kernel: ACPI: Core revision 20210730 Feb 12 19:55:25.037038 kernel: Failed to register legacy timer interrupt Feb 12 19:55:25.037051 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 19:55:25.037065 kernel: Hyper-V: Using IPI hypercalls Feb 12 19:55:25.037078 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) Feb 12 19:55:25.037092 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 19:55:25.037105 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 19:55:25.037118 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 19:55:25.037132 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 19:55:25.037145 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 19:55:25.037160 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 19:55:25.037173 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 12 19:55:25.037187 kernel: RETBleed: Vulnerable Feb 12 19:55:25.037200 kernel: Speculative Store Bypass: Vulnerable Feb 12 19:55:25.037213 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 19:55:25.037226 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 19:55:25.037238 kernel: GDS: Unknown: Dependent on hypervisor status Feb 12 19:55:25.037250 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 19:55:25.037262 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 19:55:25.037275 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 19:55:25.037291 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 12 19:55:25.037303 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 12 19:55:25.037316 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 12 19:55:25.037328 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 19:55:25.037342 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Feb 12 19:55:25.037355 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Feb 12 19:55:25.037368 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Feb 12 19:55:25.037381 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Feb 12 19:55:25.037394 kernel: Freeing SMP alternatives memory: 32K Feb 12 19:55:25.037407 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:55:25.037419 kernel: LSM: Security Framework initializing Feb 12 19:55:25.037431 kernel: SELinux: Initializing. Feb 12 19:55:25.037448 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 19:55:25.037460 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 19:55:25.037473 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 12 19:55:25.037485 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 12 19:55:25.037497 kernel: signal: max sigframe size: 3632 Feb 12 19:55:25.037510 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:55:25.037523 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 19:55:25.037537 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:55:25.037550 kernel: x86: Booting SMP configuration: Feb 12 19:55:25.037564 kernel: .... node #0, CPUs: #1 Feb 12 19:55:25.037581 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Feb 12 19:55:25.037596 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 19:55:25.037608 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:55:25.037622 kernel: smpboot: Max logical packages: 1 Feb 12 19:55:25.037635 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Feb 12 19:55:25.037648 kernel: devtmpfs: initialized Feb 12 19:55:25.037661 kernel: x86/mm: Memory block size: 128MB Feb 12 19:55:25.037674 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Feb 12 19:55:25.037691 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:55:25.037702 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:55:25.037716 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:55:25.037730 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:55:25.037743 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:55:25.037756 kernel: audit: type=2000 audit(1707767723.023:1): state=initialized audit_enabled=0 res=1 Feb 12 19:55:25.037769 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:55:25.037781 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 19:55:25.037793 kernel: cpuidle: using governor menu Feb 12 19:55:25.037807 kernel: ACPI: bus type PCI registered Feb 12 19:55:25.037820 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:55:25.037833 kernel: dca service started, version 1.12.1 Feb 12 19:55:25.037872 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 19:55:25.037885 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:55:25.037898 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:55:25.037910 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:55:25.037923 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:55:25.037937 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:55:25.037954 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:55:25.037968 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:55:25.037983 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:55:25.037997 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:55:25.038012 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:55:25.038027 kernel: ACPI: Interpreter enabled Feb 12 19:55:25.038042 kernel: ACPI: PM: (supports S0 S5) Feb 12 19:55:25.038056 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 19:55:25.038071 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 19:55:25.038088 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Feb 12 19:55:25.038100 kernel: iommu: Default domain type: Translated Feb 12 19:55:25.038111 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 19:55:25.038124 kernel: vgaarb: loaded Feb 12 19:55:25.038135 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:55:25.038148 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:55:25.038162 kernel: PTP clock support registered Feb 12 19:55:25.038175 kernel: Registered efivars operations Feb 12 19:55:25.038189 kernel: PCI: Using ACPI for IRQ routing Feb 12 19:55:25.038203 kernel: PCI: System does not support PCI Feb 12 19:55:25.038219 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Feb 12 19:55:25.038233 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:55:25.038247 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:55:25.038260 kernel: pnp: PnP ACPI init Feb 12 19:55:25.038274 kernel: pnp: PnP ACPI: found 3 devices Feb 12 19:55:25.038287 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 19:55:25.038299 kernel: NET: Registered PF_INET protocol family Feb 12 19:55:25.038312 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 19:55:25.038328 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 12 19:55:25.038342 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:55:25.038356 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:55:25.038369 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 12 19:55:25.038380 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 12 19:55:25.038391 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 19:55:25.038403 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 19:55:25.038414 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:55:25.038425 kernel: NET: Registered PF_XDP protocol family Feb 12 19:55:25.038439 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:55:25.038450 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 12 19:55:25.038461 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Feb 12 19:55:25.038469 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 19:55:25.038476 kernel: Initialise system trusted keyrings Feb 12 19:55:25.038587 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 12 19:55:25.038597 kernel: Key type asymmetric registered Feb 12 19:55:25.038605 kernel: Asymmetric key parser 'x509' registered Feb 12 19:55:25.038612 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:55:25.040347 kernel: io scheduler mq-deadline registered Feb 12 19:55:25.040362 kernel: io scheduler kyber registered Feb 12 19:55:25.040379 kernel: io scheduler bfq registered Feb 12 19:55:25.040392 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 19:55:25.040406 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:55:25.040420 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 19:55:25.040433 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 12 19:55:25.040447 kernel: i8042: PNP: No PS/2 controller found. Feb 12 19:55:25.040614 kernel: rtc_cmos 00:02: registered as rtc0 Feb 12 19:55:25.040729 kernel: rtc_cmos 00:02: setting system clock to 2024-02-12T19:55:24 UTC (1707767724) Feb 12 19:55:25.040850 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Feb 12 19:55:25.040866 kernel: fail to initialize ptp_kvm Feb 12 19:55:25.040876 kernel: intel_pstate: CPU model not supported Feb 12 19:55:25.040888 kernel: efifb: probing for efifb Feb 12 19:55:25.040900 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 12 19:55:25.040912 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 12 19:55:25.040924 kernel: efifb: scrolling: redraw Feb 12 19:55:25.040939 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 12 19:55:25.040951 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:55:25.040963 kernel: fb0: EFI VGA frame buffer device Feb 12 19:55:25.040975 kernel: pstore: Registered efi as persistent store backend Feb 12 19:55:25.040988 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:55:25.041000 kernel: Segment Routing with IPv6 Feb 12 19:55:25.041012 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:55:25.041025 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:55:25.041039 kernel: Key type dns_resolver registered Feb 12 19:55:25.041056 kernel: IPI shorthand broadcast: enabled Feb 12 19:55:25.041069 kernel: sched_clock: Marking stable (720158400, 22085800)->(927539200, -185295000) Feb 12 19:55:25.041083 kernel: registered taskstats version 1 Feb 12 19:55:25.041097 kernel: Loading compiled-in X.509 certificates Feb 12 19:55:25.041112 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 19:55:25.041122 kernel: Key type .fscrypt registered Feb 12 19:55:25.041133 kernel: Key type fscrypt-provisioning registered Feb 12 19:55:25.041145 kernel: pstore: Using crash dump compression: deflate Feb 12 19:55:25.041160 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:55:25.041171 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:55:25.041186 kernel: ima: No architecture policies found Feb 12 19:55:25.041199 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 19:55:25.041211 kernel: Write protecting the kernel read-only data: 28672k Feb 12 19:55:25.041226 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 19:55:25.041239 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 19:55:25.041253 kernel: Run /init as init process Feb 12 19:55:25.041268 kernel: with arguments: Feb 12 19:55:25.041281 kernel: /init Feb 12 19:55:25.041299 kernel: with environment: Feb 12 19:55:25.041313 kernel: HOME=/ Feb 12 19:55:25.041327 kernel: TERM=linux Feb 12 19:55:25.041340 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:55:25.041358 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:55:25.041374 systemd[1]: Detected virtualization microsoft. Feb 12 19:55:25.041389 systemd[1]: Detected architecture x86-64. Feb 12 19:55:25.041405 systemd[1]: Running in initrd. Feb 12 19:55:25.041420 systemd[1]: No hostname configured, using default hostname. Feb 12 19:55:25.041433 systemd[1]: Hostname set to . Feb 12 19:55:25.041445 systemd[1]: Initializing machine ID from random generator. Feb 12 19:55:25.041459 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:55:25.041471 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:55:25.041484 systemd[1]: Reached target cryptsetup.target. Feb 12 19:55:25.041497 systemd[1]: Reached target paths.target. Feb 12 19:55:25.041510 systemd[1]: Reached target slices.target. Feb 12 19:55:25.041524 systemd[1]: Reached target swap.target. Feb 12 19:55:25.041536 systemd[1]: Reached target timers.target. Feb 12 19:55:25.041547 systemd[1]: Listening on iscsid.socket. Feb 12 19:55:25.041559 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:55:25.041569 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:55:25.041579 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:55:25.041589 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:55:25.041601 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:55:25.041611 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:55:25.041622 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:55:25.041633 systemd[1]: Reached target sockets.target. Feb 12 19:55:25.041643 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:55:25.041653 systemd[1]: Finished network-cleanup.service. Feb 12 19:55:25.041667 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:55:25.041675 systemd[1]: Starting systemd-journald.service... Feb 12 19:55:25.041685 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:55:25.041696 systemd[1]: Starting systemd-resolved.service... Feb 12 19:55:25.041705 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:55:25.041715 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:55:25.041730 systemd-journald[183]: Journal started Feb 12 19:55:25.041783 systemd-journald[183]: Runtime Journal (/run/log/journal/8e678fc4ffb2488baca61eefb2c8e301) is 8.0M, max 159.0M, 151.0M free. Feb 12 19:55:25.030903 systemd-modules-load[184]: Inserted module 'overlay' Feb 12 19:55:25.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.073850 kernel: audit: type=1130 audit(1707767725.062:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.073878 systemd[1]: Started systemd-journald.service. Feb 12 19:55:25.079153 systemd-resolved[185]: Positive Trust Anchors: Feb 12 19:55:25.081236 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:55:25.084553 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:55:25.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.113200 kernel: audit: type=1130 audit(1707767725.098:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.100137 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:55:25.113437 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:55:25.118361 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:55:25.127297 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:55:25.132584 systemd-resolved[185]: Defaulting to hostname 'linux'. Feb 12 19:55:25.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.154639 kernel: audit: type=1130 audit(1707767725.112:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.154675 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:55:25.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.171167 kernel: audit: type=1130 audit(1707767725.116:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.157762 systemd[1]: Started systemd-resolved.service. Feb 12 19:55:25.170042 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:55:25.170291 systemd[1]: Reached target nss-lookup.target. Feb 12 19:55:25.204192 kernel: audit: type=1130 audit(1707767725.169:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.204224 kernel: audit: type=1130 audit(1707767725.169:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.171245 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:55:25.175798 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:55:25.223793 kernel: Bridge firewalling registered Feb 12 19:55:25.223825 kernel: audit: type=1130 audit(1707767725.174:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.224010 dracut-cmdline[199]: dracut-dracut-053 Feb 12 19:55:25.221310 systemd-modules-load[184]: Inserted module 'br_netfilter' Feb 12 19:55:25.229426 dracut-cmdline[199]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:55:25.258859 kernel: SCSI subsystem initialized Feb 12 19:55:25.284656 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:55:25.284733 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:55:25.290861 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:55:25.294272 systemd-modules-load[184]: Inserted module 'dm_multipath' Feb 12 19:55:25.295423 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:55:25.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.300310 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:55:25.323671 kernel: audit: type=1130 audit(1707767725.298:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.323703 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:55:25.321536 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:55:25.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.337857 kernel: audit: type=1130 audit(1707767725.323:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.345857 kernel: iscsi: registered transport (tcp) Feb 12 19:55:25.371464 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:55:25.371536 kernel: QLogic iSCSI HBA Driver Feb 12 19:55:25.400955 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:55:25.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.406450 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:55:25.457869 kernel: raid6: avx512x4 gen() 18164 MB/s Feb 12 19:55:25.477853 kernel: raid6: avx512x4 xor() 8222 MB/s Feb 12 19:55:25.497849 kernel: raid6: avx512x2 gen() 18411 MB/s Feb 12 19:55:25.518851 kernel: raid6: avx512x2 xor() 29247 MB/s Feb 12 19:55:25.538849 kernel: raid6: avx512x1 gen() 18342 MB/s Feb 12 19:55:25.558849 kernel: raid6: avx512x1 xor() 26748 MB/s Feb 12 19:55:25.579851 kernel: raid6: avx2x4 gen() 18414 MB/s Feb 12 19:55:25.599848 kernel: raid6: avx2x4 xor() 7737 MB/s Feb 12 19:55:25.619846 kernel: raid6: avx2x2 gen() 18373 MB/s Feb 12 19:55:25.639849 kernel: raid6: avx2x2 xor() 22194 MB/s Feb 12 19:55:25.659847 kernel: raid6: avx2x1 gen() 13883 MB/s Feb 12 19:55:25.679847 kernel: raid6: avx2x1 xor() 19326 MB/s Feb 12 19:55:25.699848 kernel: raid6: sse2x4 gen() 11308 MB/s Feb 12 19:55:25.719853 kernel: raid6: sse2x4 xor() 7292 MB/s Feb 12 19:55:25.739847 kernel: raid6: sse2x2 gen() 12484 MB/s Feb 12 19:55:25.759848 kernel: raid6: sse2x2 xor() 7498 MB/s Feb 12 19:55:25.779846 kernel: raid6: sse2x1 gen() 11586 MB/s Feb 12 19:55:25.803378 kernel: raid6: sse2x1 xor() 5783 MB/s Feb 12 19:55:25.803393 kernel: raid6: using algorithm avx2x4 gen() 18414 MB/s Feb 12 19:55:25.803403 kernel: raid6: .... xor() 7737 MB/s, rmw enabled Feb 12 19:55:25.806778 kernel: raid6: using avx512x2 recovery algorithm Feb 12 19:55:25.825864 kernel: xor: automatically using best checksumming function avx Feb 12 19:55:25.920865 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 19:55:25.928521 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:55:25.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.932000 audit: BPF prog-id=7 op=LOAD Feb 12 19:55:25.932000 audit: BPF prog-id=8 op=LOAD Feb 12 19:55:25.933335 systemd[1]: Starting systemd-udevd.service... Feb 12 19:55:25.947738 systemd-udevd[383]: Using default interface naming scheme 'v252'. Feb 12 19:55:25.952421 systemd[1]: Started systemd-udevd.service. Feb 12 19:55:25.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:25.961439 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:55:25.975995 dracut-pre-trigger[400]: rd.md=0: removing MD RAID activation Feb 12 19:55:26.005974 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:55:26.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:26.011361 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:55:26.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:26.047456 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:55:26.100860 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:55:26.106864 kernel: hv_vmbus: Vmbus version:5.2 Feb 12 19:55:26.134044 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 12 19:55:26.134108 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 12 19:55:26.138878 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 19:55:26.152940 kernel: AES CTR mode by8 optimization enabled Feb 12 19:55:26.159854 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:55:26.159899 kernel: hv_vmbus: registering driver hv_storvsc Feb 12 19:55:26.171856 kernel: scsi host1: storvsc_host_t Feb 12 19:55:26.175866 kernel: scsi host0: storvsc_host_t Feb 12 19:55:26.180848 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 12 19:55:26.180897 kernel: hv_vmbus: registering driver hv_netvsc Feb 12 19:55:26.185449 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 12 19:55:26.200864 kernel: hv_vmbus: registering driver hid_hyperv Feb 12 19:55:26.211828 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 12 19:55:26.211886 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 12 19:55:26.226679 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 12 19:55:26.226953 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 19:55:26.230858 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 12 19:55:26.242118 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 12 19:55:26.242398 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 12 19:55:26.242853 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 12 19:55:26.246874 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 12 19:55:26.247062 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 12 19:55:26.258866 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:55:26.263860 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 12 19:55:26.385313 kernel: hv_netvsc 000d3add-9dce-000d-3add-9dce000d3add eth0: VF slot 1 added Feb 12 19:55:26.394917 kernel: hv_vmbus: registering driver hv_pci Feb 12 19:55:26.400857 kernel: hv_pci 683a846d-318e-4a61-963b-4163ce93ecb6: PCI VMBus probing: Using version 0x10004 Feb 12 19:55:26.411199 kernel: hv_pci 683a846d-318e-4a61-963b-4163ce93ecb6: PCI host bridge to bus 318e:00 Feb 12 19:55:26.411382 kernel: pci_bus 318e:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Feb 12 19:55:26.411524 kernel: pci_bus 318e:00: No busn resource found for root bus, will use [bus 00-ff] Feb 12 19:55:26.421032 kernel: pci 318e:00:02.0: [15b3:1016] type 00 class 0x020000 Feb 12 19:55:26.427954 kernel: pci 318e:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 12 19:55:26.447800 kernel: pci 318e:00:02.0: enabling Extended Tags Feb 12 19:55:26.460887 kernel: pci 318e:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 318e:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Feb 12 19:55:26.469076 kernel: pci_bus 318e:00: busn_res: [bus 00-ff] end is updated to 00 Feb 12 19:55:26.469261 kernel: pci 318e:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 12 19:55:26.561862 kernel: mlx5_core 318e:00:02.0: firmware version: 14.30.1350 Feb 12 19:55:26.641085 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:55:26.690857 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (454) Feb 12 19:55:26.708888 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:55:26.730861 kernel: mlx5_core 318e:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 12 19:55:26.817887 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:55:26.824511 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:55:26.829705 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:55:26.833251 systemd[1]: Starting disk-uuid.service... Feb 12 19:55:26.847856 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:55:26.856855 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:55:26.865859 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:55:26.892380 kernel: mlx5_core 318e:00:02.0: Supported tc offload range - chains: 1, prios: 1 Feb 12 19:55:26.892593 kernel: mlx5_core 318e:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Feb 12 19:55:26.904830 kernel: hv_netvsc 000d3add-9dce-000d-3add-9dce000d3add eth0: VF registering: eth1 Feb 12 19:55:26.905058 kernel: mlx5_core 318e:00:02.0 eth1: joined to eth0 Feb 12 19:55:26.917860 kernel: mlx5_core 318e:00:02.0 enP12686s1: renamed from eth1 Feb 12 19:55:27.868861 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:55:27.869494 disk-uuid[564]: The operation has completed successfully. Feb 12 19:55:27.939504 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:55:27.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:27.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:27.939605 systemd[1]: Finished disk-uuid.service. Feb 12 19:55:27.947701 systemd[1]: Starting verity-setup.service... Feb 12 19:55:27.990860 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 19:55:28.328134 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:55:28.332209 systemd[1]: Finished verity-setup.service. Feb 12 19:55:28.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:28.336905 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:55:28.411859 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:55:28.412379 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:55:28.414362 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:55:28.415180 systemd[1]: Starting ignition-setup.service... Feb 12 19:55:28.422940 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:55:28.444997 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:55:28.445047 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:55:28.445063 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:55:28.494834 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:55:28.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:28.500000 audit: BPF prog-id=9 op=LOAD Feb 12 19:55:28.501727 systemd[1]: Starting systemd-networkd.service... Feb 12 19:55:28.524893 systemd-networkd[832]: lo: Link UP Feb 12 19:55:28.524902 systemd-networkd[832]: lo: Gained carrier Feb 12 19:55:28.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:28.525789 systemd-networkd[832]: Enumeration completed Feb 12 19:55:28.525885 systemd[1]: Started systemd-networkd.service. Feb 12 19:55:28.529244 systemd[1]: Reached target network.target. Feb 12 19:55:28.530682 systemd-networkd[832]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:55:28.536408 systemd[1]: Starting iscsiuio.service... Feb 12 19:55:28.543936 systemd[1]: Started iscsiuio.service. Feb 12 19:55:28.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:28.548317 systemd[1]: Starting iscsid.service... Feb 12 19:55:28.552335 iscsid[837]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:55:28.555751 iscsid[837]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:55:28.555751 iscsid[837]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:55:28.555751 iscsid[837]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:55:28.555751 iscsid[837]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:55:28.555751 iscsid[837]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:55:28.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:28.568412 systemd[1]: Started iscsid.service. Feb 12 19:55:28.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:28.577281 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:55:28.602535 kernel: mlx5_core 318e:00:02.0 enP12686s1: Link up Feb 12 19:55:28.578323 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:55:28.590560 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:55:28.592950 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:55:28.598616 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:55:28.602534 systemd[1]: Reached target remote-fs.target. Feb 12 19:55:28.614032 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:55:28.624939 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:55:28.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:28.669876 kernel: hv_netvsc 000d3add-9dce-000d-3add-9dce000d3add eth0: Data path switched to VF: enP12686s1 Feb 12 19:55:28.670169 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:55:28.674921 systemd-networkd[832]: enP12686s1: Link UP Feb 12 19:55:28.675051 systemd-networkd[832]: eth0: Link UP Feb 12 19:55:28.675243 systemd-networkd[832]: eth0: Gained carrier Feb 12 19:55:28.683045 systemd-networkd[832]: enP12686s1: Gained carrier Feb 12 19:55:28.721956 systemd-networkd[832]: eth0: DHCPv4 address 10.200.8.15/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 12 19:55:28.861797 systemd[1]: Finished ignition-setup.service. Feb 12 19:55:28.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:28.864770 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:55:30.378069 systemd-networkd[832]: eth0: Gained IPv6LL Feb 12 19:55:32.162584 ignition[856]: Ignition 2.14.0 Feb 12 19:55:32.162600 ignition[856]: Stage: fetch-offline Feb 12 19:55:32.162688 ignition[856]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:55:32.162740 ignition[856]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:55:32.245099 ignition[856]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:55:32.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:32.246608 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:55:32.270936 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 12 19:55:32.270968 kernel: audit: type=1130 audit(1707767732.249:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:32.245326 ignition[856]: parsed url from cmdline: "" Feb 12 19:55:32.251981 systemd[1]: Starting ignition-fetch.service... Feb 12 19:55:32.245331 ignition[856]: no config URL provided Feb 12 19:55:32.245339 ignition[856]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:55:32.245352 ignition[856]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:55:32.245365 ignition[856]: failed to fetch config: resource requires networking Feb 12 19:55:32.245711 ignition[856]: Ignition finished successfully Feb 12 19:55:32.260531 ignition[862]: Ignition 2.14.0 Feb 12 19:55:32.260539 ignition[862]: Stage: fetch Feb 12 19:55:32.260650 ignition[862]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:55:32.260675 ignition[862]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:55:32.267228 ignition[862]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:55:32.267362 ignition[862]: parsed url from cmdline: "" Feb 12 19:55:32.267365 ignition[862]: no config URL provided Feb 12 19:55:32.267371 ignition[862]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:55:32.267378 ignition[862]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:55:32.267406 ignition[862]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 12 19:55:32.283519 ignition[862]: GET result: OK Feb 12 19:55:32.283537 ignition[862]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty) Feb 12 19:55:32.370316 ignition[862]: opening config device: "/dev/sr0" Feb 12 19:55:32.370827 ignition[862]: getting drive status for "/dev/sr0" Feb 12 19:55:32.370886 ignition[862]: drive status: OK Feb 12 19:55:32.370925 ignition[862]: mounting config device Feb 12 19:55:32.370963 ignition[862]: op(1): [started] mounting "/dev/sr0" at "/tmp/ignition-azure322079643" Feb 12 19:55:32.397234 ignition[862]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure322079643" Feb 12 19:55:32.400353 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2024/02/13 00:00 (1000) Feb 12 19:55:32.397244 ignition[862]: checking for config drive Feb 12 19:55:32.399061 ignition[862]: reading config Feb 12 19:55:32.399512 ignition[862]: op(2): [started] unmounting "/dev/sr0" at "/tmp/ignition-azure322079643" Feb 12 19:55:32.403292 ignition[862]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure322079643" Feb 12 19:55:32.404458 systemd[1]: tmp-ignition\x2dazure322079643.mount: Deactivated successfully. Feb 12 19:55:32.403323 ignition[862]: config has been read from custom data Feb 12 19:55:32.407268 unknown[862]: fetched base config from "system" Feb 12 19:55:32.403374 ignition[862]: parsing config with SHA512: a9d22416013860b0e1c08e8cbf1f99f89f29c92032420ec59a80f687c6ce376f826feb52d15789b69cb323405f36f2162921ebadd330f5094b4ea3daa7f5a08c Feb 12 19:55:32.407276 unknown[862]: fetched base config from "system" Feb 12 19:55:32.407609 ignition[862]: fetch: fetch complete Feb 12 19:55:32.407281 unknown[862]: fetched user config from "azure" Feb 12 19:55:32.432320 kernel: audit: type=1130 audit(1707767732.412:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:32.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:32.407613 ignition[862]: fetch: fetch passed Feb 12 19:55:32.412112 systemd[1]: Finished ignition-fetch.service. Feb 12 19:55:32.407649 ignition[862]: Ignition finished successfully Feb 12 19:55:32.416190 systemd[1]: Starting ignition-kargs.service... Feb 12 19:55:32.447421 ignition[871]: Ignition 2.14.0 Feb 12 19:55:32.447432 ignition[871]: Stage: kargs Feb 12 19:55:32.447577 ignition[871]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:55:32.447610 ignition[871]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:55:32.457489 ignition[871]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:55:32.458250 ignition[871]: kargs: kargs passed Feb 12 19:55:32.458292 ignition[871]: Ignition finished successfully Feb 12 19:55:32.464530 systemd[1]: Finished ignition-kargs.service. Feb 12 19:55:32.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:32.477658 systemd[1]: Starting ignition-disks.service... Feb 12 19:55:32.483688 kernel: audit: type=1130 audit(1707767732.466:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:32.490115 ignition[877]: Ignition 2.14.0 Feb 12 19:55:32.490125 ignition[877]: Stage: disks Feb 12 19:55:32.490260 ignition[877]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:55:32.490293 ignition[877]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:55:32.500309 ignition[877]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:55:32.501172 ignition[877]: disks: disks passed Feb 12 19:55:32.501214 ignition[877]: Ignition finished successfully Feb 12 19:55:32.504652 systemd[1]: Finished ignition-disks.service. Feb 12 19:55:32.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:32.508482 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:55:32.526548 kernel: audit: type=1130 audit(1707767732.508:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:32.522408 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:55:32.526531 systemd[1]: Reached target local-fs.target. Feb 12 19:55:32.528429 systemd[1]: Reached target sysinit.target. Feb 12 19:55:32.530198 systemd[1]: Reached target basic.target. Feb 12 19:55:32.534574 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:55:32.587463 systemd-fsck[885]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 12 19:55:32.593481 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:55:32.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:32.598909 systemd[1]: Mounting sysroot.mount... Feb 12 19:55:32.613194 kernel: audit: type=1130 audit(1707767732.597:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:32.623929 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:55:32.624177 systemd[1]: Mounted sysroot.mount. Feb 12 19:55:32.626037 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:55:32.681665 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:55:32.685541 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:55:32.691373 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:55:32.691419 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:55:32.700174 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:55:32.729802 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:55:32.735385 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:55:32.750850 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (895) Feb 12 19:55:32.756033 initrd-setup-root[900]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:55:32.767135 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:55:32.767158 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:55:32.767175 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:55:32.770140 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:55:32.811817 initrd-setup-root[926]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:55:32.818890 initrd-setup-root[934]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:55:32.825605 initrd-setup-root[942]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:55:33.300588 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:55:33.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:33.303804 systemd[1]: Starting ignition-mount.service... Feb 12 19:55:33.326209 kernel: audit: type=1130 audit(1707767733.302:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:33.320962 systemd[1]: Starting sysroot-boot.service... Feb 12 19:55:33.345135 systemd[1]: Finished sysroot-boot.service. Feb 12 19:55:33.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:33.359911 kernel: audit: type=1130 audit(1707767733.346:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:33.368539 ignition[963]: INFO : Ignition 2.14.0 Feb 12 19:55:33.368539 ignition[963]: INFO : Stage: mount Feb 12 19:55:33.372430 ignition[963]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:55:33.372430 ignition[963]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:55:33.382228 ignition[963]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:55:33.388896 ignition[963]: INFO : mount: mount passed Feb 12 19:55:33.390672 ignition[963]: INFO : Ignition finished successfully Feb 12 19:55:33.393392 systemd[1]: Finished ignition-mount.service. Feb 12 19:55:33.408546 kernel: audit: type=1130 audit(1707767733.394:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:33.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:33.398461 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 19:55:33.398537 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 19:55:34.227683 coreos-metadata[894]: Feb 12 19:55:34.227 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:55:34.241724 coreos-metadata[894]: Feb 12 19:55:34.241 INFO Fetch successful Feb 12 19:55:34.274229 coreos-metadata[894]: Feb 12 19:55:34.274 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:55:34.289278 coreos-metadata[894]: Feb 12 19:55:34.289 INFO Fetch successful Feb 12 19:55:34.304038 coreos-metadata[894]: Feb 12 19:55:34.303 INFO wrote hostname ci-3510.3.2-a-d8f49246fd to /sysroot/etc/hostname Feb 12 19:55:34.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.306218 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:55:34.313109 systemd[1]: Starting ignition-files.service... Feb 12 19:55:34.325717 kernel: audit: type=1130 audit(1707767734.309:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.331781 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:55:34.345862 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (973) Feb 12 19:55:34.345906 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:55:34.353848 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:55:34.353883 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:55:34.363029 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:55:34.374348 ignition[992]: INFO : Ignition 2.14.0 Feb 12 19:55:34.374348 ignition[992]: INFO : Stage: files Feb 12 19:55:34.378037 ignition[992]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:55:34.378037 ignition[992]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:55:34.391053 ignition[992]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:55:34.405731 ignition[992]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:55:34.425197 ignition[992]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:55:34.425197 ignition[992]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:55:34.449229 ignition[992]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:55:34.452795 ignition[992]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:55:34.452795 ignition[992]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:55:34.452795 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:55:34.452795 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:55:34.452795 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:55:34.452795 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:55:34.482668 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (997) Feb 12 19:55:34.449778 unknown[992]: wrote ssh authorized keys file for user: core Feb 12 19:55:34.485156 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1284219453" Feb 12 19:55:34.485156 ignition[992]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1284219453": device or resource busy Feb 12 19:55:34.485156 ignition[992]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1284219453", trying btrfs: device or resource busy Feb 12 19:55:34.485156 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1284219453" Feb 12 19:55:34.485156 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1284219453" Feb 12 19:55:34.485156 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem1284219453" Feb 12 19:55:34.485156 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem1284219453" Feb 12 19:55:34.485156 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:55:34.485156 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:55:34.485156 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:55:34.485156 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2241316213" Feb 12 19:55:34.485156 ignition[992]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2241316213": device or resource busy Feb 12 19:55:34.485156 ignition[992]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2241316213", trying btrfs: device or resource busy Feb 12 19:55:34.485156 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2241316213" Feb 12 19:55:34.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.469785 systemd[1]: mnt-oem1284219453.mount: Deactivated successfully. Feb 12 19:55:34.519364 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2241316213" Feb 12 19:55:34.519364 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem2241316213" Feb 12 19:55:34.519364 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem2241316213" Feb 12 19:55:34.519364 ignition[992]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:55:34.519364 ignition[992]: INFO : files: op(c): [started] processing unit "waagent.service" Feb 12 19:55:34.519364 ignition[992]: INFO : files: op(c): [finished] processing unit "waagent.service" Feb 12 19:55:34.519364 ignition[992]: INFO : files: op(d): [started] processing unit "nvidia.service" Feb 12 19:55:34.519364 ignition[992]: INFO : files: op(d): [finished] processing unit "nvidia.service" Feb 12 19:55:34.519364 ignition[992]: INFO : files: op(e): [started] setting preset to enabled for "waagent.service" Feb 12 19:55:34.519364 ignition[992]: INFO : files: op(e): [finished] setting preset to enabled for "waagent.service" Feb 12 19:55:34.519364 ignition[992]: INFO : files: op(f): [started] setting preset to enabled for "nvidia.service" Feb 12 19:55:34.519364 ignition[992]: INFO : files: op(f): [finished] setting preset to enabled for "nvidia.service" Feb 12 19:55:34.519364 ignition[992]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:55:34.519364 ignition[992]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:55:34.519364 ignition[992]: INFO : files: files passed Feb 12 19:55:34.519364 ignition[992]: INFO : Ignition finished successfully Feb 12 19:55:34.620569 kernel: audit: type=1130 audit(1707767734.502:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.490415 systemd[1]: mnt-oem2241316213.mount: Deactivated successfully. Feb 12 19:55:34.498501 systemd[1]: Finished ignition-files.service. Feb 12 19:55:34.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.626569 initrd-setup-root-after-ignition[1017]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:55:34.503439 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:55:34.521373 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:55:34.575523 systemd[1]: Starting ignition-quench.service... Feb 12 19:55:34.606996 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:55:34.620715 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:55:34.622930 systemd[1]: Finished ignition-quench.service. Feb 12 19:55:34.626672 systemd[1]: Reached target ignition-complete.target. Feb 12 19:55:34.641975 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:55:34.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.659568 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:55:34.659660 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:55:34.662010 systemd[1]: Reached target initrd-fs.target. Feb 12 19:55:34.663822 systemd[1]: Reached target initrd.target. Feb 12 19:55:34.667933 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:55:34.668737 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:55:34.682130 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:55:34.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.686860 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:55:34.696698 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:55:34.700766 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:55:34.704946 systemd[1]: Stopped target timers.target. Feb 12 19:55:34.708318 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:55:34.710585 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:55:34.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.714284 systemd[1]: Stopped target initrd.target. Feb 12 19:55:34.717876 systemd[1]: Stopped target basic.target. Feb 12 19:55:34.721364 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:55:34.725513 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:55:34.729521 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:55:34.733922 systemd[1]: Stopped target remote-fs.target. Feb 12 19:55:34.737882 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:55:34.741875 systemd[1]: Stopped target sysinit.target. Feb 12 19:55:34.745387 systemd[1]: Stopped target local-fs.target. Feb 12 19:55:34.750617 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:55:34.754325 systemd[1]: Stopped target swap.target. Feb 12 19:55:34.757594 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:55:34.759758 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:55:34.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.763645 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:55:34.767200 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:55:34.769402 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:55:34.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.773109 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:55:34.775732 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:55:34.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.780494 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:55:34.782694 systemd[1]: Stopped ignition-files.service. Feb 12 19:55:34.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.786323 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:55:34.788924 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:55:34.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.791984 systemd[1]: Stopping ignition-mount.service... Feb 12 19:55:34.798088 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:55:34.801793 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:55:34.804425 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:55:34.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.808833 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:55:34.811456 ignition[1030]: INFO : Ignition 2.14.0 Feb 12 19:55:34.811456 ignition[1030]: INFO : Stage: umount Feb 12 19:55:34.811456 ignition[1030]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:55:34.811456 ignition[1030]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:55:34.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.813509 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:55:34.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.834548 ignition[1030]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:55:34.834548 ignition[1030]: INFO : umount: umount passed Feb 12 19:55:34.834548 ignition[1030]: INFO : Ignition finished successfully Feb 12 19:55:34.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.820661 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:55:34.820745 systemd[1]: Stopped ignition-mount.service. Feb 12 19:55:34.824239 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:55:34.824326 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:55:34.831589 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:55:34.831636 systemd[1]: Stopped ignition-disks.service. Feb 12 19:55:34.834485 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:55:34.834533 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:55:34.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.836359 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:55:34.836395 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:55:34.840752 systemd[1]: Stopped target network.target. Feb 12 19:55:34.844346 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:55:34.844398 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:55:34.849787 systemd[1]: Stopped target paths.target. Feb 12 19:55:34.851447 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:55:34.856900 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:55:34.859874 systemd[1]: Stopped target slices.target. Feb 12 19:55:34.861656 systemd[1]: Stopped target sockets.target. Feb 12 19:55:34.865058 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:55:34.865094 systemd[1]: Closed iscsid.socket. Feb 12 19:55:34.869005 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:55:34.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.869037 systemd[1]: Closed iscsiuio.socket. Feb 12 19:55:34.872211 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:55:34.872268 systemd[1]: Stopped ignition-setup.service. Feb 12 19:55:34.877106 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:55:34.882744 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:55:34.885053 systemd-networkd[832]: eth0: DHCPv6 lease lost Feb 12 19:55:34.906111 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:55:34.906951 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:55:34.907078 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:55:34.921780 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:55:34.925918 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:55:34.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.933815 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:55:34.936114 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:55:34.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.939000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:55:34.939000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:55:34.939820 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:55:34.941942 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:55:34.945607 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:55:34.947769 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:55:34.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.953688 systemd[1]: Stopping network-cleanup.service... Feb 12 19:55:34.957236 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:55:34.959550 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:55:34.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.963493 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:55:34.963547 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:55:34.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.969190 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:55:34.969245 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:55:34.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.975590 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:55:34.981789 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:55:34.984137 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:55:34.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.987847 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:55:34.987899 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:55:34.993812 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:55:34.994885 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:55:35.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.999011 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:55:35.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:34.999060 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:55:35.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:35.002738 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:55:35.002786 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:55:35.006854 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:55:35.006903 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:55:35.011658 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:55:35.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:35.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:35.020390 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:55:35.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:35.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:35.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:35.020444 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:55:35.023399 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:55:35.023441 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:55:35.027409 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:55:35.027459 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:55:35.050923 kernel: hv_netvsc 000d3add-9dce-000d-3add-9dce000d3add eth0: Data path switched from VF: enP12686s1 Feb 12 19:55:35.029736 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:55:35.029827 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:55:35.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:35.070651 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:55:35.070746 systemd[1]: Stopped network-cleanup.service. Feb 12 19:55:35.073248 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:55:35.081988 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:55:35.095899 systemd[1]: Switching root. Feb 12 19:55:35.121674 iscsid[837]: iscsid shutting down. Feb 12 19:55:35.123293 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Feb 12 19:55:35.123368 systemd-journald[183]: Journal stopped Feb 12 19:55:49.878214 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:55:49.878245 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:55:49.878259 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:55:49.878269 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:55:49.878279 kernel: SELinux: policy capability open_perms=1 Feb 12 19:55:49.878287 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:55:49.878299 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:55:49.878312 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:55:49.878321 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:55:49.878332 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:55:49.878341 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:55:49.878351 kernel: kauditd_printk_skb: 41 callbacks suppressed Feb 12 19:55:49.878362 kernel: audit: type=1403 audit(1707767737.699:80): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:55:49.878374 systemd[1]: Successfully loaded SELinux policy in 328.639ms. Feb 12 19:55:49.878390 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 23.070ms. Feb 12 19:55:49.878403 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:55:49.878414 systemd[1]: Detected virtualization microsoft. Feb 12 19:55:49.878424 systemd[1]: Detected architecture x86-64. Feb 12 19:55:49.878434 systemd[1]: Detected first boot. Feb 12 19:55:49.878448 systemd[1]: Hostname set to . Feb 12 19:55:49.878462 systemd[1]: Initializing machine ID from random generator. Feb 12 19:55:49.880731 kernel: audit: type=1400 audit(1707767738.472:81): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:55:49.880765 kernel: audit: type=1400 audit(1707767738.487:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:55:49.880780 kernel: audit: type=1400 audit(1707767738.487:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:55:49.880794 kernel: audit: type=1334 audit(1707767738.510:84): prog-id=10 op=LOAD Feb 12 19:55:49.880808 kernel: audit: type=1334 audit(1707767738.510:85): prog-id=10 op=UNLOAD Feb 12 19:55:49.880817 kernel: audit: type=1334 audit(1707767738.520:86): prog-id=11 op=LOAD Feb 12 19:55:49.880827 kernel: audit: type=1334 audit(1707767738.520:87): prog-id=11 op=UNLOAD Feb 12 19:55:49.882290 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:55:49.882317 kernel: audit: type=1400 audit(1707767739.824:88): avc: denied { associate } for pid=1063 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:55:49.882332 kernel: audit: type=1300 audit(1707767739.824:88): arch=c000003e syscall=188 success=yes exit=0 a0=c0001058cc a1=c00002ae58 a2=c000029b00 a3=32 items=0 ppid=1046 pid=1063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:55:49.882346 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:55:49.882363 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:55:49.882375 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:55:49.882387 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:55:49.882398 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:55:49.882407 kernel: audit: type=1334 audit(1707767749.382:90): prog-id=12 op=LOAD Feb 12 19:55:49.882416 kernel: audit: type=1334 audit(1707767749.382:91): prog-id=3 op=UNLOAD Feb 12 19:55:49.882427 kernel: audit: type=1334 audit(1707767749.391:92): prog-id=13 op=LOAD Feb 12 19:55:49.882442 kernel: audit: type=1334 audit(1707767749.400:93): prog-id=14 op=LOAD Feb 12 19:55:49.882455 kernel: audit: type=1334 audit(1707767749.400:94): prog-id=4 op=UNLOAD Feb 12 19:55:49.882469 kernel: audit: type=1334 audit(1707767749.400:95): prog-id=5 op=UNLOAD Feb 12 19:55:49.882480 kernel: audit: type=1131 audit(1707767749.406:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.882491 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:55:49.882504 systemd[1]: Stopped iscsiuio.service. Feb 12 19:55:49.882516 kernel: audit: type=1334 audit(1707767749.430:97): prog-id=12 op=UNLOAD Feb 12 19:55:49.882530 kernel: audit: type=1131 audit(1707767749.440:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.882546 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:55:49.882560 systemd[1]: Stopped iscsid.service. Feb 12 19:55:49.882575 kernel: audit: type=1131 audit(1707767749.462:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.882588 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:55:49.882604 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:55:49.882620 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:55:49.882637 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:55:49.882653 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:55:49.882672 systemd[1]: Created slice system-getty.slice. Feb 12 19:55:49.882688 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:55:49.882701 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:55:49.882713 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:55:49.882725 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:55:49.882737 systemd[1]: Created slice user.slice. Feb 12 19:55:49.882747 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:55:49.882760 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:55:49.882770 systemd[1]: Set up automount boot.automount. Feb 12 19:55:49.882784 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:55:49.882796 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:55:49.882809 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:55:49.882821 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:55:49.882833 systemd[1]: Reached target integritysetup.target. Feb 12 19:55:49.882904 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:55:49.882916 systemd[1]: Reached target remote-fs.target. Feb 12 19:55:49.882927 systemd[1]: Reached target slices.target. Feb 12 19:55:49.882942 systemd[1]: Reached target swap.target. Feb 12 19:55:49.882955 systemd[1]: Reached target torcx.target. Feb 12 19:55:49.882965 systemd[1]: Reached target veritysetup.target. Feb 12 19:55:49.882978 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:55:49.882992 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:55:49.883002 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:55:49.883015 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:55:49.883028 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:55:49.883038 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:55:49.883051 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:55:49.883064 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:55:49.883074 systemd[1]: Mounting media.mount... Feb 12 19:55:49.883087 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:55:49.883102 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:55:49.883112 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:55:49.883124 systemd[1]: Mounting tmp.mount... Feb 12 19:55:49.883137 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:55:49.883147 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:55:49.883160 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:55:49.883172 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:55:49.883182 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:55:49.883195 systemd[1]: Starting modprobe@drm.service... Feb 12 19:55:49.883209 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:55:49.883219 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:55:49.883232 systemd[1]: Starting modprobe@loop.service... Feb 12 19:55:49.883245 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:55:49.883255 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:55:49.883268 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:55:49.883281 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:55:49.883291 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:55:49.883304 systemd[1]: Stopped systemd-journald.service. Feb 12 19:55:49.883318 systemd[1]: Starting systemd-journald.service... Feb 12 19:55:49.883328 kernel: loop: module loaded Feb 12 19:55:49.883341 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:55:49.883353 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:55:49.883363 kernel: fuse: init (API version 7.34) Feb 12 19:55:49.883375 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:55:49.883388 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:55:49.883398 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:55:49.883410 systemd[1]: Stopped verity-setup.service. Feb 12 19:55:49.883425 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:55:49.883435 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:55:49.883448 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:55:49.883461 systemd[1]: Mounted media.mount. Feb 12 19:55:49.883471 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:55:49.883488 systemd-journald[1152]: Journal started Feb 12 19:55:49.883547 systemd-journald[1152]: Runtime Journal (/run/log/journal/bea1ff4b65f2492faa6902681ba6fd5e) is 8.0M, max 159.0M, 151.0M free. Feb 12 19:55:37.699000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:55:38.472000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:55:38.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:55:38.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:55:38.510000 audit: BPF prog-id=10 op=LOAD Feb 12 19:55:38.510000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:55:38.520000 audit: BPF prog-id=11 op=LOAD Feb 12 19:55:38.520000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:55:39.824000 audit[1063]: AVC avc: denied { associate } for pid=1063 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:55:39.824000 audit[1063]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058cc a1=c00002ae58 a2=c000029b00 a3=32 items=0 ppid=1046 pid=1063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:55:39.824000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:55:39.833000 audit[1063]: AVC avc: denied { associate } for pid=1063 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:55:39.833000 audit[1063]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a5 a2=1ed a3=0 items=2 ppid=1046 pid=1063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:55:39.833000 audit: CWD cwd="/" Feb 12 19:55:39.833000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:39.833000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:39.833000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:55:49.382000 audit: BPF prog-id=12 op=LOAD Feb 12 19:55:49.382000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:55:49.391000 audit: BPF prog-id=13 op=LOAD Feb 12 19:55:49.400000 audit: BPF prog-id=14 op=LOAD Feb 12 19:55:49.400000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:55:49.400000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:55:49.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.430000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:55:49.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.792000 audit: BPF prog-id=15 op=LOAD Feb 12 19:55:49.793000 audit: BPF prog-id=16 op=LOAD Feb 12 19:55:49.793000 audit: BPF prog-id=17 op=LOAD Feb 12 19:55:49.793000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:55:49.793000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:55:49.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.874000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:55:49.874000 audit[1152]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffed029cf20 a2=4000 a3=7ffed029cfbc items=0 ppid=1 pid=1152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:55:49.874000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:55:39.812033 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:55:49.381230 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:55:39.812609 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:55:49.406977 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:55:39.812631 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:55:39.812668 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:55:39.812680 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:55:39.812726 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:55:39.812740 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:55:39.812991 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:55:39.813049 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:55:39.813066 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:55:39.813590 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:55:39.813629 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:55:39.813651 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:55:39.813668 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:55:39.813686 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:55:39.813702 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:55:47.710831 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:47Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:55:47.711103 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:47Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:55:47.711203 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:47Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:55:47.711812 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:47Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:55:47.711899 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:47Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:55:47.711975 /usr/lib/systemd/system-generators/torcx-generator[1063]: time="2024-02-12T19:55:47Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:55:49.893102 systemd[1]: Started systemd-journald.service. Feb 12 19:55:49.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.893894 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:55:49.896139 systemd[1]: Mounted tmp.mount. Feb 12 19:55:49.897795 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:55:49.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.899914 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:55:49.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.902018 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:55:49.902159 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:55:49.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.904396 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:55:49.904539 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:55:49.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.906823 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:55:49.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.907150 systemd[1]: Finished modprobe@drm.service. Feb 12 19:55:49.909246 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:55:49.909410 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:55:49.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.915091 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:55:49.915304 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:55:49.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.917693 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:55:49.918141 systemd[1]: Finished modprobe@loop.service. Feb 12 19:55:49.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.920568 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:55:49.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.923028 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:55:49.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.925738 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:55:49.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:49.928625 systemd[1]: Reached target network-pre.target. Feb 12 19:55:49.931741 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:55:49.935290 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:55:49.937686 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:55:49.940915 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:55:49.943830 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:55:49.945960 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:55:49.947009 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:55:49.948899 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:55:49.949897 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:55:49.953952 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:55:49.958333 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:55:49.960557 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:55:50.001239 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:55:50.003594 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:55:50.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:50.015463 systemd-journald[1152]: Time spent on flushing to /var/log/journal/bea1ff4b65f2492faa6902681ba6fd5e is 24.606ms for 1140 entries. Feb 12 19:55:50.015463 systemd-journald[1152]: System Journal (/var/log/journal/bea1ff4b65f2492faa6902681ba6fd5e) is 8.0M, max 2.6G, 2.6G free. Feb 12 19:55:50.118044 systemd-journald[1152]: Received client request to flush runtime journal. Feb 12 19:55:50.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:50.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:50.037507 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:55:50.049002 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:55:50.119015 udevadm[1187]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 19:55:50.052400 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:55:50.119301 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:55:50.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:50.597504 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:55:50.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:50.600958 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:55:51.210396 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:55:51.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:51.229888 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:55:51.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:51.232000 audit: BPF prog-id=18 op=LOAD Feb 12 19:55:51.232000 audit: BPF prog-id=19 op=LOAD Feb 12 19:55:51.232000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:55:51.232000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:55:51.233848 systemd[1]: Starting systemd-udevd.service... Feb 12 19:55:51.252200 systemd-udevd[1191]: Using default interface naming scheme 'v252'. Feb 12 19:55:51.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:51.476000 audit: BPF prog-id=20 op=LOAD Feb 12 19:55:51.472653 systemd[1]: Started systemd-udevd.service. Feb 12 19:55:51.478015 systemd[1]: Starting systemd-networkd.service... Feb 12 19:55:51.517671 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 19:55:51.540000 audit: BPF prog-id=21 op=LOAD Feb 12 19:55:51.540000 audit: BPF prog-id=22 op=LOAD Feb 12 19:55:51.540000 audit: BPF prog-id=23 op=LOAD Feb 12 19:55:51.542610 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:55:51.571858 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:55:51.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:51.606580 systemd[1]: Started systemd-userdbd.service. Feb 12 19:55:51.639502 kernel: hv_utils: Registering HyperV Utility Driver Feb 12 19:55:51.639621 kernel: hv_vmbus: registering driver hv_utils Feb 12 19:55:51.652013 kernel: hv_vmbus: registering driver hyperv_fb Feb 12 19:55:51.617000 audit[1204]: AVC avc: denied { confidentiality } for pid=1204 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:55:51.659894 kernel: hv_vmbus: registering driver hv_balloon Feb 12 19:55:51.663863 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 12 19:55:51.672192 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 12 19:55:51.672256 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 12 19:55:51.678718 kernel: Console: switching to colour dummy device 80x25 Feb 12 19:55:51.685992 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:55:51.617000 audit[1204]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f5f272a8f0 a1=f884 a2=7f7744075bc5 a3=5 items=12 ppid=1191 pid=1204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:55:51.617000 audit: CWD cwd="/" Feb 12 19:55:51.617000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:51.617000 audit: PATH item=1 name=(null) inode=14713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:51.617000 audit: PATH item=2 name=(null) inode=14713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:51.617000 audit: PATH item=3 name=(null) inode=14714 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:51.617000 audit: PATH item=4 name=(null) inode=14713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:51.617000 audit: PATH item=5 name=(null) inode=14715 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:51.617000 audit: PATH item=6 name=(null) inode=14713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:51.617000 audit: PATH item=7 name=(null) inode=14716 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:51.617000 audit: PATH item=8 name=(null) inode=14713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:51.617000 audit: PATH item=9 name=(null) inode=14717 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:51.617000 audit: PATH item=10 name=(null) inode=14713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:51.617000 audit: PATH item=11 name=(null) inode=14718 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:55:51.617000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:55:51.702449 kernel: hv_utils: Heartbeat IC version 3.0 Feb 12 19:55:51.702520 kernel: hv_utils: Shutdown IC version 3.2 Feb 12 19:55:51.702553 kernel: hv_utils: TimeSync IC version 4.0 Feb 12 19:55:51.869651 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1197) Feb 12 19:55:51.925532 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Feb 12 19:55:51.941638 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:55:51.971891 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:55:51.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:51.975537 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:55:51.997379 systemd-networkd[1202]: lo: Link UP Feb 12 19:55:51.997391 systemd-networkd[1202]: lo: Gained carrier Feb 12 19:55:51.998003 systemd-networkd[1202]: Enumeration completed Feb 12 19:55:51.998135 systemd[1]: Started systemd-networkd.service. Feb 12 19:55:52.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:52.001970 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:55:52.032876 systemd-networkd[1202]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:55:52.085538 kernel: mlx5_core 318e:00:02.0 enP12686s1: Link up Feb 12 19:55:52.123545 kernel: hv_netvsc 000d3add-9dce-000d-3add-9dce000d3add eth0: Data path switched to VF: enP12686s1 Feb 12 19:55:52.124985 systemd-networkd[1202]: enP12686s1: Link UP Feb 12 19:55:52.125334 systemd-networkd[1202]: eth0: Link UP Feb 12 19:55:52.125434 systemd-networkd[1202]: eth0: Gained carrier Feb 12 19:55:52.129839 systemd-networkd[1202]: enP12686s1: Gained carrier Feb 12 19:55:52.161653 systemd-networkd[1202]: eth0: DHCPv4 address 10.200.8.15/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 12 19:55:52.248612 lvm[1268]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:55:52.276701 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:55:52.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:52.279390 systemd[1]: Reached target cryptsetup.target. Feb 12 19:55:52.282708 systemd[1]: Starting lvm2-activation.service... Feb 12 19:55:52.287341 lvm[1270]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:55:52.313749 systemd[1]: Finished lvm2-activation.service. Feb 12 19:55:52.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:52.316481 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:55:52.318938 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:55:52.318980 systemd[1]: Reached target local-fs.target. Feb 12 19:55:52.321274 systemd[1]: Reached target machines.target. Feb 12 19:55:52.324482 systemd[1]: Starting ldconfig.service... Feb 12 19:55:52.326466 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:55:52.326577 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:55:52.327828 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:55:52.331344 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:55:52.335146 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:55:52.337267 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:55:52.337354 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:55:52.338810 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:55:52.353128 systemd-tmpfiles[1275]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:55:52.372670 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1272 (bootctl) Feb 12 19:55:52.374099 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:55:52.397616 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:55:52.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:52.401332 systemd-tmpfiles[1275]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:55:52.415485 systemd-tmpfiles[1275]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:55:52.452089 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:55:52.452743 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:55:52.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:53.087575 systemd-fsck[1280]: fsck.fat 4.2 (2021-01-31) Feb 12 19:55:53.087575 systemd-fsck[1280]: /dev/sda1: 789 files, 115339/258078 clusters Feb 12 19:55:53.090206 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:55:53.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:53.094967 systemd[1]: Mounting boot.mount... Feb 12 19:55:53.106687 systemd[1]: Mounted boot.mount. Feb 12 19:55:53.120383 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:55:53.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:53.319574 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:55:53.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:53.323549 systemd[1]: Starting audit-rules.service... Feb 12 19:55:53.326922 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:55:53.330374 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:55:53.333000 audit: BPF prog-id=24 op=LOAD Feb 12 19:55:53.335231 systemd[1]: Starting systemd-resolved.service... Feb 12 19:55:53.339000 audit: BPF prog-id=25 op=LOAD Feb 12 19:55:53.340910 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:55:53.344320 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:55:53.376000 audit[1291]: SYSTEM_BOOT pid=1291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:55:53.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:53.380323 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:55:53.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:53.414383 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:55:53.417433 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:55:53.433899 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:55:53.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:53.447193 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:55:53.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:53.449638 systemd[1]: Reached target time-set.target. Feb 12 19:55:53.506048 systemd-resolved[1289]: Positive Trust Anchors: Feb 12 19:55:53.506065 systemd-resolved[1289]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:55:53.506102 systemd-resolved[1289]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:55:53.665220 systemd-resolved[1289]: Using system hostname 'ci-3510.3.2-a-d8f49246fd'. Feb 12 19:55:53.667214 systemd[1]: Started systemd-resolved.service. Feb 12 19:55:53.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:55:53.669767 systemd[1]: Reached target network.target. Feb 12 19:55:53.671742 systemd[1]: Reached target nss-lookup.target. Feb 12 19:55:53.775000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:55:53.775000 audit[1307]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff1cbafc40 a2=420 a3=0 items=0 ppid=1286 pid=1307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:55:53.775000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:55:53.776356 augenrules[1307]: No rules Feb 12 19:55:53.776959 systemd[1]: Finished audit-rules.service. Feb 12 19:55:53.809714 systemd-timesyncd[1290]: Contacted time server 77.68.25.145:123 (0.flatcar.pool.ntp.org). Feb 12 19:55:53.809800 systemd-timesyncd[1290]: Initial clock synchronization to Mon 2024-02-12 19:55:53.812443 UTC. Feb 12 19:55:54.045754 systemd-networkd[1202]: eth0: Gained IPv6LL Feb 12 19:55:54.048054 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:55:54.050324 systemd[1]: Reached target network-online.target. Feb 12 19:56:00.266629 ldconfig[1271]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:56:00.294702 systemd[1]: Finished ldconfig.service. Feb 12 19:56:00.298649 systemd[1]: Starting systemd-update-done.service... Feb 12 19:56:00.319277 systemd[1]: Finished systemd-update-done.service. Feb 12 19:56:00.321760 systemd[1]: Reached target sysinit.target. Feb 12 19:56:00.323695 systemd[1]: Started motdgen.path. Feb 12 19:56:00.325272 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:56:00.328012 systemd[1]: Started logrotate.timer. Feb 12 19:56:00.329879 systemd[1]: Started mdadm.timer. Feb 12 19:56:00.331579 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:56:00.333833 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:56:00.333874 systemd[1]: Reached target paths.target. Feb 12 19:56:00.335582 systemd[1]: Reached target timers.target. Feb 12 19:56:00.338555 systemd[1]: Listening on dbus.socket. Feb 12 19:56:00.342167 systemd[1]: Starting docker.socket... Feb 12 19:56:00.416413 systemd[1]: Listening on sshd.socket. Feb 12 19:56:00.419070 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:56:00.419702 systemd[1]: Listening on docker.socket. Feb 12 19:56:00.421673 systemd[1]: Reached target sockets.target. Feb 12 19:56:00.423574 systemd[1]: Reached target basic.target. Feb 12 19:56:00.425311 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:56:00.425346 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:56:00.426420 systemd[1]: Starting containerd.service... Feb 12 19:56:00.430291 systemd[1]: Starting dbus.service... Feb 12 19:56:00.432792 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:56:00.435845 systemd[1]: Starting extend-filesystems.service... Feb 12 19:56:00.437657 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:56:00.439013 systemd[1]: Starting motdgen.service... Feb 12 19:56:00.443074 systemd[1]: Started nvidia.service. Feb 12 19:56:00.446486 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:56:00.450193 systemd[1]: Starting sshd-keygen.service... Feb 12 19:56:00.456395 systemd[1]: Starting systemd-logind.service... Feb 12 19:56:00.460601 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:56:00.460687 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:56:00.461216 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:56:00.462134 systemd[1]: Starting update-engine.service... Feb 12 19:56:00.467092 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:56:00.473767 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:56:00.474186 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:56:00.527257 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:56:00.527500 systemd[1]: Finished motdgen.service. Feb 12 19:56:00.545532 extend-filesystems[1318]: Found sda Feb 12 19:56:00.557033 jq[1317]: false Feb 12 19:56:00.557379 jq[1333]: true Feb 12 19:56:00.558454 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:56:00.558731 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:56:00.559238 extend-filesystems[1318]: Found sda1 Feb 12 19:56:00.561049 extend-filesystems[1318]: Found sda2 Feb 12 19:56:00.561049 extend-filesystems[1318]: Found sda3 Feb 12 19:56:00.561049 extend-filesystems[1318]: Found usr Feb 12 19:56:00.566527 extend-filesystems[1318]: Found sda4 Feb 12 19:56:00.566527 extend-filesystems[1318]: Found sda6 Feb 12 19:56:00.566527 extend-filesystems[1318]: Found sda7 Feb 12 19:56:00.566527 extend-filesystems[1318]: Found sda9 Feb 12 19:56:00.566527 extend-filesystems[1318]: Checking size of /dev/sda9 Feb 12 19:56:00.588569 env[1340]: time="2024-02-12T19:56:00.588168462Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:56:00.593565 jq[1349]: true Feb 12 19:56:00.601743 systemd-logind[1327]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 19:56:00.606390 systemd-logind[1327]: New seat seat0. Feb 12 19:56:00.647633 extend-filesystems[1318]: Old size kept for /dev/sda9 Feb 12 19:56:00.653621 extend-filesystems[1318]: Found sr0 Feb 12 19:56:00.648186 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:56:00.648352 systemd[1]: Finished extend-filesystems.service. Feb 12 19:56:00.678364 env[1340]: time="2024-02-12T19:56:00.678307032Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:56:00.678592 env[1340]: time="2024-02-12T19:56:00.678517658Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:56:00.680331 env[1340]: time="2024-02-12T19:56:00.680284171Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:56:00.680331 env[1340]: time="2024-02-12T19:56:00.680326676Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:56:00.680643 env[1340]: time="2024-02-12T19:56:00.680612411Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:56:00.680715 env[1340]: time="2024-02-12T19:56:00.680644014Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:56:00.680715 env[1340]: time="2024-02-12T19:56:00.680662016Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:56:00.680715 env[1340]: time="2024-02-12T19:56:00.680675818Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:56:00.680826 env[1340]: time="2024-02-12T19:56:00.680775730Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:56:00.681093 env[1340]: time="2024-02-12T19:56:00.681067965Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:56:00.681281 env[1340]: time="2024-02-12T19:56:00.681253988Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:56:00.681330 env[1340]: time="2024-02-12T19:56:00.681283391Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:56:00.681369 env[1340]: time="2024-02-12T19:56:00.681349899Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:56:00.681415 env[1340]: time="2024-02-12T19:56:00.681367502Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:56:00.709588 env[1340]: time="2024-02-12T19:56:00.709540799Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:56:00.709588 env[1340]: time="2024-02-12T19:56:00.709594706Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:56:00.709773 env[1340]: time="2024-02-12T19:56:00.709612808Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:56:00.709773 env[1340]: time="2024-02-12T19:56:00.709653513Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:56:00.709773 env[1340]: time="2024-02-12T19:56:00.709673015Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:56:00.709773 env[1340]: time="2024-02-12T19:56:00.709690917Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:56:00.709773 env[1340]: time="2024-02-12T19:56:00.709707419Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:56:00.709773 env[1340]: time="2024-02-12T19:56:00.709724621Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:56:00.709773 env[1340]: time="2024-02-12T19:56:00.709742024Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:56:00.709773 env[1340]: time="2024-02-12T19:56:00.709761326Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:56:00.710039 env[1340]: time="2024-02-12T19:56:00.709780028Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:56:00.710039 env[1340]: time="2024-02-12T19:56:00.709798430Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:56:00.710039 env[1340]: time="2024-02-12T19:56:00.709942848Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:56:00.710145 env[1340]: time="2024-02-12T19:56:00.710041160Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:56:00.710441 env[1340]: time="2024-02-12T19:56:00.710417005Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:56:00.710524 env[1340]: time="2024-02-12T19:56:00.710460610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:56:00.710524 env[1340]: time="2024-02-12T19:56:00.710499315Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:56:00.710668 env[1340]: time="2024-02-12T19:56:00.710585525Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:56:00.710721 env[1340]: time="2024-02-12T19:56:00.710687138Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:56:00.710721 env[1340]: time="2024-02-12T19:56:00.710708340Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:56:00.710794 env[1340]: time="2024-02-12T19:56:00.710725342Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:56:00.710794 env[1340]: time="2024-02-12T19:56:00.710742344Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:56:00.710794 env[1340]: time="2024-02-12T19:56:00.710774148Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:56:00.710899 env[1340]: time="2024-02-12T19:56:00.710791450Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:56:00.710899 env[1340]: time="2024-02-12T19:56:00.710807652Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:56:00.710899 env[1340]: time="2024-02-12T19:56:00.710840356Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:56:00.711055 env[1340]: time="2024-02-12T19:56:00.711035480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:56:00.711103 env[1340]: time="2024-02-12T19:56:00.711063683Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:56:00.711103 env[1340]: time="2024-02-12T19:56:00.711095687Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:56:00.711180 env[1340]: time="2024-02-12T19:56:00.711114189Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:56:00.711180 env[1340]: time="2024-02-12T19:56:00.711137492Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:56:00.711180 env[1340]: time="2024-02-12T19:56:00.711168396Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:56:00.711281 env[1340]: time="2024-02-12T19:56:00.711195799Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:56:00.711281 env[1340]: time="2024-02-12T19:56:00.711251706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:56:00.711682 env[1340]: time="2024-02-12T19:56:00.711599348Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:56:00.762910 env[1340]: time="2024-02-12T19:56:00.711708361Z" level=info msg="Connect containerd service" Feb 12 19:56:00.762910 env[1340]: time="2024-02-12T19:56:00.711755466Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:56:00.762910 env[1340]: time="2024-02-12T19:56:00.712620571Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:56:00.762910 env[1340]: time="2024-02-12T19:56:00.712714682Z" level=info msg="Start subscribing containerd event" Feb 12 19:56:00.762910 env[1340]: time="2024-02-12T19:56:00.712782990Z" level=info msg="Start recovering state" Feb 12 19:56:00.762910 env[1340]: time="2024-02-12T19:56:00.712849698Z" level=info msg="Start event monitor" Feb 12 19:56:00.762910 env[1340]: time="2024-02-12T19:56:00.712867000Z" level=info msg="Start snapshots syncer" Feb 12 19:56:00.762910 env[1340]: time="2024-02-12T19:56:00.712878702Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:56:00.762910 env[1340]: time="2024-02-12T19:56:00.712889103Z" level=info msg="Start streaming server" Feb 12 19:56:00.762910 env[1340]: time="2024-02-12T19:56:00.713332056Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:56:00.762910 env[1340]: time="2024-02-12T19:56:00.713423668Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:56:00.762910 env[1340]: time="2024-02-12T19:56:00.723803419Z" level=info msg="containerd successfully booted in 0.136488s" Feb 12 19:56:00.713575 systemd[1]: Started containerd.service. Feb 12 19:56:00.770701 dbus-daemon[1316]: [system] SELinux support is enabled Feb 12 19:56:00.770874 systemd[1]: Started dbus.service. Feb 12 19:56:00.775694 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:56:00.775728 systemd[1]: Reached target system-config.target. Feb 12 19:56:00.778434 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:56:00.778830 dbus-daemon[1316]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 19:56:00.778461 systemd[1]: Reached target user-config.target. Feb 12 19:56:00.786846 systemd[1]: Started systemd-logind.service. Feb 12 19:56:00.835668 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 19:56:00.876273 bash[1377]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:56:00.872384 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:56:01.516746 update_engine[1330]: I0212 19:56:01.516351 1330 main.cc:92] Flatcar Update Engine starting Feb 12 19:56:01.597219 update_engine[1330]: I0212 19:56:01.597186 1330 update_check_scheduler.cc:74] Next update check in 8m15s Feb 12 19:56:01.597454 systemd[1]: Started update-engine.service. Feb 12 19:56:01.604440 systemd[1]: Started locksmithd.service. Feb 12 19:56:02.041541 sshd_keygen[1332]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:56:02.061823 systemd[1]: Finished sshd-keygen.service. Feb 12 19:56:02.066236 systemd[1]: Starting issuegen.service... Feb 12 19:56:02.069582 systemd[1]: Started waagent.service. Feb 12 19:56:02.073225 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:56:02.073558 systemd[1]: Finished issuegen.service. Feb 12 19:56:02.077159 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:56:02.117879 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:56:02.122386 systemd[1]: Started getty@tty1.service. Feb 12 19:56:02.126782 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 19:56:02.129346 systemd[1]: Reached target getty.target. Feb 12 19:56:02.131415 systemd[1]: Reached target multi-user.target. Feb 12 19:56:02.135127 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:56:02.155133 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:56:02.155338 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:56:02.158207 systemd[1]: Startup finished in 892ms (firmware) + 23.047s (loader) + 898ms (kernel) + 12.459s (initrd) + 24.983s (userspace) = 1min 2.281s. Feb 12 19:56:02.496667 login[1430]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 12 19:56:02.498838 login[1431]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:56:02.552335 systemd[1]: Created slice user-500.slice. Feb 12 19:56:02.553818 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:56:02.557642 systemd-logind[1327]: New session 1 of user core. Feb 12 19:56:02.564394 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:56:02.566267 systemd[1]: Starting user@500.service... Feb 12 19:56:02.578742 (systemd)[1434]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:56:02.742954 systemd[1434]: Queued start job for default target default.target. Feb 12 19:56:02.743619 systemd[1434]: Reached target paths.target. Feb 12 19:56:02.743649 systemd[1434]: Reached target sockets.target. Feb 12 19:56:02.743667 systemd[1434]: Reached target timers.target. Feb 12 19:56:02.743681 systemd[1434]: Reached target basic.target. Feb 12 19:56:02.743807 systemd[1]: Started user@500.service. Feb 12 19:56:02.745059 systemd[1]: Started session-1.scope. Feb 12 19:56:02.745622 systemd[1434]: Reached target default.target. Feb 12 19:56:02.745812 systemd[1434]: Startup finished in 160ms. Feb 12 19:56:02.905864 locksmithd[1413]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:56:03.497092 login[1430]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:56:03.502864 systemd[1]: Started session-2.scope. Feb 12 19:56:03.503348 systemd-logind[1327]: New session 2 of user core. Feb 12 19:56:07.440733 waagent[1422]: 2024-02-12T19:56:07.440614Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 12 19:56:07.455623 waagent[1422]: 2024-02-12T19:56:07.443019Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 12 19:56:07.455623 waagent[1422]: 2024-02-12T19:56:07.443647Z INFO Daemon Daemon Python: 3.9.16 Feb 12 19:56:07.455623 waagent[1422]: 2024-02-12T19:56:07.446630Z INFO Daemon Daemon Run daemon Feb 12 19:56:07.455623 waagent[1422]: 2024-02-12T19:56:07.447569Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 12 19:56:07.461353 waagent[1422]: 2024-02-12T19:56:07.461221Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:56:07.469262 waagent[1422]: 2024-02-12T19:56:07.469140Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:56:07.474108 waagent[1422]: 2024-02-12T19:56:07.474034Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:56:07.476558 waagent[1422]: 2024-02-12T19:56:07.476481Z INFO Daemon Daemon Using waagent for provisioning Feb 12 19:56:07.479501 waagent[1422]: 2024-02-12T19:56:07.479437Z INFO Daemon Daemon Activate resource disk Feb 12 19:56:07.481704 waagent[1422]: 2024-02-12T19:56:07.481644Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 12 19:56:07.492054 waagent[1422]: 2024-02-12T19:56:07.491970Z INFO Daemon Daemon Found device: None Feb 12 19:56:07.494670 waagent[1422]: 2024-02-12T19:56:07.494604Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 12 19:56:07.498448 waagent[1422]: 2024-02-12T19:56:07.498382Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 12 19:56:07.504347 waagent[1422]: 2024-02-12T19:56:07.504280Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:56:07.507114 waagent[1422]: 2024-02-12T19:56:07.507050Z INFO Daemon Daemon Running default provisioning handler Feb 12 19:56:07.517602 waagent[1422]: 2024-02-12T19:56:07.517455Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:56:07.524326 waagent[1422]: 2024-02-12T19:56:07.524208Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:56:07.532292 waagent[1422]: 2024-02-12T19:56:07.525470Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:56:07.532292 waagent[1422]: 2024-02-12T19:56:07.526291Z INFO Daemon Daemon Copying ovf-env.xml Feb 12 19:56:07.549114 waagent[1422]: 2024-02-12T19:56:07.548988Z INFO Daemon Daemon Successfully mounted dvd Feb 12 19:56:07.671011 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 12 19:56:07.687537 waagent[1422]: 2024-02-12T19:56:07.687385Z INFO Daemon Daemon Detect protocol endpoint Feb 12 19:56:07.690374 waagent[1422]: 2024-02-12T19:56:07.690293Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:56:07.694005 waagent[1422]: 2024-02-12T19:56:07.693871Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 12 19:56:07.697788 waagent[1422]: 2024-02-12T19:56:07.697717Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 12 19:56:07.700873 waagent[1422]: 2024-02-12T19:56:07.700800Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 12 19:56:07.703669 waagent[1422]: 2024-02-12T19:56:07.703604Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 12 19:56:07.791085 waagent[1422]: 2024-02-12T19:56:07.790991Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 12 19:56:07.798188 waagent[1422]: 2024-02-12T19:56:07.792798Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 12 19:56:07.798188 waagent[1422]: 2024-02-12T19:56:07.793458Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 12 19:56:08.465367 waagent[1422]: 2024-02-12T19:56:08.465206Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 12 19:56:08.475877 waagent[1422]: 2024-02-12T19:56:08.475795Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 12 19:56:08.481117 waagent[1422]: 2024-02-12T19:56:08.477190Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 12 19:56:08.552424 waagent[1422]: 2024-02-12T19:56:08.552294Z INFO Daemon Daemon Found private key matching thumbprint F30B205D2EE9B986DE43C42004A5FBE7C21C097F Feb 12 19:56:08.556837 waagent[1422]: 2024-02-12T19:56:08.556755Z INFO Daemon Daemon Certificate with thumbprint 56E19BD8F214445D37F3532FB218E099BF0DDA1A has no matching private key. Feb 12 19:56:08.561186 waagent[1422]: 2024-02-12T19:56:08.561109Z INFO Daemon Daemon Fetch goal state completed Feb 12 19:56:08.617451 waagent[1422]: 2024-02-12T19:56:08.617348Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 2fe566db-2bcb-4e39-94b0-cbc953790b07 New eTag: 16875208137519609480] Feb 12 19:56:08.623452 waagent[1422]: 2024-02-12T19:56:08.623361Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:56:08.634933 waagent[1422]: 2024-02-12T19:56:08.634866Z INFO Daemon Daemon Starting provisioning Feb 12 19:56:08.637396 waagent[1422]: 2024-02-12T19:56:08.637328Z INFO Daemon Daemon Handle ovf-env.xml. Feb 12 19:56:08.639854 waagent[1422]: 2024-02-12T19:56:08.639792Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-d8f49246fd] Feb 12 19:56:08.647454 waagent[1422]: 2024-02-12T19:56:08.647353Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-d8f49246fd] Feb 12 19:56:08.650649 waagent[1422]: 2024-02-12T19:56:08.650586Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 12 19:56:08.655222 waagent[1422]: 2024-02-12T19:56:08.655154Z INFO Daemon Daemon Primary interface is [eth0] Feb 12 19:56:08.669320 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 12 19:56:08.669597 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 12 19:56:08.669670 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 12 19:56:08.670008 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:56:08.674568 systemd-networkd[1202]: eth0: DHCPv6 lease lost Feb 12 19:56:08.676320 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:56:08.676547 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:56:08.679135 systemd[1]: Starting systemd-networkd.service... Feb 12 19:56:08.710014 systemd-networkd[1478]: enP12686s1: Link UP Feb 12 19:56:08.710024 systemd-networkd[1478]: enP12686s1: Gained carrier Feb 12 19:56:08.711354 systemd-networkd[1478]: eth0: Link UP Feb 12 19:56:08.711364 systemd-networkd[1478]: eth0: Gained carrier Feb 12 19:56:08.711806 systemd-networkd[1478]: lo: Link UP Feb 12 19:56:08.711815 systemd-networkd[1478]: lo: Gained carrier Feb 12 19:56:08.712142 systemd-networkd[1478]: eth0: Gained IPv6LL Feb 12 19:56:08.712420 systemd-networkd[1478]: Enumeration completed Feb 12 19:56:08.712550 systemd[1]: Started systemd-networkd.service. Feb 12 19:56:08.714957 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:56:08.719554 waagent[1422]: 2024-02-12T19:56:08.717101Z INFO Daemon Daemon Create user account if not exists Feb 12 19:56:08.721062 waagent[1422]: 2024-02-12T19:56:08.720967Z INFO Daemon Daemon User core already exists, skip useradd Feb 12 19:56:08.722854 systemd-networkd[1478]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:56:08.724298 waagent[1422]: 2024-02-12T19:56:08.724211Z INFO Daemon Daemon Configure sudoer Feb 12 19:56:08.729693 waagent[1422]: 2024-02-12T19:56:08.725711Z INFO Daemon Daemon Configure sshd Feb 12 19:56:08.729693 waagent[1422]: 2024-02-12T19:56:08.726988Z INFO Daemon Daemon Deploy ssh public key. Feb 12 19:56:08.766606 systemd-networkd[1478]: eth0: DHCPv4 address 10.200.8.15/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 12 19:56:08.770311 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:56:08.778608 waagent[1422]: 2024-02-12T19:56:08.778467Z INFO Daemon Daemon Decode custom data Feb 12 19:56:08.781404 waagent[1422]: 2024-02-12T19:56:08.781331Z INFO Daemon Daemon Save custom data Feb 12 19:56:10.004382 waagent[1422]: 2024-02-12T19:56:10.004257Z INFO Daemon Daemon Provisioning complete Feb 12 19:56:10.017798 waagent[1422]: 2024-02-12T19:56:10.017723Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 12 19:56:10.020896 waagent[1422]: 2024-02-12T19:56:10.020827Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 12 19:56:10.026250 waagent[1422]: 2024-02-12T19:56:10.026182Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 12 19:56:10.296281 waagent[1487]: 2024-02-12T19:56:10.296091Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 12 19:56:10.297039 waagent[1487]: 2024-02-12T19:56:10.296966Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:56:10.297192 waagent[1487]: 2024-02-12T19:56:10.297136Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:56:10.308133 waagent[1487]: 2024-02-12T19:56:10.308053Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 12 19:56:10.308303 waagent[1487]: 2024-02-12T19:56:10.308250Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 12 19:56:10.372031 waagent[1487]: 2024-02-12T19:56:10.371890Z INFO ExtHandler ExtHandler Found private key matching thumbprint F30B205D2EE9B986DE43C42004A5FBE7C21C097F Feb 12 19:56:10.372279 waagent[1487]: 2024-02-12T19:56:10.372209Z INFO ExtHandler ExtHandler Certificate with thumbprint 56E19BD8F214445D37F3532FB218E099BF0DDA1A has no matching private key. Feb 12 19:56:10.372545 waagent[1487]: 2024-02-12T19:56:10.372472Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 12 19:56:10.386335 waagent[1487]: 2024-02-12T19:56:10.386268Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 12629aae-e7ba-45e5-b096-339a79ef8886 New eTag: 16875208137519609480] Feb 12 19:56:10.386951 waagent[1487]: 2024-02-12T19:56:10.386890Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:56:10.422319 waagent[1487]: 2024-02-12T19:56:10.422184Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:56:10.431157 waagent[1487]: 2024-02-12T19:56:10.431076Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1487 Feb 12 19:56:10.434590 waagent[1487]: 2024-02-12T19:56:10.434522Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:56:10.435849 waagent[1487]: 2024-02-12T19:56:10.435788Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:56:10.498874 waagent[1487]: 2024-02-12T19:56:10.498811Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:56:10.499285 waagent[1487]: 2024-02-12T19:56:10.499220Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:56:10.507394 waagent[1487]: 2024-02-12T19:56:10.507332Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:56:10.507918 waagent[1487]: 2024-02-12T19:56:10.507856Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:56:10.509013 waagent[1487]: 2024-02-12T19:56:10.508945Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 12 19:56:10.510285 waagent[1487]: 2024-02-12T19:56:10.510227Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:56:10.511046 waagent[1487]: 2024-02-12T19:56:10.510990Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:56:10.511132 waagent[1487]: 2024-02-12T19:56:10.511079Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:56:10.511760 waagent[1487]: 2024-02-12T19:56:10.511706Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:56:10.511875 waagent[1487]: 2024-02-12T19:56:10.511807Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:56:10.512472 waagent[1487]: 2024-02-12T19:56:10.512418Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:56:10.512768 waagent[1487]: 2024-02-12T19:56:10.512719Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:56:10.513338 waagent[1487]: 2024-02-12T19:56:10.513283Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:56:10.513694 waagent[1487]: 2024-02-12T19:56:10.513563Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:56:10.513774 waagent[1487]: 2024-02-12T19:56:10.513699Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:56:10.513774 waagent[1487]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:56:10.513774 waagent[1487]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:56:10.513774 waagent[1487]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:56:10.513774 waagent[1487]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:56:10.513774 waagent[1487]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:56:10.513774 waagent[1487]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:56:10.516121 waagent[1487]: 2024-02-12T19:56:10.515895Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:56:10.516860 waagent[1487]: 2024-02-12T19:56:10.516778Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:56:10.517791 waagent[1487]: 2024-02-12T19:56:10.517726Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:56:10.517995 waagent[1487]: 2024-02-12T19:56:10.517928Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:56:10.518147 waagent[1487]: 2024-02-12T19:56:10.518099Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:56:10.518764 waagent[1487]: 2024-02-12T19:56:10.518715Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:56:10.532269 waagent[1487]: 2024-02-12T19:56:10.532202Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 12 19:56:10.532920 waagent[1487]: 2024-02-12T19:56:10.532864Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:56:10.533799 waagent[1487]: 2024-02-12T19:56:10.533739Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 12 19:56:10.553874 waagent[1487]: 2024-02-12T19:56:10.553706Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1478' Feb 12 19:56:10.584708 waagent[1487]: 2024-02-12T19:56:10.584630Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 12 19:56:10.634489 waagent[1487]: 2024-02-12T19:56:10.633888Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:56:10.634489 waagent[1487]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:56:10.634489 waagent[1487]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:56:10.634489 waagent[1487]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:dd:9d:ce brd ff:ff:ff:ff:ff:ff Feb 12 19:56:10.634489 waagent[1487]: 3: enP12686s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:dd:9d:ce brd ff:ff:ff:ff:ff:ff\ altname enP12686p0s2 Feb 12 19:56:10.634489 waagent[1487]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:56:10.634489 waagent[1487]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:56:10.634489 waagent[1487]: 2: eth0 inet 10.200.8.15/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:56:10.634489 waagent[1487]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:56:10.634489 waagent[1487]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:56:10.634489 waagent[1487]: 2: eth0 inet6 fe80::20d:3aff:fedd:9dce/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:56:10.799468 waagent[1487]: 2024-02-12T19:56:10.799347Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Feb 12 19:56:10.802547 waagent[1487]: 2024-02-12T19:56:10.802428Z INFO EnvHandler ExtHandler Firewall rules: Feb 12 19:56:10.802547 waagent[1487]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:56:10.802547 waagent[1487]: pkts bytes target prot opt in out source destination Feb 12 19:56:10.802547 waagent[1487]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:56:10.802547 waagent[1487]: pkts bytes target prot opt in out source destination Feb 12 19:56:10.802547 waagent[1487]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:56:10.802547 waagent[1487]: pkts bytes target prot opt in out source destination Feb 12 19:56:10.802547 waagent[1487]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:56:10.802547 waagent[1487]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:56:10.803926 waagent[1487]: 2024-02-12T19:56:10.803831Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 12 19:56:10.907775 waagent[1487]: 2024-02-12T19:56:10.907696Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 12 19:56:11.029854 waagent[1422]: 2024-02-12T19:56:11.029671Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 12 19:56:11.036148 waagent[1422]: 2024-02-12T19:56:11.036070Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 12 19:56:12.067535 waagent[1525]: 2024-02-12T19:56:12.067404Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 12 19:56:12.068254 waagent[1525]: 2024-02-12T19:56:12.068178Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 12 19:56:12.068401 waagent[1525]: 2024-02-12T19:56:12.068346Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 12 19:56:12.077902 waagent[1525]: 2024-02-12T19:56:12.077789Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:56:12.078308 waagent[1525]: 2024-02-12T19:56:12.078246Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:56:12.078470 waagent[1525]: 2024-02-12T19:56:12.078417Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:56:12.089887 waagent[1525]: 2024-02-12T19:56:12.089806Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 12 19:56:12.098105 waagent[1525]: 2024-02-12T19:56:12.098039Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 12 19:56:12.099069 waagent[1525]: 2024-02-12T19:56:12.099004Z INFO ExtHandler Feb 12 19:56:12.099216 waagent[1525]: 2024-02-12T19:56:12.099165Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 0b89b3ab-2d90-4df4-8fc4-4086e71b28fb eTag: 16875208137519609480 source: Fabric] Feb 12 19:56:12.099936 waagent[1525]: 2024-02-12T19:56:12.099876Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 12 19:56:12.100996 waagent[1525]: 2024-02-12T19:56:12.100935Z INFO ExtHandler Feb 12 19:56:12.101128 waagent[1525]: 2024-02-12T19:56:12.101077Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 12 19:56:12.107638 waagent[1525]: 2024-02-12T19:56:12.107586Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 12 19:56:12.108066 waagent[1525]: 2024-02-12T19:56:12.108016Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:56:12.126755 waagent[1525]: 2024-02-12T19:56:12.126685Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 12 19:56:12.194044 waagent[1525]: 2024-02-12T19:56:12.193905Z INFO ExtHandler Downloaded certificate {'thumbprint': 'F30B205D2EE9B986DE43C42004A5FBE7C21C097F', 'hasPrivateKey': True} Feb 12 19:56:12.195072 waagent[1525]: 2024-02-12T19:56:12.195003Z INFO ExtHandler Downloaded certificate {'thumbprint': '56E19BD8F214445D37F3532FB218E099BF0DDA1A', 'hasPrivateKey': False} Feb 12 19:56:12.196047 waagent[1525]: 2024-02-12T19:56:12.195982Z INFO ExtHandler Fetch goal state completed Feb 12 19:56:12.215894 waagent[1525]: 2024-02-12T19:56:12.215816Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1525 Feb 12 19:56:12.219127 waagent[1525]: 2024-02-12T19:56:12.219060Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:56:12.220592 waagent[1525]: 2024-02-12T19:56:12.220535Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:56:12.225540 waagent[1525]: 2024-02-12T19:56:12.225471Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:56:12.225908 waagent[1525]: 2024-02-12T19:56:12.225852Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:56:12.233801 waagent[1525]: 2024-02-12T19:56:12.233746Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:56:12.234259 waagent[1525]: 2024-02-12T19:56:12.234201Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:56:12.278049 waagent[1525]: 2024-02-12T19:56:12.277883Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Feb 12 19:56:12.282110 waagent[1525]: 2024-02-12T19:56:12.281959Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Feb 12 19:56:12.288310 waagent[1525]: 2024-02-12T19:56:12.288237Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 12 19:56:12.289838 waagent[1525]: 2024-02-12T19:56:12.289771Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:56:12.290493 waagent[1525]: 2024-02-12T19:56:12.290434Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:56:12.290917 waagent[1525]: 2024-02-12T19:56:12.290858Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:56:12.291084 waagent[1525]: 2024-02-12T19:56:12.291032Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:56:12.291733 waagent[1525]: 2024-02-12T19:56:12.291678Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:56:12.291820 waagent[1525]: 2024-02-12T19:56:12.291758Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:56:12.292480 waagent[1525]: 2024-02-12T19:56:12.292422Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:56:12.292771 waagent[1525]: 2024-02-12T19:56:12.292710Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:56:12.292998 waagent[1525]: 2024-02-12T19:56:12.292948Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:56:12.293316 waagent[1525]: 2024-02-12T19:56:12.293243Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:56:12.293602 waagent[1525]: 2024-02-12T19:56:12.293549Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:56:12.293602 waagent[1525]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:56:12.293602 waagent[1525]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:56:12.293602 waagent[1525]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:56:12.293602 waagent[1525]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:56:12.293602 waagent[1525]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:56:12.293602 waagent[1525]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:56:12.293881 waagent[1525]: 2024-02-12T19:56:12.293700Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:56:12.293881 waagent[1525]: 2024-02-12T19:56:12.293842Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:56:12.298300 waagent[1525]: 2024-02-12T19:56:12.298199Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:56:12.300562 waagent[1525]: 2024-02-12T19:56:12.300242Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:56:12.303052 waagent[1525]: 2024-02-12T19:56:12.302984Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:56:12.326833 waagent[1525]: 2024-02-12T19:56:12.326705Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 12 19:56:12.327865 waagent[1525]: 2024-02-12T19:56:12.327797Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:56:12.327865 waagent[1525]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:56:12.327865 waagent[1525]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:56:12.327865 waagent[1525]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:dd:9d:ce brd ff:ff:ff:ff:ff:ff Feb 12 19:56:12.327865 waagent[1525]: 3: enP12686s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:dd:9d:ce brd ff:ff:ff:ff:ff:ff\ altname enP12686p0s2 Feb 12 19:56:12.327865 waagent[1525]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:56:12.327865 waagent[1525]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:56:12.327865 waagent[1525]: 2: eth0 inet 10.200.8.15/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:56:12.327865 waagent[1525]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:56:12.327865 waagent[1525]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:56:12.327865 waagent[1525]: 2: eth0 inet6 fe80::20d:3aff:fedd:9dce/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:56:12.328331 waagent[1525]: 2024-02-12T19:56:12.328109Z INFO ExtHandler ExtHandler Downloading manifest Feb 12 19:56:12.398037 waagent[1525]: 2024-02-12T19:56:12.397973Z INFO ExtHandler ExtHandler Feb 12 19:56:12.398375 waagent[1525]: 2024-02-12T19:56:12.398317Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 0653c5eb-dbe6-4418-9a07-9ca6f2b9e197 correlation 9041d23c-e54b-4db8-9f9d-4e3bd2de5b94 created: 2024-02-12T19:54:48.483727Z] Feb 12 19:56:12.399240 waagent[1525]: 2024-02-12T19:56:12.399178Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 12 19:56:12.401010 waagent[1525]: 2024-02-12T19:56:12.400952Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 2 ms] Feb 12 19:56:12.401842 waagent[1525]: 2024-02-12T19:56:12.401783Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 12 19:56:12.401842 waagent[1525]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:56:12.401842 waagent[1525]: pkts bytes target prot opt in out source destination Feb 12 19:56:12.401842 waagent[1525]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:56:12.401842 waagent[1525]: pkts bytes target prot opt in out source destination Feb 12 19:56:12.401842 waagent[1525]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:56:12.401842 waagent[1525]: pkts bytes target prot opt in out source destination Feb 12 19:56:12.401842 waagent[1525]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:56:12.401842 waagent[1525]: 135 15426 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:56:12.401842 waagent[1525]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:56:12.419814 waagent[1525]: 2024-02-12T19:56:12.419739Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 12 19:56:12.429674 waagent[1525]: 2024-02-12T19:56:12.429591Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 4430DAF6-323B-4AFA-80AE-9DED1D03DD60;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 12 19:56:39.784738 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Feb 12 19:56:46.841110 update_engine[1330]: I0212 19:56:46.841050 1330 update_attempter.cc:509] Updating boot flags... Feb 12 19:56:56.263814 systemd[1]: Created slice system-sshd.slice. Feb 12 19:56:56.265684 systemd[1]: Started sshd@0-10.200.8.15:22-10.200.12.6:43730.service. Feb 12 19:56:57.085074 sshd[1636]: Accepted publickey for core from 10.200.12.6 port 43730 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:56:57.086788 sshd[1636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:56:57.092576 systemd[1]: Started session-3.scope. Feb 12 19:56:57.093158 systemd-logind[1327]: New session 3 of user core. Feb 12 19:56:57.622084 systemd[1]: Started sshd@1-10.200.8.15:22-10.200.12.6:35182.service. Feb 12 19:56:58.234206 sshd[1641]: Accepted publickey for core from 10.200.12.6 port 35182 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:56:58.235887 sshd[1641]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:56:58.241458 systemd[1]: Started session-4.scope. Feb 12 19:56:58.242071 systemd-logind[1327]: New session 4 of user core. Feb 12 19:56:58.669872 sshd[1641]: pam_unix(sshd:session): session closed for user core Feb 12 19:56:58.673456 systemd[1]: sshd@1-10.200.8.15:22-10.200.12.6:35182.service: Deactivated successfully. Feb 12 19:56:58.674477 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:56:58.675261 systemd-logind[1327]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:56:58.676163 systemd-logind[1327]: Removed session 4. Feb 12 19:56:58.774007 systemd[1]: Started sshd@2-10.200.8.15:22-10.200.12.6:35190.service. Feb 12 19:56:59.391703 sshd[1647]: Accepted publickey for core from 10.200.12.6 port 35190 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:56:59.393320 sshd[1647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:56:59.397911 systemd[1]: Started session-5.scope. Feb 12 19:56:59.398360 systemd-logind[1327]: New session 5 of user core. Feb 12 19:56:59.827077 sshd[1647]: pam_unix(sshd:session): session closed for user core Feb 12 19:56:59.830204 systemd[1]: sshd@2-10.200.8.15:22-10.200.12.6:35190.service: Deactivated successfully. Feb 12 19:56:59.831037 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:56:59.831683 systemd-logind[1327]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:56:59.832398 systemd-logind[1327]: Removed session 5. Feb 12 19:56:59.931387 systemd[1]: Started sshd@3-10.200.8.15:22-10.200.12.6:35196.service. Feb 12 19:57:00.553464 sshd[1653]: Accepted publickey for core from 10.200.12.6 port 35196 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:00.555062 sshd[1653]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:00.559701 systemd[1]: Started session-6.scope. Feb 12 19:57:00.560138 systemd-logind[1327]: New session 6 of user core. Feb 12 19:57:00.995994 sshd[1653]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:00.999200 systemd[1]: sshd@3-10.200.8.15:22-10.200.12.6:35196.service: Deactivated successfully. Feb 12 19:57:01.000217 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:57:01.001015 systemd-logind[1327]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:57:01.001921 systemd-logind[1327]: Removed session 6. Feb 12 19:57:01.106591 systemd[1]: Started sshd@4-10.200.8.15:22-10.200.12.6:35202.service. Feb 12 19:57:01.724152 sshd[1659]: Accepted publickey for core from 10.200.12.6 port 35202 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:01.725816 sshd[1659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:01.730428 systemd[1]: Started session-7.scope. Feb 12 19:57:01.731034 systemd-logind[1327]: New session 7 of user core. Feb 12 19:57:02.314814 sudo[1662]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:57:02.315148 sudo[1662]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:57:02.335724 dbus-daemon[1316]: \xd0]\u001dU\u000dV: received setenforce notice (enforcing=1033972704) Feb 12 19:57:02.337528 sudo[1662]: pam_unix(sudo:session): session closed for user root Feb 12 19:57:02.449370 sshd[1659]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:02.453041 systemd[1]: sshd@4-10.200.8.15:22-10.200.12.6:35202.service: Deactivated successfully. Feb 12 19:57:02.454120 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:57:02.454937 systemd-logind[1327]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:57:02.455895 systemd-logind[1327]: Removed session 7. Feb 12 19:57:02.553731 systemd[1]: Started sshd@5-10.200.8.15:22-10.200.12.6:35218.service. Feb 12 19:57:03.172752 sshd[1666]: Accepted publickey for core from 10.200.12.6 port 35218 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:03.174432 sshd[1666]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:03.180170 systemd[1]: Started session-8.scope. Feb 12 19:57:03.180927 systemd-logind[1327]: New session 8 of user core. Feb 12 19:57:03.513321 sudo[1670]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:57:03.513603 sudo[1670]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:57:03.516300 sudo[1670]: pam_unix(sudo:session): session closed for user root Feb 12 19:57:03.520710 sudo[1669]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:57:03.520958 sudo[1669]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:57:03.529523 systemd[1]: Stopping audit-rules.service... Feb 12 19:57:03.530000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:57:03.531226 auditctl[1673]: No rules Feb 12 19:57:03.534300 kernel: kauditd_printk_skb: 86 callbacks suppressed Feb 12 19:57:03.534373 kernel: audit: type=1305 audit(1707767823.530:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:57:03.531651 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:57:03.531804 systemd[1]: Stopped audit-rules.service. Feb 12 19:57:03.534093 systemd[1]: Starting audit-rules.service... Feb 12 19:57:03.530000 audit[1673]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff9a8668b0 a2=420 a3=0 items=0 ppid=1 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:03.557699 kernel: audit: type=1300 audit(1707767823.530:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff9a8668b0 a2=420 a3=0 items=0 ppid=1 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:03.557735 augenrules[1690]: No rules Feb 12 19:57:03.554642 systemd[1]: Finished audit-rules.service. Feb 12 19:57:03.555620 sudo[1669]: pam_unix(sudo:session): session closed for user root Feb 12 19:57:03.530000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:57:03.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:03.562688 kernel: audit: type=1327 audit(1707767823.530:167): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:57:03.562739 kernel: audit: type=1131 audit(1707767823.530:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:03.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:03.581720 kernel: audit: type=1130 audit(1707767823.554:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:03.555000 audit[1669]: USER_END pid=1669 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:03.582532 kernel: audit: type=1106 audit(1707767823.555:170): pid=1669 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:03.555000 audit[1669]: CRED_DISP pid=1669 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:03.604181 kernel: audit: type=1104 audit(1707767823.555:171): pid=1669 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:03.655385 sshd[1666]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:03.656000 audit[1666]: USER_END pid=1666 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:03.658836 systemd[1]: sshd@5-10.200.8.15:22-10.200.12.6:35218.service: Deactivated successfully. Feb 12 19:57:03.659976 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:57:03.661249 systemd-logind[1327]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:57:03.662243 systemd-logind[1327]: Removed session 8. Feb 12 19:57:03.656000 audit[1666]: CRED_DISP pid=1666 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:03.682572 kernel: audit: type=1106 audit(1707767823.656:172): pid=1666 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:03.682626 kernel: audit: type=1104 audit(1707767823.656:173): pid=1666 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:03.682649 kernel: audit: type=1131 audit(1707767823.658:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.15:22-10.200.12.6:35218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:03.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.15:22-10.200.12.6:35218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:03.758353 systemd[1]: Started sshd@6-10.200.8.15:22-10.200.12.6:35228.service. Feb 12 19:57:03.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.15:22-10.200.12.6:35228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:04.372000 audit[1696]: USER_ACCT pid=1696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:04.373614 sshd[1696]: Accepted publickey for core from 10.200.12.6 port 35228 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:04.374000 audit[1696]: CRED_ACQ pid=1696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:04.374000 audit[1696]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed6a3d860 a2=3 a3=0 items=0 ppid=1 pid=1696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:04.374000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:04.375305 sshd[1696]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:04.380096 systemd[1]: Started session-9.scope. Feb 12 19:57:04.380604 systemd-logind[1327]: New session 9 of user core. Feb 12 19:57:04.384000 audit[1696]: USER_START pid=1696 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:04.385000 audit[1698]: CRED_ACQ pid=1698 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:04.711000 audit[1699]: USER_ACCT pid=1699 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:04.711000 audit[1699]: CRED_REFR pid=1699 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:04.711941 sudo[1699]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mkdir -p . Feb 12 19:57:04.712318 sudo[1699]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:57:04.713000 audit[1699]: USER_START pid=1699 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:04.715631 sudo[1699]: pam_unix(sudo:session): session closed for user root Feb 12 19:57:04.715000 audit[1699]: USER_END pid=1699 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:04.715000 audit[1699]: CRED_DISP pid=1699 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:04.813766 sshd[1696]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:04.814000 audit[1696]: USER_END pid=1696 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:04.815000 audit[1696]: CRED_DISP pid=1696 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:04.816856 systemd[1]: sshd@6-10.200.8.15:22-10.200.12.6:35228.service: Deactivated successfully. Feb 12 19:57:04.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.15:22-10.200.12.6:35228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:04.817727 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:57:04.818315 systemd-logind[1327]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:57:04.819054 systemd-logind[1327]: Removed session 9. Feb 12 19:57:04.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.15:22-10.200.12.6:35238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:04.918038 systemd[1]: Started sshd@7-10.200.8.15:22-10.200.12.6:35238.service. Feb 12 19:57:05.533000 audit[1703]: USER_ACCT pid=1703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:05.534804 sshd[1703]: Accepted publickey for core from 10.200.12.6 port 35238 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:05.535000 audit[1703]: CRED_ACQ pid=1703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:05.535000 audit[1703]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd10633f80 a2=3 a3=0 items=0 ppid=1 pid=1703 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:05.535000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:05.536455 sshd[1703]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:05.541572 systemd-logind[1327]: New session 10 of user core. Feb 12 19:57:05.542029 systemd[1]: Started session-10.scope. Feb 12 19:57:05.545000 audit[1703]: USER_START pid=1703 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:05.547000 audit[1705]: CRED_ACQ pid=1705 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:05.876000 audit[1706]: USER_ACCT pid=1706 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:05.876000 audit[1706]: CRED_REFR pid=1706 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:05.877035 sudo[1706]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/install -m 0755 /dev/stdin kolet Feb 12 19:57:05.877303 sudo[1706]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:57:05.878000 audit[1706]: USER_START pid=1706 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:08.932472 sudo[1706]: pam_unix(sudo:session): session closed for user root Feb 12 19:57:08.931000 audit[1706]: USER_END pid=1706 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:08.935307 kernel: kauditd_printk_skb: 27 callbacks suppressed Feb 12 19:57:08.935388 kernel: audit: type=1106 audit(1707767828.931:198): pid=1706 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:08.931000 audit[1706]: CRED_DISP pid=1706 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:08.956889 kernel: audit: type=1104 audit(1707767828.931:199): pid=1706 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:09.031792 sshd[1703]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:09.031000 audit[1703]: USER_END pid=1703 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:09.035542 systemd-logind[1327]: Session 10 logged out. Waiting for processes to exit. Feb 12 19:57:09.037051 systemd[1]: sshd@7-10.200.8.15:22-10.200.12.6:35238.service: Deactivated successfully. Feb 12 19:57:09.037735 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 19:57:09.039124 systemd-logind[1327]: Removed session 10. Feb 12 19:57:09.032000 audit[1703]: CRED_DISP pid=1703 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:09.065867 kernel: audit: type=1106 audit(1707767829.031:200): pid=1703 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:09.065939 kernel: audit: type=1104 audit(1707767829.032:201): pid=1703 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:09.065958 kernel: audit: type=1131 audit(1707767829.035:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.15:22-10.200.12.6:35238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:09.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.15:22-10.200.12.6:35238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:09.136644 systemd[1]: Started sshd@8-10.200.8.15:22-10.200.12.6:56544.service. Feb 12 19:57:09.154620 kernel: audit: type=1130 audit(1707767829.135:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.15:22-10.200.12.6:56544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:09.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.15:22-10.200.12.6:56544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:09.754000 audit[1710]: USER_ACCT pid=1710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:09.773851 sshd[1710]: Accepted publickey for core from 10.200.12.6 port 56544 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:09.772000 audit[1710]: CRED_ACQ pid=1710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:09.774263 sshd[1710]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:09.779290 systemd[1]: Started session-11.scope. Feb 12 19:57:09.780362 systemd-logind[1327]: New session 11 of user core. Feb 12 19:57:09.789789 kernel: audit: type=1101 audit(1707767829.754:204): pid=1710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:09.789869 kernel: audit: type=1103 audit(1707767829.772:205): pid=1710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:09.789888 kernel: audit: type=1006 audit(1707767829.772:206): pid=1710 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 19:57:09.772000 audit[1710]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1d470430 a2=3 a3=0 items=0 ppid=1 pid=1710 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:09.799536 kernel: audit: type=1300 audit(1707767829.772:206): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1d470430 a2=3 a3=0 items=0 ppid=1 pid=1710 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:09.772000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:09.783000 audit[1710]: USER_START pid=1710 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:09.785000 audit[1712]: CRED_ACQ pid=1712 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:10.214384 sshd[1710]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:10.214000 audit[1710]: USER_END pid=1710 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:10.214000 audit[1710]: CRED_DISP pid=1710 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:10.218231 systemd[1]: sshd@8-10.200.8.15:22-10.200.12.6:56544.service: Deactivated successfully. Feb 12 19:57:10.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.15:22-10.200.12.6:56544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:10.219183 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 19:57:10.219831 systemd-logind[1327]: Session 11 logged out. Waiting for processes to exit. Feb 12 19:57:10.220586 systemd-logind[1327]: Removed session 11. Feb 12 19:57:10.318175 systemd[1]: Started sshd@9-10.200.8.15:22-10.200.12.6:56560.service. Feb 12 19:57:10.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.15:22-10.200.12.6:56560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:10.932000 audit[1720]: USER_ACCT pid=1720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:10.934564 sshd[1720]: Accepted publickey for core from 10.200.12.6 port 56560 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:10.934000 audit[1720]: CRED_ACQ pid=1720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:10.934000 audit[1720]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff14d6ec0 a2=3 a3=0 items=0 ppid=1 pid=1720 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:10.934000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:10.936234 sshd[1720]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:10.941829 systemd[1]: Started session-12.scope. Feb 12 19:57:10.942380 systemd-logind[1327]: New session 12 of user core. Feb 12 19:57:10.945000 audit[1720]: USER_START pid=1720 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:10.946000 audit[1722]: CRED_ACQ pid=1722 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:11.307000 audit[1728]: USER_ACCT pid=1728 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:11.309309 sudo[1728]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/coreos-cloudinit --workspace /tmp/coretest-cloudinit-2213353173 --from-file /tmp/coretest-2027155965 --ssh-key-name coretest Feb 12 19:57:11.309599 sudo[1728]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:57:11.307000 audit[1728]: CRED_REFR pid=1728 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:11.309000 audit[1728]: USER_START pid=1728 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:12.794460 systemd[1]: Reloading. Feb 12 19:57:12.869088 /usr/lib/systemd/system-generators/torcx-generator[1754]: time="2024-02-12T19:57:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:57:12.869132 /usr/lib/systemd/system-generators/torcx-generator[1754]: time="2024-02-12T19:57:12Z" level=info msg="torcx already run" Feb 12 19:57:12.961709 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:57:12.961728 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:57:12.979330 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:57:13.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit: BPF prog-id=32 op=LOAD Feb 12 19:57:13.042000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit: BPF prog-id=33 op=LOAD Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.042000 audit: BPF prog-id=34 op=LOAD Feb 12 19:57:13.042000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:57:13.042000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:57:13.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.043000 audit: BPF prog-id=35 op=LOAD Feb 12 19:57:13.043000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:57:13.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.045000 audit: BPF prog-id=36 op=LOAD Feb 12 19:57:13.045000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit: BPF prog-id=37 op=LOAD Feb 12 19:57:13.046000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit: BPF prog-id=38 op=LOAD Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.046000 audit: BPF prog-id=39 op=LOAD Feb 12 19:57:13.046000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:57:13.046000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:57:13.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.047000 audit: BPF prog-id=40 op=LOAD Feb 12 19:57:13.047000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit: BPF prog-id=41 op=LOAD Feb 12 19:57:13.049000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit: BPF prog-id=42 op=LOAD Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.049000 audit: BPF prog-id=43 op=LOAD Feb 12 19:57:13.049000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:57:13.049000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:57:13.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.051000 audit: BPF prog-id=44 op=LOAD Feb 12 19:57:13.051000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit: BPF prog-id=45 op=LOAD Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:57:13.053000 audit: BPF prog-id=46 op=LOAD Feb 12 19:57:13.053000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:57:13.053000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:57:13.060500 sudo[1728]: pam_unix(sudo:session): session closed for user root Feb 12 19:57:13.059000 audit[1728]: USER_END pid=1728 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:13.059000 audit[1728]: CRED_DISP pid=1728 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:13.080000 audit[1817]: USER_ACCT pid=1817 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:13.082134 sudo[1817]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /tmp/coretest-cloudinit-2213353173 Feb 12 19:57:13.080000 audit[1817]: CRED_REFR pid=1817 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:13.082410 sudo[1817]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:57:13.082000 audit[1817]: USER_START pid=1817 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:13.085062 sudo[1817]: pam_unix(sudo:session): session closed for user root Feb 12 19:57:13.083000 audit[1817]: USER_END pid=1817 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:13.083000 audit[1817]: CRED_DISP pid=1817 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:13.184580 sshd[1720]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:13.184000 audit[1720]: USER_END pid=1720 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:13.185000 audit[1720]: CRED_DISP pid=1720 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:13.187880 systemd[1]: sshd@9-10.200.8.15:22-10.200.12.6:56560.service: Deactivated successfully. Feb 12 19:57:13.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.15:22-10.200.12.6:56560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:13.188689 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 19:57:13.189316 systemd-logind[1327]: Session 12 logged out. Waiting for processes to exit. Feb 12 19:57:13.190123 systemd-logind[1327]: Removed session 12. Feb 12 19:57:13.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.15:22-10.200.12.6:56572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:13.292778 systemd[1]: Started sshd@10-10.200.8.15:22-10.200.12.6:56572.service. Feb 12 19:57:13.915000 audit[1821]: USER_ACCT pid=1821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:13.916471 sshd[1821]: Accepted publickey for core from 10.200.12.6 port 56572 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:13.917000 audit[1821]: CRED_ACQ pid=1821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:13.917000 audit[1821]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff99a13fa0 a2=3 a3=0 items=0 ppid=1 pid=1821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:13.917000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:13.918145 sshd[1821]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:13.923457 systemd[1]: Started session-13.scope. Feb 12 19:57:13.924146 systemd-logind[1327]: New session 13 of user core. Feb 12 19:57:13.927000 audit[1821]: USER_START pid=1821 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:13.929000 audit[1823]: CRED_ACQ pid=1823 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:14.283000 audit[1829]: USER_ACCT pid=1829 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.284587 sudo[1829]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/coreos-cloudinit --workspace /tmp/coretest-cloudinit-1425836984 --from-file /tmp/coretest-562981812 Feb 12 19:57:14.284786 sudo[1829]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:57:14.289291 kernel: kauditd_printk_skb: 207 callbacks suppressed Feb 12 19:57:14.289397 kernel: audit: type=1101 audit(1707767834.283:409): pid=1829 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.306077 systemd[1]: Started coreos-cloudinit-5177504.service. Feb 12 19:57:14.284000 audit[1829]: CRED_REFR pid=1829 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.310439 sudo[1829]: pam_unix(sudo:session): session closed for user root Feb 12 19:57:14.289000 audit[1829]: USER_START pid=1829 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.325216 dbus-daemon[1316]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.3' (uid=0 pid=1 comm="/usr/lib/systemd/systemd --switched-root --system" label="system_u:system_r:kernel_t:s0") Feb 12 19:57:14.340430 kernel: audit: type=1110 audit(1707767834.284:410): pid=1829 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.340503 kernel: audit: type=1105 audit(1707767834.289:411): pid=1829 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-cloudinit-5177504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.356578 kernel: audit: type=1130 audit(1707767834.306:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-cloudinit-5177504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.308000 audit[1829]: USER_END pid=1829 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.357125 systemd[1]: Starting polkit.service... Feb 12 19:57:14.308000 audit[1829]: CRED_DISP pid=1829 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.384252 kernel: audit: type=1106 audit(1707767834.308:413): pid=1829 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.384333 kernel: audit: type=1104 audit(1707767834.308:414): pid=1829 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.545958 polkitd[1840]: Started polkitd version 121 Feb 12 19:57:14.732501 polkitd[1840]: Loading rules from directory /etc/polkit-1/rules.d Feb 12 19:57:14.732615 polkitd[1840]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 12 19:57:14.821936 polkitd[1840]: Finished loading, compiling and executing 2 rules Feb 12 19:57:14.822733 dbus-daemon[1316]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 12 19:57:14.822936 systemd[1]: Started polkit.service. Feb 12 19:57:14.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=polkit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.823886 polkitd[1840]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 12 19:57:14.838530 kernel: audit: type=1130 audit(1707767834.822:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=polkit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.899000 audit[1848]: USER_ACCT pid=1848 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.900216 sudo[1848]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /tmp/coretest-cloudinit-1425836984 Feb 12 19:57:14.900418 sudo[1848]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:57:14.903632 sudo[1848]: pam_unix(sudo:session): session closed for user root Feb 12 19:57:14.899000 audit[1848]: CRED_REFR pid=1848 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.927769 kernel: audit: type=1101 audit(1707767834.899:416): pid=1848 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.927843 kernel: audit: type=1110 audit(1707767834.899:417): pid=1848 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.927874 kernel: audit: type=1105 audit(1707767834.899:418): pid=1848 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.899000 audit[1848]: USER_START pid=1848 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.899000 audit[1848]: USER_END pid=1848 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:14.899000 audit[1848]: CRED_DISP pid=1848 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:15.004790 sshd[1821]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:15.006000 audit[1821]: USER_END pid=1821 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:15.006000 audit[1821]: CRED_DISP pid=1821 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:15.008653 systemd[1]: sshd@10-10.200.8.15:22-10.200.12.6:56572.service: Deactivated successfully. Feb 12 19:57:15.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.15:22-10.200.12.6:56572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:15.009787 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 19:57:15.010619 systemd-logind[1327]: Session 13 logged out. Waiting for processes to exit. Feb 12 19:57:15.011700 systemd-logind[1327]: Removed session 13. Feb 12 19:57:15.109763 systemd[1]: Started sshd@11-10.200.8.15:22-10.200.12.6:56578.service. Feb 12 19:57:15.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.15:22-10.200.12.6:56578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:15.729000 audit[1852]: USER_ACCT pid=1852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:15.729806 sshd[1852]: Accepted publickey for core from 10.200.12.6 port 56578 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:15.730000 audit[1852]: CRED_ACQ pid=1852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:15.730000 audit[1852]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc47295b40 a2=3 a3=0 items=0 ppid=1 pid=1852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:15.730000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:15.731485 sshd[1852]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:15.737170 systemd[1]: Started session-14.scope. Feb 12 19:57:15.737741 systemd-logind[1327]: New session 14 of user core. Feb 12 19:57:15.741000 audit[1852]: USER_START pid=1852 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:15.743000 audit[1854]: CRED_ACQ pid=1854 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:16.094000 audit[1860]: USER_ACCT pid=1860 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:16.095303 sudo[1860]: core : PWD=/home/core ; USER=core ; COMMAND=/usr/bin/gdbus call --system --dest org.freedesktop.systemd1 --object-path /org/freedesktop/systemd1 --method org.freedesktop.systemd1.Manager.RestartUnit ntpd.service replace Feb 12 19:57:16.094000 audit[1860]: CRED_REFR pid=1860 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:16.096049 sudo[1860]: pam_unix(sudo:session): session opened for user core(uid=500) by (uid=500) Feb 12 19:57:16.097000 audit[1860]: USER_START pid=1860 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:16.129332 sudo[1860]: pam_unix(sudo:session): session closed for user core Feb 12 19:57:16.129000 audit[1860]: USER_END pid=1860 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:16.129000 audit[1860]: CRED_DISP pid=1860 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:16.134000 audit[1866]: USER_ACCT pid=1866 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:16.135395 sudo[1866]: core : PWD=/home/core ; USER=core ; COMMAND=/usr/bin/gdbus call --system --dest org.freedesktop.systemd1 --object-path /org/freedesktop/systemd1/unit/ntpd_2eservice --method org.freedesktop.DBus.Properties.GetAll org.freedesktop.systemd1.Unit Feb 12 19:57:16.135682 sudo[1866]: pam_unix(sudo:session): session opened for user core(uid=500) by (uid=500) Feb 12 19:57:16.134000 audit[1866]: CRED_REFR pid=1866 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:16.136000 audit[1866]: USER_START pid=1866 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:16.153076 sudo[1866]: pam_unix(sudo:session): session closed for user core Feb 12 19:57:16.152000 audit[1866]: USER_END pid=1866 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:16.152000 audit[1866]: CRED_DISP pid=1866 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:16.253008 sshd[1852]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:16.254000 audit[1852]: USER_END pid=1852 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:16.254000 audit[1852]: CRED_DISP pid=1852 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:16.256679 systemd[1]: sshd@11-10.200.8.15:22-10.200.12.6:56578.service: Deactivated successfully. Feb 12 19:57:16.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.15:22-10.200.12.6:56578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:16.257776 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 19:57:16.258406 systemd-logind[1327]: Session 14 logged out. Waiting for processes to exit. Feb 12 19:57:16.259229 systemd-logind[1327]: Removed session 14. Feb 12 19:57:16.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.15:22-10.200.12.6:56594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:16.360376 systemd[1]: Started sshd@12-10.200.8.15:22-10.200.12.6:56594.service. Feb 12 19:57:16.976000 audit[1872]: USER_ACCT pid=1872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:16.977035 sshd[1872]: Accepted publickey for core from 10.200.12.6 port 56594 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:16.977000 audit[1872]: CRED_ACQ pid=1872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:16.977000 audit[1872]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd50da7e0 a2=3 a3=0 items=0 ppid=1 pid=1872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:16.977000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:16.978710 sshd[1872]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:16.984391 systemd[1]: Started session-15.scope. Feb 12 19:57:16.985114 systemd-logind[1327]: New session 15 of user core. Feb 12 19:57:16.988000 audit[1872]: USER_START pid=1872 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:16.990000 audit[1874]: CRED_ACQ pid=1874 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:17.438656 sshd[1872]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:17.440000 audit[1872]: USER_END pid=1872 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:17.440000 audit[1872]: CRED_DISP pid=1872 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:17.442777 systemd[1]: sshd@12-10.200.8.15:22-10.200.12.6:56594.service: Deactivated successfully. Feb 12 19:57:17.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.15:22-10.200.12.6:56594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:17.443813 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 19:57:17.444438 systemd-logind[1327]: Session 15 logged out. Waiting for processes to exit. Feb 12 19:57:17.445256 systemd-logind[1327]: Removed session 15. Feb 12 19:57:17.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.15:22-10.200.12.6:57714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:17.542046 systemd[1]: Started sshd@13-10.200.8.15:22-10.200.12.6:57714.service. Feb 12 19:57:18.163000 audit[1882]: USER_ACCT pid=1882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:18.164349 sshd[1882]: Accepted publickey for core from 10.200.12.6 port 57714 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:18.164000 audit[1882]: CRED_ACQ pid=1882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:18.164000 audit[1882]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff93d37a20 a2=3 a3=0 items=0 ppid=1 pid=1882 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:18.164000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:18.166163 sshd[1882]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:18.171365 systemd[1]: Started session-16.scope. Feb 12 19:57:18.171830 systemd-logind[1327]: New session 16 of user core. Feb 12 19:57:18.176000 audit[1882]: USER_START pid=1882 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:18.177000 audit[1884]: CRED_ACQ pid=1884 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:18.572000 audit[1890]: USER_ACCT pid=1890 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:18.573476 sudo[1890]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/blkid -o value -s PTUUID /dev/sda Feb 12 19:57:18.573000 audit[1890]: CRED_REFR pid=1890 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:18.573783 sudo[1890]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:57:18.575000 audit[1890]: USER_START pid=1890 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:18.605478 sudo[1890]: pam_unix(sudo:session): session closed for user root Feb 12 19:57:18.605000 audit[1890]: USER_END pid=1890 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:18.605000 audit[1890]: CRED_DISP pid=1890 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:18.705552 sshd[1882]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:18.706000 audit[1882]: USER_END pid=1882 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:18.707000 audit[1882]: CRED_DISP pid=1882 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:18.709280 systemd[1]: sshd@13-10.200.8.15:22-10.200.12.6:57714.service: Deactivated successfully. Feb 12 19:57:18.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.15:22-10.200.12.6:57714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:18.710206 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 19:57:18.710825 systemd-logind[1327]: Session 16 logged out. Waiting for processes to exit. Feb 12 19:57:18.711698 systemd-logind[1327]: Removed session 16. Feb 12 19:57:18.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.15:22-10.200.12.6:57728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:18.810949 systemd[1]: Started sshd@14-10.200.8.15:22-10.200.12.6:57728.service. Feb 12 19:57:19.436012 kernel: kauditd_printk_skb: 54 callbacks suppressed Feb 12 19:57:19.436125 kernel: audit: type=1101 audit(1707767839.430:467): pid=1896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:19.430000 audit[1896]: USER_ACCT pid=1896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:19.435845 sshd[1896]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:19.436426 sshd[1896]: Accepted publickey for core from 10.200.12.6 port 57728 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:19.441304 systemd[1]: Started session-17.scope. Feb 12 19:57:19.442634 systemd-logind[1327]: New session 17 of user core. Feb 12 19:57:19.434000 audit[1896]: CRED_ACQ pid=1896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:19.466979 kernel: audit: type=1103 audit(1707767839.434:468): pid=1896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:19.467059 kernel: audit: type=1006 audit(1707767839.435:469): pid=1896 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 19:57:19.435000 audit[1896]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbcd6c300 a2=3 a3=0 items=0 ppid=1 pid=1896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:19.492987 kernel: audit: type=1300 audit(1707767839.435:469): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbcd6c300 a2=3 a3=0 items=0 ppid=1 pid=1896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:19.493601 kernel: audit: type=1327 audit(1707767839.435:469): proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:19.435000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:19.447000 audit[1896]: USER_START pid=1896 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:19.449000 audit[1898]: CRED_ACQ pid=1898 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:19.531608 kernel: audit: type=1105 audit(1707767839.447:470): pid=1896 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:19.531693 kernel: audit: type=1103 audit(1707767839.449:471): pid=1898 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:19.796000 audit[1904]: USER_ACCT pid=1904 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:19.796809 sudo[1904]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/useradd -p * -U -m user1 -G sudo Feb 12 19:57:19.797007 sudo[1904]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:57:19.796000 audit[1904]: CRED_REFR pid=1904 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:19.825503 kernel: audit: type=1101 audit(1707767839.796:472): pid=1904 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:19.825591 kernel: audit: type=1110 audit(1707767839.796:473): pid=1904 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:19.825616 kernel: audit: type=1105 audit(1707767839.796:474): pid=1904 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:19.796000 audit[1904]: USER_START pid=1904 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:19.963174 useradd[1905]: new group: name=user1, GID=1000 Feb 12 19:57:19.963192 useradd[1905]: new user: name=user1, UID=1000, GID=1000, home=/home/user1, shell=/bin/bash, from=none Feb 12 19:57:19.964550 useradd[1905]: add 'user1' to group 'sudo' Feb 12 19:57:19.964562 useradd[1905]: add 'user1' to shadow group 'sudo' Feb 12 19:57:20.742392 sudo[1904]: pam_unix(sudo:session): session closed for user root Feb 12 19:57:20.741000 audit[1904]: USER_END pid=1904 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:20.742000 audit[1904]: CRED_DISP pid=1904 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:57:20.856149 sshd[1896]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:20.857000 audit[1896]: USER_END pid=1896 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:20.857000 audit[1896]: CRED_DISP pid=1896 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:20.859844 systemd[1]: sshd@14-10.200.8.15:22-10.200.12.6:57728.service: Deactivated successfully. Feb 12 19:57:20.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.15:22-10.200.12.6:57728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:20.860829 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 19:57:20.861416 systemd-logind[1327]: Session 17 logged out. Waiting for processes to exit. Feb 12 19:57:20.862246 systemd-logind[1327]: Removed session 17. Feb 12 19:57:20.960949 systemd[1]: Started sshd@15-10.200.8.15:22-10.200.12.6:57734.service. Feb 12 19:57:20.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.15:22-10.200.12.6:57734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:21.596000 audit[1915]: USER_ACCT pid=1915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:21.597984 sshd[1915]: Accepted publickey for core from 10.200.12.6 port 57734 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:21.597000 audit[1915]: CRED_ACQ pid=1915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:21.597000 audit[1915]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9994a350 a2=3 a3=0 items=0 ppid=1 pid=1915 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:21.597000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:21.599728 sshd[1915]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:21.605451 systemd[1]: Started session-18.scope. Feb 12 19:57:21.606033 systemd-logind[1327]: New session 18 of user core. Feb 12 19:57:21.609000 audit[1915]: USER_START pid=1915 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:21.610000 audit[1917]: CRED_ACQ pid=1917 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:21.963025 systemd[1]: Started sshd@16-127.0.0.1:22-127.0.0.1:41240.service. Feb 12 19:57:21.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-127.0.0.1:22-127.0.0.1:41240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:21.971700 sshd[1924]: kex_exchange_identification: Connection closed by remote host Feb 12 19:57:21.971700 sshd[1924]: Connection closed by 127.0.0.1 port 41240 Feb 12 19:57:21.972195 systemd[1]: sshd@16-127.0.0.1:22-127.0.0.1:41240.service: Deactivated successfully. Feb 12 19:57:21.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-127.0.0.1:22-127.0.0.1:41240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:22.058855 sshd[1915]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:22.059000 audit[1915]: USER_END pid=1915 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:22.059000 audit[1915]: CRED_DISP pid=1915 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:22.062626 systemd[1]: sshd@15-10.200.8.15:22-10.200.12.6:57734.service: Deactivated successfully. Feb 12 19:57:22.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.15:22-10.200.12.6:57734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:22.063596 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 19:57:22.064374 systemd-logind[1327]: Session 18 logged out. Waiting for processes to exit. Feb 12 19:57:22.065248 systemd-logind[1327]: Removed session 18. Feb 12 19:57:22.163210 systemd[1]: Started sshd@17-10.200.8.15:22-10.200.12.6:57736.service. Feb 12 19:57:22.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.15:22-10.200.12.6:57736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:22.792000 audit[1928]: USER_ACCT pid=1928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:22.794587 sshd[1928]: Accepted publickey for core from 10.200.12.6 port 57736 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:22.794000 audit[1928]: CRED_ACQ pid=1928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:22.794000 audit[1928]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee8b652c0 a2=3 a3=0 items=0 ppid=1 pid=1928 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:22.794000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:22.796240 sshd[1928]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:22.801636 systemd[1]: Started session-19.scope. Feb 12 19:57:22.802205 systemd-logind[1327]: New session 19 of user core. Feb 12 19:57:22.805000 audit[1928]: USER_START pid=1928 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:22.806000 audit[1930]: CRED_ACQ pid=1930 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:23.256711 sshd[1928]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:23.256000 audit[1928]: USER_END pid=1928 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:23.257000 audit[1928]: CRED_DISP pid=1928 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:23.259925 systemd[1]: sshd@17-10.200.8.15:22-10.200.12.6:57736.service: Deactivated successfully. Feb 12 19:57:23.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.15:22-10.200.12.6:57736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:23.260793 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 19:57:23.261401 systemd-logind[1327]: Session 19 logged out. Waiting for processes to exit. Feb 12 19:57:23.262259 systemd-logind[1327]: Removed session 19. Feb 12 19:57:23.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.15:22-10.200.12.6:57748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:23.360708 systemd[1]: Started sshd@18-10.200.8.15:22-10.200.12.6:57748.service. Feb 12 19:57:23.976000 audit[1938]: USER_ACCT pid=1938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:23.977804 sshd[1938]: Accepted publickey for core from 10.200.12.6 port 57748 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:23.977000 audit[1938]: CRED_ACQ pid=1938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:23.977000 audit[1938]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdd07e0d0 a2=3 a3=0 items=0 ppid=1 pid=1938 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:23.977000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:23.979549 sshd[1938]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:23.984256 systemd[1]: Started session-20.scope. Feb 12 19:57:23.984721 systemd-logind[1327]: New session 20 of user core. Feb 12 19:57:23.987000 audit[1938]: USER_START pid=1938 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:23.989000 audit[1940]: CRED_ACQ pid=1940 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:24.357983 systemd[1]: coreos-cloudinit-5177504.service: Deactivated successfully. Feb 12 19:57:24.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-cloudinit-5177504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:24.436291 sshd[1938]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:24.436000 audit[1938]: USER_END pid=1938 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:24.443797 kernel: kauditd_printk_skb: 38 callbacks suppressed Feb 12 19:57:24.443877 kernel: audit: type=1106 audit(1707767844.436:507): pid=1938 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:24.440531 systemd[1]: sshd@18-10.200.8.15:22-10.200.12.6:57748.service: Deactivated successfully. Feb 12 19:57:24.441348 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 19:57:24.442568 systemd-logind[1327]: Session 20 logged out. Waiting for processes to exit. Feb 12 19:57:24.443424 systemd-logind[1327]: Removed session 20. Feb 12 19:57:24.437000 audit[1938]: CRED_DISP pid=1938 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:24.473716 kernel: audit: type=1104 audit(1707767844.437:508): pid=1938 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:24.473791 kernel: audit: type=1131 audit(1707767844.439:509): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.15:22-10.200.12.6:57748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:24.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.15:22-10.200.12.6:57748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:24.541422 systemd[1]: Started sshd@19-10.200.8.15:22-10.200.12.6:57750.service. Feb 12 19:57:24.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.15:22-10.200.12.6:57750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:24.560563 kernel: audit: type=1130 audit(1707767844.540:510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.15:22-10.200.12.6:57750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:25.159000 audit[1949]: USER_ACCT pid=1949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:25.178779 sshd[1949]: Accepted publickey for core from 10.200.12.6 port 57750 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:25.177000 audit[1949]: CRED_ACQ pid=1949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:25.179190 sshd[1949]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:25.184129 systemd[1]: Started session-21.scope. Feb 12 19:57:25.185169 systemd-logind[1327]: New session 21 of user core. Feb 12 19:57:25.194776 kernel: audit: type=1101 audit(1707767845.159:511): pid=1949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:25.194843 kernel: audit: type=1103 audit(1707767845.177:512): pid=1949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:25.194861 kernel: audit: type=1006 audit(1707767845.177:513): pid=1949 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 12 19:57:25.177000 audit[1949]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe35871010 a2=3 a3=0 items=0 ppid=1 pid=1949 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:25.220276 kernel: audit: type=1300 audit(1707767845.177:513): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe35871010 a2=3 a3=0 items=0 ppid=1 pid=1949 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:25.220369 kernel: audit: type=1327 audit(1707767845.177:513): proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:25.177000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:25.188000 audit[1949]: USER_START pid=1949 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:25.226531 kernel: audit: type=1105 audit(1707767845.188:514): pid=1949 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:25.190000 audit[1951]: CRED_ACQ pid=1951 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:25.641408 sshd[1949]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:25.641000 audit[1949]: USER_END pid=1949 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:25.641000 audit[1949]: CRED_DISP pid=1949 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:25.644804 systemd-logind[1327]: Session 21 logged out. Waiting for processes to exit. Feb 12 19:57:25.645137 systemd[1]: sshd@19-10.200.8.15:22-10.200.12.6:57750.service: Deactivated successfully. Feb 12 19:57:25.646017 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 19:57:25.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.15:22-10.200.12.6:57750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:25.646906 systemd-logind[1327]: Removed session 21. Feb 12 19:57:25.746030 systemd[1]: Started sshd@20-10.200.8.15:22-10.200.12.6:57766.service. Feb 12 19:57:25.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.15:22-10.200.12.6:57766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:26.365000 audit[1963]: USER_ACCT pid=1963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:26.367123 sshd[1963]: Accepted publickey for core from 10.200.12.6 port 57766 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:57:26.366000 audit[1963]: CRED_ACQ pid=1963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:26.366000 audit[1963]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb9bfaa60 a2=3 a3=0 items=0 ppid=1 pid=1963 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:57:26.366000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:57:26.368817 sshd[1963]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:57:26.374565 systemd[1]: Started session-22.scope. Feb 12 19:57:26.375129 systemd-logind[1327]: New session 22 of user core. Feb 12 19:57:26.378000 audit[1963]: USER_START pid=1963 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:26.379000 audit[1965]: CRED_ACQ pid=1965 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:26.871642 sshd[1963]: pam_unix(sshd:session): session closed for user core Feb 12 19:57:26.871000 audit[1963]: USER_END pid=1963 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:26.872000 audit[1963]: CRED_DISP pid=1963 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:57:26.875223 systemd[1]: sshd@20-10.200.8.15:22-10.200.12.6:57766.service: Deactivated successfully. Feb 12 19:57:26.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.15:22-10.200.12.6:57766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:26.876268 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 19:57:26.877068 systemd-logind[1327]: Session 22 logged out. Waiting for processes to exit. Feb 12 19:57:26.877949 systemd-logind[1327]: Removed session 22. Feb 12 19:57:30.133815 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#175 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.134162 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#182 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.134306 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#177 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.134443 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#185 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.139326 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#187 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.144948 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#188 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.151720 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#183 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.163528 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#190 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.163735 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#178 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.169153 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#184 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.180731 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#176 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.180927 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#179 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.186175 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#186 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.197058 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#180 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.197266 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#181 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.202314 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#189 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.219584 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#189 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.219784 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#181 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.226527 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#180 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.232378 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#186 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.238005 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#179 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.248863 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#176 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.249047 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#184 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.260241 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#178 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.260423 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#190 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.271224 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#183 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.271419 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#188 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.276934 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#187 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.282286 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#185 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.287429 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#177 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.292926 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#182 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.298379 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#175 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.309302 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#128 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.309485 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.320182 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#130 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.320346 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#131 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.326130 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#132 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.331435 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.351247 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.351435 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#132 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.356499 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#131 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.361421 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#130 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.372110 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.372284 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#128 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.377245 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#175 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.387860 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#182 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.388035 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#177 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.397620 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#185 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.397804 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#187 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.407699 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#188 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.407882 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#183 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.412891 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#190 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.418085 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#178 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.428407 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#184 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.428589 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#176 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.433713 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#179 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.438929 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#186 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.450428 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#180 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.450614 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#181 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.455528 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#189 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.479270 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#189 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.479547 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#181 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.489628 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#180 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.489810 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#186 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.499423 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#179 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.499631 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#176 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.509460 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#184 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.509654 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#178 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.519231 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#190 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.519399 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#183 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.529306 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#188 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.529495 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#187 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.539263 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#185 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.539453 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#177 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.549109 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#182 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.549284 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#175 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.559788 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#128 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.559958 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.569133 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#130 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.569301 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#131 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.573967 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#132 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.583292 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.598516 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.598697 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#132 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.603216 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#131 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.612964 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#130 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.613130 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.622681 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#128 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.622846 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#175 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.632417 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#182 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.632592 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#177 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.642155 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#185 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.642331 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#187 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.646910 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#188 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.656736 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#183 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.656905 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#190 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.667719 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#178 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.667922 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#184 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.677304 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#176 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.677472 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#179 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.682084 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#186 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.686768 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#180 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.696290 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#181 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.696446 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#189 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.723368 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#189 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.723603 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#181 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.723740 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#180 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.733027 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#186 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.733206 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#179 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.742402 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#176 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.742600 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#184 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.751982 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#178 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.752151 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#190 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.756522 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#183 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.767521 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#188 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.767697 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#187 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.777011 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#185 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.777195 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#177 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.786754 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#182 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.786937 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#175 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.796642 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#128 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.796819 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.806896 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#130 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.807070 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#131 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.816626 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#132 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.816817 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.833316 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.833519 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#132 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.842593 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#131 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.842766 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#130 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.852371 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#129 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.852553 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#128 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.861886 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#189 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.862092 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#181 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.872395 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#180 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.872566 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#186 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.877314 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#179 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.886620 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#176 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.886810 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#184 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.896359 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#178 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.896534 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#190 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.905876 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#183 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.906043 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#188 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.915745 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#187 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.915911 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#185 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.925334 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#177 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:57:30.925499 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#182 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001